0% found this document useful (0 votes)
90 views103 pages

Module 1 IOT

The document discusses the key concepts of the Internet of Things (IoT) including smart cities, smart homes, smart cars, IoT applications in farming, fitness, factories, hospitality, retail, smart grid, and health monitoring. It also describes the five layer IoT architecture including the perception, network, middleware, application, and business layers as well as common IoT devices, protocols, and the physical design of an IoT system.

Uploaded by

u2001170
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
Download as pdf or txt
0% found this document useful (0 votes)
90 views103 pages

Module 1 IOT

The document discusses the key concepts of the Internet of Things (IoT) including smart cities, smart homes, smart cars, IoT applications in farming, fitness, factories, hospitality, retail, smart grid, and health monitoring. It also describes the five layer IoT architecture including the perception, network, middleware, application, and business layers as well as common IoT devices, protocols, and the physical design of an IoT system.

Uploaded by

u2001170
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
Download as pdf or txt
Download as pdf or txt
You are on page 1/ 103

IOT

Introduction
• The Internet of Things (IoT) describes the network of physical
objects—“things”—that are embedded with sensors, software, and
other technologies for the purpose of connecting and exchanging
data with other devices and systems over the internet.
Definition:

• A dynamic global network infrastructure with self-configuring


capabilities based on standard and interoperable communication
protocols where physical and virtual things have identities, physical
attributes and virtual personalities and use intelligent interfaces, and
are seamlessly integrated into information network, often
communicate data associated with users and their environments.
Smart City
• The concept of "Smart City" addresses planning and public
administration through the automation of services in a creative
and sustainable way.
• Smart cities improve and modernize many sectors, including
government services, transport and traffic management, energy,
healthcare, water, innovative urban agriculture, and waste
management.
Smart Home
• Smart homes control home appliances including lights, alarms,
and water flow from taps, while promoting home security and
safety through elaborate, smart security systems.
Smart Self-Driving Cars
• Central computers installed in the car receive data from sensors
installed throughout the car to determine engine oil level,
radiator water temperature, etc
• You can even monitor the state of the car, including its location,
oil levels, gas, and more through a phone app.
IoT in Farming
• Farmers can use intelligent IoT farming applications to optimize many
time-consuming farm operations, presenting opportunities to
revolutionize the farming industry.
• IoT can help you determine the best time to harvest crops, generate
soil chemistry-based fertilizer profiles, and detect soil nutrients and
moisture concentrations.
Fitness Trackers
• IoT-connected devices help you optimize your fitness goals and
track progress.
• Fitness trackers track your daily activities like sleeping patterns,
heart rate, patterns of activity, statistics of workouts, calories
burned, and more
• IoT-Connected Factories
• Smart factories use IoT technology (also known as the
Industrial Internet of Things) to gather data on industrial
processes and devices to form strategic plans and create more
efficiencies.
• Machine equipment and factory items are connected to sensors
to improve analytics. Such technology can help factories reduce
energy consumption, improve asset tracking, and find
equipment issues early to protect profits and improve supply
chain productivity.
IoT Hospitality and Tourism
• The IoT has great potential to optimize hospitality and tourism operations.
• Staffing is a large expense for hotels and motels in the hospitality industry,
but IoT can automate certain interactions to reduce staffing burdens. For
example, mobile electronic keys allow hotel guests to access and check into
their rooms without having to interact with a staff member.
Retail IoT
• The retail sector can find savings, efficiencies, and innovation using
the internet of things technology.
• Retail IoT can accomplish a lot, including improved customer
experience, accurate and real-time product tracking, improved staff
strategy, and overall efficient inventory management.
Smart Grid
• The smart grid is the IoT that attends to energy systems.
• Utility companies use smart grid technologies to find energy
efficiencies through various means, including monitoring energy
consumption, predicting energy shortages and power outages, and
gathering data on how different individuals and companies use
energy.
IoT Applications for Health Monitoring
• The IoT provides a path through attaching sensors to patients at
home. Through these sensors, doctors can monitor and track a
patient’s progress, and alerts can inform doctors of any
emergencies, like a heart attack
Characteristics of IoT:

