unit-1
unit-1
INTERNET OF THINGS
INTERNET OF THINGS:
According to the definition of IoT, It is the way to interconnection with the help of the
internet devices that can be embedded to implement the functionality in everyday objects by
enabling them to send and receive data. Today data is everything and everywhere. Hence, IoT
can also be defined as the analysis of the data generates a meaning action, triggered
subsequently after the interchange of data. IoT can be used to build applications for
agriculture, assets tracking, energy sector, safety and security sector, defence, embedded
applications, education, waste management, healthcare product, telemedicine, smart city
applications, etc.
The term Internet of Things(IoT) has emerged over the past few years as one of the popular
“technology buzz” terms. In today’s technological world IoT figures prominently in
technology discussions due to its rapid growth. There are multiple ways to define IoT.
Safety –There is a danger of the sensitive personal details of the users getting compromised
when all his/her devices are connected to the internet. This can cause a loss to the user.
Hence, data security is the major challenge. Besides, the equipment involved is huge. IoT
networks may also be at the risk. Therefore, equipment safety is also critical.
Self Configuring – This is one of the most important characteristics of IoT. IoT devices are
able to upgrade their software in accordance with requirements with a minimum of user
participation. Additionally, they can set up the network, allowing for the addition of new
devices to an already-existing network.
ACTUATORS IN IOT
An IoT device is made up of a Physical object (“thing”) + Controller (“brain”) + Sensors +
Actuators + Networks (Internet). An actuator is a machine component or system that moves or
controls the mechanism or the system. Sensors in the device sense the environment, then
control signals are generated for the actuators according to the actions needed to perform.
A servo motor is an example of an actuator. They are linear or rotatory actuators, can move to
a given specified angular or linear position. We can use servo motors for IoT applications and
make the motor rotate to 90 degrees, 180 degrees, etc., as per our need.
The following diagram shows what actuators do, the controller directs the actuator based on
the sensor data to do the
work.
Advantages :
They are a low-cost option and are used at extreme temperatures where using air is a
safer option than chemicals.
They need low maintenance, are durable, and have a long operational life.
It is very quick in starting and stopping the motion.
Disadvantages :
Loss of pressure can make it less efficient.
The air compressor should be running continuously.
Air can be polluted, and it needs maintenance.
3. Electrical Actuators –
An electric actuator uses electrical energy, is usually actuated by a motor that converts
electrical energy into mechanical torque. An example of an electric actuator is a solenoid
based electric bell.
Advantages :
It has many applications in various industries as it can automate industrial valves.
It produces less noise and is safe to use since there are no fluid leakages.
It can be re-programmed and it provides the highest control precision positioning.
Disadvantages :
It is expensive.
It depends a lot on environmental conditions.
Other actuators are –
Thermal/Magnetic Actuators – These are actuated by thermal or mechanical energy. Shape
Memory Alloys (SMAs) or Magnetic Shape‐Memory Alloys (MSMAs) are used by these
actuators. An example of a thermal/magnetic actuator can be a piezo motor using SMA.
Mechanical Actuators – A mechanical actuator executes movement by converting rotary
motion into linear motion. It involves pulleys, chains, gears, rails, and other devices to
operate.
Example
A crankshaft.
Soft Actuators
Shape Memory Polymers
Light Activated Polymers
With the expanding world of IoT, sensors and actuators will find more usage in commercial
and domestic applications along with the pre-existing use in industry.
Things/Devices
Things/Devices are used to build a connection, process data, provide interfaces, provide storage,
and provide graphics interfaces in an IoT system. all these generate data in a form that can be
analyzed by an analytical system and program to perform operations and used to improve the
system.
for example, temperature sensor that is used to analyze the temperature generates the data from a
location and is then determined by algorithms.
Connectivity
Devices like USB hosts and ETHERNET are used for connectivity between the devices and the
server.
Processor
A processor like a CPU and other units are used to process the data. these data are further used to
improve the decision quality of an IoT system.
Audio/Video Interfaces
An interface like HDMI and RCA devices is used to record audio and videos in a system.
Input/Output interface
To give input and output signals to sensors, and actuators we use things like UART, SPI, CAN,
etc.
Storage Interfaces
Things like SD, MMC, and SDIO are used to store the data generated from an IoT device.
Other things like DDR and GPU are used to control the activity of an IoT system.
IoT Protocols
These protocols are used to establish communication between a node device and a server over
the internet. it helps to send commands to an IoT device and receive data from an IoT device
over the internet. we use different types of protocols that are present on both the server and
client-side and these protocols are managed by network layers like application, transport,
network, and link layer.
In this layer, protocols define how the data can be sent over the network with the lower layer
protocols using the application interface. these protocols include HTTP, WebSocket, XMPP,
MQTT, DDS, and AMQP protocols.
HTTP
Hypertext transfer protocol is a protocol that presents in an application layer for transmitting
media documents. it is used to communicate between web browsers and servers. it makes a
request to a server and then waits till it receives a response and in between the request server
does not keep any data between two requests.
WebSocket
This protocol enables two-way communication between a client and a host that can be run on an
untrusted code in a controlled environment. this protocol is commonly used by web browsers.
MQTT
It is a machine-to-machine connectivity protocol that was designed as a publish/subscribe
messaging transport. and it is used for remote locations where a small code footprint is required.
Transport Layer
This layer is used to control the flow of data segments and handle the error control. also, these
layer protocols provide end-to-end message transfer capability independent of the underlying
network.
CP
The transmission control protocol is a protocol that defines how to establish and maintain a
network that can exchange data in a proper manner using the internet protocol.
UDP
a user datagram protocol is a part of an internet protocol called the connectionless protocol. this
protocol is not required to establish the connection to transfer data.
Network Layer
This layer is used to send datagrams from the source network to the destination network. we use
IPv4 and IPv6 protocols as host identification that transfers data in packets.
IPv4
This is a protocol address that is a unique and numerical label assigned to each device connected
to the network. an IP address performs two main functions host and location addressing. IPv4 is
an IP address that is 32-bit long.
IPv6
It is a successor of IPv4 that uses 128 bits for an IP address. it is developed by the IETF task
force to deal with long-anticipated problems.
Link Layer
Link-layer protocols are used to send data over the network's physical layer. it also determines
how the packets are coded and signaled by the devices.
Ethernet
It is a set of technologies and protocols that are used primarily in LANs. it defines the physical
layer and the medium access control for wired ethernet networks.
WiFi
It is a set of LAN protocols and specifies the set of media access control and physical layer
protocols for implementing wireless local area networks.
SOME IOT PROTOCOLS
What is 6LoWPAN?
6LoWPAN is an IPv6 protocol, and It’s extended from is IPv6 over Low Power Personal Area
Network. As the name itself explains the meaning of this protocol is that this protocol works
on Wireless Personal Area Network i.e., WPAN.
WPAN is a Personal Area Network (PAN) where the interconnected devices are centered
around a person’s workspace and connected through a wireless medium. You can read more
about WPAN at WPAN. 6LoWPAN allows communication using the IPv6 protocol. IPv6 is
Internet Protocol Version 6 is a network layer protocol that allows communication to take
place over the network. It is faster and more reliable and provides a large number of
addresses.
6LoWPAN initially came into existence to overcome the conventional methodologies that
were adapted to transmit information. But still, it is not so efficient as it only allows for the
smaller devices with very limited processing ability to establish communication using one of
the Internet Protocols, i.e., IPv6. It has very low cost, short-range, low memory usage, and
low bit rate.
It comprises an Edge Router and Sensor Nodes. Even the smallest of the IoT devices can now
be part of the network, and the information can be transmitted to the outside world as well.
For example, LED Streetlights.
It is a technology that makes the individual nodes IP enabled.
6LoWPAN can interact with 802.15.4 devices and also other types of devices on an IP
Network. For example, Wi-Fi.
It uses AES 128 link layer security, which AES is a block cipher having key size of
128/192/256 bits and encrypts data in blocks of 128 bits each. This is defined in IEEE
802.15.4 and provides link authentication and encryption.
Features of 6LoWPAN:
It is used with IEEE 802.15,.4 in the 2.4 GHz band.
Outdoor range: ~200 m (maximum)
Data rate: 200kbps (maximum)
Maximum number of nodes: ~100
Advantages of 6LoWPAN:
6LoWPAN is a mesh network that is robust, scalable, and can heal on its own.
It delivers low-cost and secure communication in IoT devices.
It uses IPv6 protocol and so it can be directly routed to cloud platforms.
It offers one-to-many and many-to-one routing.
In the network, leaf nodes can be in sleep mode for a longer duration of time.
Disadvantages of 6LoWPAN:
It is comparatively less secure than Zigbee.
It has lesser immunity to interference than that Wi-Fi and Bluetooth.
Without the mesh topology, it supports a short range.
Applications of 6LoWPAN:
It is a wireless sensor network.