• Dynamic & Self Adapting: IoT devices and systems may have the capability to
dynamically adapt with the changing contexts and take actions based on their
operating conditions, user‘s context or sensed environment.
• Eg: the surveillance system is adapting itself based on context and changing conditions.
• Self Configuring: allowing a large number of devices to work together to provide
certain functionality.
• Inter Operable Communication Protocols: support a number of interoperable
communication protocols and can communicate with other devices and also with
infrastructure.
• Unique Identity: Each IoT device has a unique identity and a unique identifier(IP
address).
• Integrated into Information Network: that allow them to communicate and
exchange data with other devices and systems.
FIVE LAYER ARCHITECTURE
Perception Layer :
• This is the first layer of IoT architecture.
• In the perception layer, number of sensors and actuators are used to
gather useful information like temperature, moisture content,
intruder detection, sounds, etc.
• The main function of this layer is to get information from
surroundings and to pass data to another layer so that some actions
can be done based on that information.
Network Layer :
• As the name suggests, it is the connecting layer between perception and
middleware layer.
• It gets data from perception layer and passes data to middleware layer
using networking technologies like 3G, 4G, UTMS, WiFI, infrared, etc.
• This is also called communication layer because it is responsible for
communication between perception and middleware layer.
• All the transfer of data done securely keeping the obtained data
confidential.
• The network layer is responsible for connecting devices in IoT system,
enabling flow of data between devices and cloud.
Middleware Layer :
• Middleware Layer has some advanced features like storage,
computation, processing, action taking capabilities.
• It stores all data-set and based on the device address and name.
• It gives appropriate data to that device.
• It can also take decisions based on calculations done on data-set
obtained from sensors.
• It is responsible for processing and storing data generated by IoT
devices.
Application Layer :
• The application layer is responsible for providing user interface and
applications that enable end-users to interact with IoT system.
• The application layer manages all application process based on
information obtained from middleware layer.
• This application involves sending emails, activating alarm, security
system, turn on or off a device, smartwatch, smart agriculture, etc.

• The application layer consists of those elements that are


specific to this application. So that would contain the user
interface (UI), back-end processing for the UI, and any bindings
between the application and your business logic
Business Layer :
• The business layer is responsible for defining business logic and rules
that govern behavior of IoT system.
• This layer includes business processes, rules engines, and analytics
tools that are used to analyze data generated by IoT devices and make
informed decisions.
Physical Design of IOT

• The physical design of an IoT system is referred to as


the Things/Devices and protocols that are used to build an IoT
system.
• All these things/Devices are called Node Devices
• Every device has a unique identity that performs remote sensing,
actuating and monitoring work
• They obey the protocols that are used to establish communication
between the Node devices and servers over the internet.
Things
• Things refers to IoT Devices which have unique identities and can
perform remote sensing, actuating and monitoring capabilities.
• Things are main part of IoT Application.
• IoT Devices can be various type, Sensing Devices, Smart Watches,
Smart Electronics appliances, Wearable Sensors, Automobiles, and
industrial machines.
• These devices generate data in some forms or the other which when
processed by data analytics systems leads to useful information to
guide further actions locally or remotely.
Things of IoT

• The “Things” in IoT usually refers to IoT devices which have unique
identities and can perform remote sensing, Actuating and monitoring
capabilities.
• IoT devices can
• Exchange data with other connected devices and applications (directly or
indirectly),
• Collect data from other devices and process the data locally
• Send the data to Centralized servers or cloud based applications back ends
for processing the data
• Send the data from some task locally and other task within the IoT
infrastructure, based on temporal and space constraints (ie : Memory,
processing calibrators, communication latencies and speed and deadlines).
Things of IoT