It is used in home-automation,
It is used in smart agricultural techniques, and industrial monitoring.
IPv4 vs IPv6
What is IP?
An IP stands for internet protocol. An IP address is assigned to each device connected to a
network. Each device uses an IP address for communication. It also behaves as an identifier as
this address is used to identify the device on a network. It defines the technical format of the
packets. Mainly, both the networks, i.e., IP and TCP, are combined together, so together, they are
referred to as a TCP/IP. It creates a virtual connection between the source and the destination.
We can also define an IP address as a numeric address assigned to each device on a network. An
IP address is assigned to each device so that the device on a network can be identified uniquely.
To facilitate the routing of packets, TCP/IP protocol uses a 32-bit logical address known as
IPv4(Internet Protocol version 4).
An IP address consists of two parts, i.e., the first one is a network address, and the other one is a
host address.
There are two types of IP addresses:
IPv4
IPv6
What is IPv4?
IPv4 is a version 4 of IP. It is a current version and the most commonly used IP address. It is a
32-bit address written in four numbers separated by 'dot', i.e., periods. This address is unique for
each device.
For example, 66.94.29.13
The above example represents the IP address in which each group of numbers separated by
periods is called an Octet. Each number in an octet is in the range from 0-255. This address can
produce 4,294,967,296 possible unique addresses.
In today's computer network world, computers do not understand the IP addresses in the standard
numeric format as the computers understand the numbers in binary form only. The binary
number can be either 1 or 0. The IPv4 consists of four sets, and these sets represent the octet. The
bits in each octet represent a number.
Each bit in an octet can be either 1 or 0. If the bit the 1, then the number it represents will count,
and if the bit is 0, then the number it represents does not count.
Representation of 8 Bit Octet
To obtain 66, we put 1 under 64 and 2 as the sum of 64 and 2 is equal to 66 (64+2=66), and the
remaining bits will be zero, as shown above. Therefore, the binary bit version of 66 is 01000010.
Step 2: Now, we calculate the binary number of 94.
To obtain 94, we put 1 under 64, 16, 8, 4, and 2 as the sum of these numbers is equal to 94, and
the remaining bits will be zero. Therefore, the binary bit version of 94 is 01011110.
Step 3: The next number is 29.
To obtain 29, we put 1 under 16, 8, 4, and 1 as the sum of these numbers is equal to 29, and the
remaining bits will be zero. Therefore, the binary bit version of 29 is 00011101.
Step 4: The last number is 13.
To obtain 13, we put 1 under 8, 4, and 1 as the sum of these numbers is equal to 13, and the
remaining bits will be zero. Therefore, the binary bit version of 13 is 00001101.
Drawback of IPv4
Currently, the population of the world is 7.6 billion. Every user is having more than one device
connected with the internet, and private companies also rely on the internet. As we know that
IPv4 produces 4 billion addresses, which are not enough for each device connected to the
internet on a planet. Although the various techniques were invented, such as variable- length
mask, network address translation, port address translation, classes, inter-domain translation, to
conserve the bandwidth of IP address and slow down the depletion of an IP address. In these
techniques, public IP is converted into a private IP due to which the user having public IP can
also use the internet. But still, this was not so efficient, so it gave rise to the development of the
next generation of IP addresses, i.e., IPv6.
What is IPv6?
IPv4 produces 4 billion addresses, and the developers think that these addresses are enough, but
they were wrong. IPv6 is the next generation of IP addresses. The main difference between IPv4
and IPv6 is the address size of IP addresses. The IPv4 is a 32-bit address, whereas IPv6 is a 128-
bit hexadecimal address. IPv6 provides a large address space, and it contains a simple header as
compared to IPv4.
It provides transition strategies that convert IPv4 into IPv6, and these strategies are as follows:
Dual stacking: It allows us to have both the versions, i.e., IPv4 and IPv6, on the same device.
Tunneling: In this approach, all the users have IPv6 communicates with an IPv4 network to
reach IPv6.
Network Address Translation: The translation allows the communication between the hosts
having a different version of IP.
This hexadecimal address contains both numbers and alphabets. Due to the usage of both the
numbers and alphabets, IPv6 is capable of producing over 340 undecillion (3.4*1038) addresses.