• An IoT device may consist of several interfaces connections to other


devices, both wired and wireless.
• These include
• IoT interfaces for sensors
• Interfaces for internet connectivity
• Memory and storage interfaces
• Audio video interfaces
• An IoT Device can collect various types of data from the onboard or
attached sensors, such as temperature, humidity, light intensity
• IoT devices can also be varied types, for instance, wearable sensors, smart
watches, LED light automobiles and industrial machines.
IOT PROTOCOLS
• IoT protocols help to establish Communication between IoT Device
(Node Device) and Cloud based Server over the Internet.
• It help to sent commands to IoT Device and receive data from an IoT
device over the Internet.
IOT PROTOCOL
Link Layer:

• Link Layer protocols determine how the data is physically sent over
the networks physical layer or medium(example copper wire,
electrical cable, or radio wave).
• The Scope of the Link Layer is the Local Network connections to
which host is attached.
• Link layer determines how the packets are coded and signaled by the
hardware device over the medium to which the host is attached.
802.3 Ethernet:
• 802.3 is a collections of wired Ethernet standards for the link layer.
• For example
• 802.3 10BASE5 Ethernet that uses coaxial cable as a shared medium
• 802.3.i is standard for 10 BASET Ethernet over copper twisted pair
connection.
• Standards provide data rates from 10 Mb/s to 40 gigabits per second and the
higher.
• The shared medium in Ethernet can be a coaxial cable , twisted pair wire or
and Optical fiber.
• Shared medium carries the communication for all the devices on the network.
802.11- WI-FI:

• IEEE 802.11 is a collections of wireless Local area network.(WLAN)


communication standards, including extensive descriptions of the link
layer.
• For example 802.11a operate in the 5 GHz band, 802.11b and 802.11g
operate in the 2.4 GHz band. 802.11ac operates in the 5G hertz band.
802.16 wiMAX:

• IEEE 802.16 is a collection of wirless broadband and Standards,


including extensive descriptions for the link layer also called WiMAX
• Wimax standard provides a data rates from from 1.5 Mb/s to 1Gb/s
802.15.4 LR-WPAN:

• IEEE 802.1 5.4 is a collections of standard for low rate wireless


personal area network(LR-WPAN).
• These standard form the basis of specifications for high level
communication Zigbee.
• LR-WPAN standards provide data rates from 40 k b/ s. These
standards provide low cost and low speed Communications for power
constrained devices.
2G / 3G / 4G mobile communications

• These are the different generations of mobile communication


standards including second generation (2G including GSM and
CDMA).

• 3rd Generation (3G including UMTS and CDMA2000) and 4th


generation 4G including LTE.
Network Layer
• The network layer are responsible for sending of IP datagrams from
the source network to the destination network.
• This layer Performs the host addressing and packet routing
• The datagrams contains a source and destination address which are
used to route them from the source to the destination across multiple
networks.
• Host Identification is done using the hierarchy IP addressing schemes
such as ipv4 or IPv6.
IPv4:
• Internet protocol versions for open parents close (IPV4) is there most deployed
internet protocol that is used to identify the device is on a network using a
hierarchy latest schemes.
• It uses 32 bit addresses scheme.
• As more and more devices got connected to the internet, the Ipv4 has succeeded
by IPv6.

IPv6:
•  It is the newest versions of internet protocol and successor to IPv4.
•  IPv6 uses 128 bit address schemes
6LoWPAN:
• IPv6 over low power wireless personal area networks brings IP protocol to the low
power device which have limited processing capability it operate in the 2.4 GHz
frequency range and provide the data transfer rate off to 50 kb/s.
Transport layer :
• The Transport layer protocols provides end-to-end message transfer
capability independent of the underlying network.
• The message transfer capability can be set up on connections, either
using handshake or without handshake acknowledgements.
• Provides functions such as error control , segmentation, flow control
and congestion control.
TCP
• The transmission control protocol is a protocol that defines how to
establish and maintain a network that can exchange data in a proper
manner using the internet protocol.
UDP
• UDP is used to send messages (referred to as datagrams) between
hosts on an IP network.
• Unlike TCP, it does not require prior communication to establish
channels or data paths.
• UDP operates with a simple connectionless model, minimizing
protocol overhead
Application Layer protocol
• In this layer, protocols define how application interfaces with the
lower layers to send data over the network.
• These protocols include HTTP, WebSocket, XMPP, MQTT, DDS,
and AMQP protocols.
HTTP
• Hypertext transfer protocol is a protocol that presents an
application layer for transmitting media documents. it is used to
communicate between web browsers and servers. it makes a
request to a server and then waits till it receives a response and
in between the request server does not keep any data between
the two requests.
WebSocket
• This protocol enables two-way communication between a client
and a host that can be run on an untrusted code in a controlled
environment. This protocol is commonly used by web browsers.
MQTT
• It is a machine-to-machine connectivity protocol that was
designed as a publish/subscribe messaging transport. and it is
used for remote locations where a small code footprint is
required.
Basic
elements of
IoT
• Things. A “thing” is an object equipped with sensors that gather data that will
be transferred over a network and actuators that allow things to act (for
example, to switch on or off the light, to open or close a door, to increase or
decrease engine rotation speed and more). This concept includes fridges,
street lamps, buildings, vehicles, production machinery, rehabilitation
equipment and everything else imaginable. Sensors are not in all cases
physically attached to the things: sensors may need to monitor, for example,
what happens in the closest environment to a thing.
• Gateways. Data goes from things to the cloud and vice versa through the gateways.
A gateway provides connectivity between things and the cloud part of the IoT
solution, enables data preprocessing and filtering before moving it to the cloud (to
reduce the volume of data for detailed processing and storing) and transmits
control commands going from the cloud to things. Things then execute commands
using their actuators.
• Cloud gateway facilitates data compression and secure data transmission between
field gateways and cloud IoT servers. It also ensures compatibility with various
protocols and communicates with field gateways using different protocols
depending on what protocol is supported by gateways.
• Streaming data processor ensures effective transition of input data to a data lake and
control applications. No data can be occasionally lost or corrupted.
• Data lake. A data lake is used for storing the data generated by connected devices in its
natural format. Big data comes in "batches" or in “streams”. When the data is needed for
meaningful insights it’s extracted from a data lake and loaded to a big data warehouse.
• Big data warehouse. Filtered and preprocessed data needed for meaningful insights is
extracted from a data lake to a big data warehouse. A big data warehouse contains only
cleaned, structured, and matched data (compared to a data lake which contains all sorts of
data generated by sensors). Also, data warehouse stores context information about things
and sensors (for example, where sensors are installed) and the commands control
applications send to things.
• Data analytics. Data analysts can use data from the big data warehouse to find trends and gain
actionable insights. When analyzed (and in many cases – visualized in schemes, diagrams,
infographics) big data show, for example, the performance of devices, help identify inefficiencies
and work out the ways to improve an IoT system (make it more reliable, more customer-oriented).
Also, the correlations and patterns found manually can further contribute to creating algorithms for
control applications.
• Machine learning and the models ML generates. With machine learning, there is an opportunity to
create more precise and more efficient models for control applications. Models are regularly
updated (for example, once a week or once a month) based on the historical data accumulated in a
big data warehouse. When the applicability and efficiency of new models are tested and approved
by data analysts, new models are used by control applications.
• Control applications send automatic commands and alerts to actuators
Logical design of IoT