IPv6 is a 128-bit hexadecimal address made up of 8 sets of 16 bits each, and these 8 sets are
separated by a colon. In IPv6, each hexadecimal character represents 4 bits. So, we need to
convert 4 bits to a hexadecimal number at a time
Address format
The address format of IPv4:
The above diagram shows the address format of IPv4 and IPv6. An IPv4 is a 32-bit decimal
address. It contains 4 octets or fields separated by 'dot', and each field is 8-bit in size. The
number that each field contains should be in the range of 0-255. Whereas an IPv6 is a 128-bit
hexadecimal address. It contains 8 fields separated by a colon, and each field is 16-bit in size.
Differences between IPv4 and IPv6
Ipv4 Ipv6
Classes IPv4 has 5 different classes of IP IPv6 does not contain classes
address that includes Class A, Class of IP addresses.
B, Class C, Class D, and Class E.
Packet flow It does not provide any mechanism It uses flow label field in the
identification for packet flow identification. header for the packet flow
identification.
Checksum field The checksum field is available in The checksum field is not
IPv4. available in IPv6.
Encryption and It does not provide encryption and It provides encryption and
Authentication authentication. authentication.
What is WiFi?
WiFi stands for Wireless Fidelity. It defines any network based on the 802.11 standards, allows
computers and devices with the required wireless capacity to communicate via radio waves with
other computers or devices. IEEE established the 802.11 network standards, which describe how
two wireless devices interact over the air.
WiFi is a small network where smartphones, computers or other networkable devices are
connected to each other wirelessly within a small range and share Internet using hotspots. WiFi
uses radio frequency waves for wireless high-speed Internet and network connections. The size
of a WiFi antenna is very small and can be put on small routers. WiFi can be used to connect
printers, computers, gaming consoles, mobile and so on.
WiFi specifies how to physically create a wireless network using approaches similar to the
Ethernet standard. WiFi is built into most of today's computers and mobile devices, such as
smartphones and handheld game consoles.
The WiFi standard is widely used in hotspots, which allow mobile users to connect to the
internet using their WiFi-enabled wireless computers and devices. WiFi is also used in many
homes and small companies to connect computers and devices wirelessly.
What is Bluetooth?
Bluetooth was created under the IEEE 802.15.1 standard, which is used for wireless
communication via radio transmissions. Bluetooth was first introduced in 1994 as a wireless
replacement for RS-232 connections.
Bluetooth connects a wide range of devices and establishes personal networks in the unlicensed
2.4 GHz spectrum. The device class determines the operating range. Many digital gadgets, such
as MP3 players, mobile and peripheral devices, and personal computers, use Bluetooth.
Unlike previous wireless technologies, Bluetooth provides high-level services such as file
pushing, voice transmission, and serial line emulation to its network and devices.
A scattered ad-hoc topology is the name given to the Bluetooth topology. It defines a Piconet, a
small cell that consists of a group of devices connected in an ad-hoc manner.
Bluetooth ensures data security and privacy when in use. It employs a 128-bit random number, a
device's 48-bit MAC address, and two keys: authentication (128 bits) and encryption (256 bits)
(8 to 128 bits). Non-secure, service level, and link-level are the three modes of operation.
Advantages of Using Bluetooth
Wireless − One of the advantages of Bluetooth is that it transmits data without the use of any
cables. You may send and receive files without having to worry about wires with this method.
Wireless Bluetooth technology is also used in a variety of different applications. Personal
security systems, finding devices, and health monitoring are examples of such uses.
Availability − Bluetooth is now a standard function on most gadgets, including smartphones and
tablets.
Usability − Because of its ease of use, Bluetooth can be used by even the most inexperienced
user. The Bluetooth pairing process is pretty simple. There is no need to install any software or
drivers.
Efficiency − Bluetooth is energy efficient which results in minimal power consumption. This is
usually due to the Bluetooth low-power signals.
Disadvantages of Using Bluetooth
Speed − Data transfer is relatively sluggish in all wireless methods. In the case of Bluetooth, this
is especially true. The transmission rate of Bluetooth 3.0 and Bluetooth 4.0 is 25 Mbps in
general.
Range − A Bluetooth connection has a maximum range of 100 meters. Bluetooth has a limited
range of communication (typically lower than a WiFi connection).
Safety and security − Even though Bluetooth has several security features, its security level is
significantly lower because it utilizes radio frequencies. Bluetooth allows hackers to obtain your
personal information quickly.
Reliability − Even though the majority of Bluetooth implementations follow the standard, there
are still worries about Bluetooth compatibility. This is due to a variety of factors, including
profiles, drivers, and versions.
Comparison between WiFi and Bluetooth
The following table highlights the major differences between WiFi and Bluetooth.