• Logical design of an IoT system refers to an abstract representation of


the entities and processes without going into low level specification
of the implementations
• It uses Functional Blocks, Communication Models,
and Communication APIs to implement a system.
IoT Functional blocks
• An IoT system consists of a number of functional blocks like
Devices, services, communication, security, and application that
provide the capability for sensing, actuation, identification,
communication, and management.
IoT Functional blocks
Application
• It is an interface that provides a control system that use by users
to view the status and analyze of system.
Management
• This functional block provides various functions that are used to
manage an IoT system.
Services
• This functional block provides some services like monitoring and
controlling a device and publishing and deleting the data and
restoring the system.
Communication
• This block handles the communication between the client and the
cloud-based server and sends/receives the data using protocols.
Security
• This block is used to secure an IoT system using some functions like
authorization, data security, authentication, 2-step verification, etc.
Device
• These devices are used to provide sensing and monitoring control
functions that collect data from the outer environment.
IoT Communication Models
• There are different types of models available in an IoT system
that is used to communicate between the system and server like
the request-response model, publish-subscribe model, push-
pull model, exclusive pair model, etc.
IoT communication model
Request response: client -server
• Request-response is a Communications model in which the client
sends request to the server and the server responds to the requests.
• when a server receives a request it fetches the data, retrieves the
resources and prepares the response, and then sends the data back
to the client.
• HTTP works as a request-response protocol between a client and
server.
Example
• When we search a query on a browser then the browser submits
an HTTP request to the server and then the server returns a
response to the browser(client).
Publish - Subscribe:

• This is a communication model that involve publishers, brokers and


consumers.
• Publishers are the source of data.
• Publishers send the data to the topics which is managed by the
broker.
• Publishers are not aware of the consumer.
• Consumers Subscribe to the topic which are managed by the broker.
• When the broker receives the data for a topic from the publisher, it
send the data to all the subscribed consumers.
Example
• On the website many times we subscribed to their newsletters using our email address.
these email addresses are managed by some third-party services and when a new article
is published on the website it is directly sent to the broker and then the broker sends
these new data or posts to all the subscribers.
Push pull:
• Push pull is communication model in which the data producers push
the data to queues and the consumers pull the data from the queues.
• Producers do not need to be aware of the consumer.
• Queues help in decoupling the messaging between the Producers and
Consumers .
• It also act as a buffer which helps in situations when there is a
mismatch between the rate at which the produces push data and the
rate at which the consumers full the data
Exclusive pair:

• Exclusive pair is a bi directional, fully duplex communication model


that uses a persistent connections between the client and the server.
• Here first set up a connection between the client and the server and
it remains open until the client sends a request to close the
connection.
• Client and server can send messages to each other after connection
setup.
IoT communication APIs
• An API for a website is code that allows two software programs
to communicate with each other.
• The API spells out the proper way for a developer to write a
program requesting services from an operating system or other
application.
• These APIs like REST and WebSocket are used to communicate
between the server and system in IoT.
REST-based communication APIs
• Representational state transfer(REST) provides standards between
computer systems on the web, making it easier for systems to
communicate with each other.
• REST determines how the API (application programming interface)
looks like with a set of rules that developers must follow when they
create their API.
• REST API focus on the systems’ resources and how resource states
are transferred using the request-response communication model.
• When a RESTful API is called, the server will transfer to the client a
representation of the state of the requested resource.
Guiding Principles of REST
Client-server
• Here the client is not aware of the storage of data because it is
concerned about the server
• Similarly the server should not be concerned about the user
interface because it is a concern of the client.
• This separation is needed for independent development and
updating of the server and client. No matter how the client is
using the response of the server and no matter how the server is
using the request of the client.
Stateless
• It means each request from the client to the server must contain
all the necessary information to understand the server.
• If the server can’t understand the request of the client then it
can’t fetch the requested data in a proper manner.
Cacheable
• REST APIs are cacheable because they can store data that has been
previously requested and use that data upon demand.
• The Cache constraints do require that data within a response to a
request must be labeled (either implicitly or explicitly) as either
cacheable or non-cacheable.
• The client cache is only given the right to reuse that response if it is
cacheable.
• It improves the efficiency and scalability of the system without
loading extra data.
Uniform Interface
• This constraint emphasizes a uniform interface between components, which
simplifies and improves the visibility of the interactions.
Layered System
• This alters an architecture constraint’s component behavior by restricting
each component’s knowledge beyond the immediate layer with which they
are interacting, thus creating an architecture composed of hierarchical
layers.
• This confinement of a single layer system helps with overall system
complexity and promotes independence among the components.
Code on Demand
• The code-on-demand style, allows client functionality to be extended by
downloading and executing code in the form of scripts.
WebSocket-based communication API
• This type of API allows bi-directional full-duplex communication
between server and client using the exclusive pair communication
model.
• This API uses full-duplex communication so it does not require a new
connection setup every time when it requests new data.
• WebSocket API begins with a connection setup between the server
and client
• If the WebSocket is supported by the server then it responds back to
the client with a successful response
• After the setup of a connection server and the client can send data to
each other in full-duplex mode.
• This type of API reduces the traffic and latency of data.
IoT Enabling Technologies
Different technologies together enable development of IoT
applications.

IoT(internet of things) enabling technologies are


• Wireless Sensor Network
• Cloud Computing
• Big Data Analytics
• Communications Protocols
• Embedded System
1. Wireless Sensor Network(WSN) :
• A WSN comprises distributed devices with sensors which are used to monitor the
environmental and physical conditions.
• A wireless sensor network consists of end nodes, routers and coordinators.
• End nodes have several sensors attached to them where the data is passed to a coordinator
with the help of routers.
• A coordinator collects data from all the nodes and is connected to Internet.
• The coordinator also acts as the gateway that connects WSN to the internet.
Example –
• Weather monitoring system
• Indoor air quality monitoring system
• Soil moisture monitoring system
• Surveillance system
• Health monitoring system
2. Cloud Computing :
• It provides us the means by which we can access applications as utilities
over the internet.
• Cloud means something which is present in remote locations.
• With Cloud computing, users can access any resources from anywhere like
databases, webservers, storage, any device, and any software over the
internet.
Characteristics –
• Broad network access
• On demand self-services
• Rapid scalability
• Measured service
• Pay-per-use
SERVICES PROVIDED BY CLOUD COMPUTING

•IaaS (Infrastructure as a service)


•PaaS (Platform as a service)
•SaaS (Software as a service)
• IAAS model provides the core infrastructure to companies for
building their own applications. This core infrastructure includes
servers, storage, networking, etc.
• PAAS model offers development runtimes for the users to build
and deploy their application.
• SAAS model offers already developed and deployed
applications for the users to use. Examples of SAAS offerings
are Gmail, Facebook, DropBox, YouTube, etc.
IaaS (Infrastructure as a service)
• Infrastructure as a service provides online services such
as physical machines, virtual machines, servers,
networking, storage and data center space on a pay per
use basis.

• Major IaaS providers are Google Compute Engine,


Amazon Web Services and Microsoft Azure etc.

• Ex : Web Hosting, Virtual Machine etc.


PaaS (Platform as a service)