WiFi stands for Wireless Fidelity. Wi- Bluetooth is a wireless technology that is
Definition Fi is a technology that enables devices used to connect devices in short range.
to connect to the Internet wirelessly.
WiFi is more secure than Bluetooth. Bluetooth is less secure than other
Security
wireless technologies such as WiFi.
Number of Wi-Fi allows more devices and users Bluetooth restricts the number of devices
Users to communicate at the same time. that can connect at any given moment.
What is MQTT?
MQTT (Message Queuing Telemetry Transport) is a lightweight messaging protocol that was
developed by IBM and first released in 1999. It uses the pub/sub pattern and translates messages
between devices, servers, and applications.
The MQTT protocol was initially created in order to link sensors on oil pipelines with
communications satellites, with an emphasis on minimal battery loss and bandwidth
consumption.
Since its inception, MQTT has continued to undergo development, with version 5.0 arriving in
May 2018. Version 3.1.1 was submitted to the OASIS consortium in 2013 and accepted as an
ISO standard.
How Does MQTT Work?
MQTT architecture
The connected devices in the MQTT protocol are known as “clients,” which communicate with a
server referred to as the “broker.” The broker handles the task of data transmission between
clients.
Whenever a client (known as the “publisher”) wants to distribute information, it will publish to a
particular topic, the broker then sends this information to any clients that have subscribed to that
topic (known as “subscribers”).
The publisher does not need any data on the number or the locations of subscribers. In turn,
subscribers do not need any data about the publisher. Any client can be a publisher, subscriber,
or both. The clients are typically not aware of each other, only of the broker that serves as the
intermediary. This setup is popularly known as the “pub/sub model.”
Bottom of Form
MQTT messages
When a client wants to send data to the broker, this is known as a “publish.” When a client wants
to receive data from the broker, it will “subscribe” to a topic or topics. When a client subscribes
to a certain topic, it will receive all messages published on that topic going forward.
Along with the message itself, the publisher also sends a QoS (Quality of Service) level. This
level defines the guarantee of delivery for the message. These QoS levels are as follows:
At most once: When the message is published, the broker will only receive the message “at most
once.” This level should not be used for mission-critical information since it carries the risk that
the subscribers will not receive the message.
At least once: The publisher continues to resend the message until it receives an
acknowledgment from the broker regarding the particular message. In other words, it’s more
important that the message is received than it is to ensure it is only received once. This is
probably the most commonly used QoS level.
Exactly once: The publisher and broker work together to ensure the broker will receive and act
on a message exactly once. This requires some additional overhead in the form of a four-part
handshake. Although this is the safest QoS level, it is also the slowest and therefore only used
when necessary.
How Does MQTT Work in IoT Projects?
In this section, we’ll discuss how you can use MQTT in an IoT project, using one of our recent
clients as an example.
An automotive battery company wanted to offer “fresher” batteries to sell to its customers
nationwide. This meant implementing a “first in, first out” strategy so that batteries wouldn’t sit
on the shelf for too long.
Of course, this required the company to track the dates of arrival of the stock on their shelves. In
need of a trusted IoT partner, the company reached out to Very.
Very helped install IoT sensors on the company’s batteries and on their shelves. These sensors
transmit information via MQTT to Amazon Web Services (AWS) in the cloud. Each battery has
a signal-emitting device that sends a Bluetooth signal to convey its presence on the rack. In
addition, a single battery-powered hub wakes up once per day in order to transmit information to
AWS using MQTT (as well as the TLS protocol for secure transmission).
Websocket APIs enable bi-directional and duplex communication between customers and
servers.
Unlike REST, there is no need to set up a connection every now and then to send
messages between a client and a server.
It works on the principle of the exclusive pair model. Can you recall it? Yes. Once a
connection is set up, there is a constant exchange of messages between the client and the
server. All we need is to establish a dedicated connection to start the process. the
communication goes on unless the connection is terminated.
It is a stateful type.
Due to one time dedicated connection setup, there is less overhead, lower traffic and less
latency and high throughput.
So Web socket is the most suitable IoT Communication APIs for IoT System.
INTERNET OF THINGS (IOT) ENABLING TECHNOLOGIES
IoT(internet of things) enabling technologies are
Wireless Sensor Network
Cloud Computing
Big Data Analytics
Communications Protocols
Embedded System
1. Wireless Sensor Network(WSN) :A WSN comprises distributed devices with sensors
which are used to monitor the environmental and physical conditions. A wireless sensor
network consists of end nodes, routers and coordinators. End nodes have several sensors
attached to them where the data is passed to a coordinator with the help of routers. The
coordinator also acts as the gateway that connects WSN to the internet.