•Provides a cloud-based environment with a very thing


required to support the complete life cycle of building
•For delivering West web based (cloud) applications –
without the cost and complexity of buying and managing
underlying hardware, software provisioning and hosting.
•Computing platforms such as hardware, operating
systems and libraries etc.
• Basically, it provides a platform to develop applications.
Ex : App Cloud, Google app engine
SaaS (Software as a service)
• It is a way of delivering applications over the internet as a
service.
• Instead of installing and maintaining software, you simply
access it via the internet, freeing yourself from complex
software and hardware management.
• SaaS Applications are sometimes called web-based software
on demand software or hosted software.
• SaaS applications run on a SaaS provider’s service and they
manage security availability and performance.
Ex : Google Docs, Gmail, office etc
• Cloud computing supports four basic deployment models.
• These models differ in the way how the cloud is built and who
are using the resources in the cloud.
• The four cloud deployment models are:
• Public cloud
• Private cloud
• Community cloud
• Hybrid cloud
3. Big Data Analytics :
• It refers to the method of studying massive volumes of data or big
data.
• Collection of data whose volume, velocity or variety is simply too
massive and tough to store, control, process and examine the data
using traditional databases.
• Big data is gathered from a variety of sources including social network
videos, digital images, sensors and sales transaction records.
BigData is often characterized by six Vs. They are:
• Volume: Refers to the huge volume of data aggregated from various sources.
• Variety: Refers to different types of data. Data can be structured, semi-structured
or unstructured.
• Velocity: Refers to the speed at which the data is generated. Now-a-days the
amount of data available on the Internet per minute is several peta bytes or even
more.
• Veracity: Refers to the degree to which the data can be trusted. If the data
collected is incorrect or has manipulated or wrong values, the analysis of such
data is useless.
• Value: Refers to the business value of the collected. Even though we have huge
amount of data, but it is not useful for gaining profits in the business, such data is
useless.
• Variability: Refers to the ways in which the big data can be used and formatted.
• The data analytics framework consists of six steps namely:
collection, cleaning, integration, analysis, visualization and
alerting.
4. Communications Protocols :
• They are the backbone of IoT systems and enable network connectivity and
linking to applications.
• Communication protocols allow devices to exchange data over the
network.
• Multiple protocols often describe different aspects of a single
communication.
• A group of protocols designed to work together is known as a protocol
suite; when implemented in software they are a protocol stack.
• They are used in
• Data encoding
• Addressing schemes
5. Embedded Systems :
• Embedded system can be imagined as computing hardware with
software embedded in it.
• An embedded system can be an independent system or it can be a
part of another larger system.
• An embedded system is a microcontroller or microprocessor based
system which is designed to perform a specific task.
• The key components include microcontroller/microprocessor,
memory, networking units, I/O, and storage. It runs Real-Time
Operating Systems (RTOS).
• An embedded system has three components. They are:
• Hardware
• Software
• Real Time Operating system (RTOS) that supervises the application software and
provide mechanism to let the processor run a process as per schedule by following a
plan to control the latencies.
• The characteristics of an embedded system are:
• Single-functioned
• Tightly constrained
• Reactive and Real time
• Memory
• Connected
IoT levels and Deployment
Templates
IoT system comprises of the following components:

• Device : These may be sensors or actuators capable of identifying, remote


sensing, or monitoring.
• Resources : Resources are software components on the device for accessing,
processing and storing information or controlling actuator connected to the
device. Also include software components that enable network access for the
device .
• Controller service: Controller Service is a native service that runs on the device
and interact with the web services. Controller service sends data from the device
to the web service and receives command from the application for controlling the
device.
• Database: Database can be either local or in the cloud and stores the data
generated by the IoT device.
• Web service: Serve as a link between the device, application, database and
analysis components.
• Analysis Component: It performs an analysis of the data generated by
the loT device and generates results in a form which are easy for the
user to understand.
• Application: It provides a interface for the user to view the system
status and view product data. It also allows users to control and
monitor various aspects of the IoT system.
IoT level 1:

• Level One IoT system has a single node / device that performs sensing
and/or actuation, stores data, performs analysis and the host the
application.
• Level 1 IoT systems are suitable for modeling low cost and low
complexity solutions where the data involving is not big and the analysis
requirements are not computationally intensive.
EXAMPLE
• Let us now consider done example of Level 1 IoT system for home automation.
• This system consists of the single node that allows controlling the lights and appliances
in your home remotely .
• The device used in this system interface with their lights and appliances using electronic
relay switches.
• The status information of each light or appliance is maintained in a local database.
• REST service deployed locally Allow retrieving and updating the state of the each light or
appliances in the status database.
• The controller service continuously monitor the state of each light or appliance and
triggers the relay switches accordingly.
• The applications which is deployed locally has a user interface for controlling the lights or
appliances.
• Since the device is connected to the internet, the application can be accessed remotely
as well.
IoT LEVEL 2
• Level 2 IoT system has a single node that performs sensing and/or
actuation and local analysis.
• Data is stored in the cloud and application is usually cloud based
systems are suitable for solutions where the data in world is big.
• The primary analysis requirement is not computationally intensive
and can be done local itself.
EXAMPLE
• Construct an example of Level 2 IoT system for smart irrigation.
• The system consists of the single node that monitor the soil moisture level and
control irrigation system.
• The device used in this system collect soil moisture data from sensor.
• The controller service continuously monitor the moisture level.
• If the moisture level drops below a threshold, the irrigation system is turned on.
• For controlling the irrigation system actuators such as solenoid valve can be used.
• Rest Web Services is used for storing and retrieving data which is stored in the
cloud database.
• A cloud based application is used for visualizing the moisture level over a period
of time, which can help in making decisions about irrigation schedules.
IOT LEVEL 3
• Level 3 system has a single node .
• Data is stored and analyzed in the cloud and application is cloud-
based.
• Level 3 IoT system suitable for solutions where the data involved is big
and analysis requirements computationally intensive.
EXAMPLE
• Let us considered example of Level 3 IoT system tracking package handling.
• The system consists of a single node that monitors the vibration level for
package being shipped.
• The device in the system uses accelerometer and gyroscope sensor for
monitoring vibration levels.
• The controller service send sensor data to the cloud in real time using a
website service.
• The data is stored in the cloud and also visualized using a cloud based
application.
• The analysis component in the cloud can trigger alert, if the vibration level
become greater than threshold.
• The benefit of using websocket service instead of the REST service in this
example is that, the sensor data can be sent in real-time to the cloud.
• Cloud based application can subscribe to the sensor data feeds for you in
the real-time data.
IoT level 4
• A level 4 IoT system has multiple nodes that perform local analysis.
• Data is stored in the cloud and application is cloud based, level 4
contains local and cloud based observer nodes which can subscribe
to and receive information collected in the cloud from IoT devices.
• Observer nodes can process information and use it for various
applications, however observer nodes do not perform any control
function.
• Level 4 IoT systems are suitable for solutions where multiple nodes
are required, the data involved is big and the analysis requirements
are computationally intensive.
EXAMPLE
• Let us consider an example of level four IoT system for noise
monitoring.
• The system consists of multiple nodes placed in different locations
for monitoring noise level in an area.
• In this example with sound sensor.
• Nodes are independent of each other each node runs in one
controller service that sends the data to the cloud.
• The data is stored in a cloud database the analysis of the data
collected from a number of nodes is done in the cloud.
IoT Level 5:
• IoT system has multiple end nodes and one coordinator node
• The end nodes that perform sensing and / or actuation.
• Coordinator node collects data from the entry and send to the cloud.
• Data is stored and analyzed in the cloud and applications is cloud
based.
EXAMPLE
• Level 5 IoT system are suitable for forest fire detection.
• The system consists of multiple nodes placed in different locations for
monitoring temperature, humidity and carbon dioxide levels in a forest.
• The end nodes in this example are equipped with various sensors such as
temperature humidity and to CO2.
• The coordinator node collects the data from the end nodes and act as a
gateway that provides internet connectivity to the IoT system.
• The coordinator device sends the collected data to the cloud .
• The data is stored in the cloud database.
• The analysis of the data is done in the computing cloud to aggregate the
data and make prediction.
IOT LEVEL 6
• IoT Level 6 system has multiple Independent end nodes that perform
sensing and / or actuations and send data to the cloud.
• Data is stored in the cloud and applications is cloud based .
• The analytics component analyze the data and store the results in the
cloud database.
• The results are visualized with the cloud based application.
• The centralized controller is aware of the status of all the end nodes
and send control commands to the nodes.
EXAMPLE
• Let us consider an example of the level 6 IoT system for weather
monitoring.
• The system consists of multiple nodes placed in different location for
monitoring temperature, humidity and pressure in an area.
• The end nodes are equipped with various sensors such as temperature
,pressure and humidity.
• The end nodes send the data to the cloud in real time using a websocket
service .
• The data is stored in a cloud database.
• The analysis of the data is done in the cloud to aggregate the data and
make predictions.
• A cloud based applications is used for visualizing the data.

You might also like