Example –
Weather monitoring system
Indoor air quality monitoring system
Soil moisture monitoring system
Surveillance system
Health monitoring system
2. Cloud Computing :It provides us the means by which we can access applications as
utilities over the internet. Cloud means something which is present in remote locations.
With Cloud computing, users can access any resources from anywhere like databases,
webservers, storage, any device, and any software over the internet.
Characteristics
Broad network access
On demand self-services
Rapid scalability
Measured service
Pay-per-use
Provides different services, such as –IaaS (Infrastructure as a service)
Infrastructure as a service provides online services such as physical machines, virtual
machines, servers, networking, storage and data center space on a pay per use basis.
Major IaaS providers are Google Compute Engine, Amazon Web Services and
Microsoft Azure etc.Ex : Web Hosting, Virtual Machine etc.
PaaS (Platform as a service)Provides a cloud-based environment with a very thing required to
support the complete life cycle of building and delivering West web based (cloud)
applications – without the cost and complexity of buying and managing underlying hardware,
software provisioning and hosting. Computing platforms such as hardware, operating systems
and libraries etc. Basically, it provides a platform to develop applications.
Ex : App Cloud, Google app engine
SaaS (Software as a service)It is a way of delivering applications over the internet as a
service. Instead of installing and maintaining software, you simply access it via the internet,
freeing yourself from complex software and hardware management.
SaaS Applications are sometimes called web-based software on demand software or hosted
software.
SaaS applications run on a SaaS provider’s service and they manage security availability and
performance.
Ex : Google Docs, Gmail, office etc.
3. Big Data Analytics: It refers to the method of studying massive volumes of data or big
data. Collection of data whose volume, velocity or variety is simply too massive and tough to
store, control, process and examine the data using traditional databases.
Big data is gathered from a variety of sources including social network videos, digital images,
sensors and sales transaction records.
Several steps involved in analyzing big data –
Data cleaning
Munging
Processing
Visualization
Examples –
Bank transactions
Data generated by IoT systems for location and tracking of vehicles
E-commerce and in Big-Basket
Health and fitness data generated by IoT system such as a fitness band
4. Communications Protocols: They are the backbone of IoT systems and enable network
connectivity and linking to applications. Communication protocols allow devices to exchange
data over the network. Multiple protocols often describe different aspects of a single
communication. A group of protocols designed to work together is known as a protocol suite;
when implemented in software they are a protocol stack.
They are used in
Data encoding
Addressing schemes
5. Embedded Systems: It is a combination of hardware and software used to perform special
tasks.
It includes microcontroller and microprocessor memory, networking units (Ethernet Wi-Fi
adapters), input output units (display keyword etc.) and storage devices (flash memory).
It collects the data and sends it to the internet. Embedded systems used in
Examples –
Digital camera
DVD player, music player
Industrial robots
Wireless Routers etc.
WIRELESS SENSOR NETWORK (WSN)
Wireless Sensor Network (WSN) is an infrastructure-less wireless network that is deployed in
a large number of wireless sensors in an ad-hoc manner that is used to monitor the system,
physical or environmental conditions.
Sensor nodes are used in WSN with the onboard processor that manages and monitors the
environment in a particular area. They are connected to the Base Station which acts as a
processing unit in the WSN System. Base Station in a WSN System is connected through the
Internet to share data.
WSN can be used for processing, analysis, storage, and mining of the data.
Applications of WSN:
Internet of Things (IOT)
Surveillance and Monitoring for security, threat detection
Environmental temperature, humidity, and air pressure
Noise Level of the surrounding
Medical applications like patient monitoring
Agriculture
Landslide Detection
Challenges of WSN:
Quality of Service
Security Issue
Energy Efficiency
Network Throughput
Performance
Ability to cope with node failure
Cross layer optimisation
Scalability to large scale of deployment
Components of WSN:
Sensors:
Sensors in WSN are used to capture the environmental variables and which is used for data
acquisition. Sensor signals are converted into electrical signals.
Radio Nodes: It is used to receive the data produced by the Sensors and sends it to the WLAN
access point. It consists of a microcontroller, transceiver, external memory, and power source.
WLAN Access Point: It receives the data which is sent by the Radio nodes wirelessly, generally
through the internet.
Evaluation Software: The data received by the WLAN Access Point is processed by a software
called as Evaluation Software for presenting the report to the users for further processing of the
data which can be used for processing, analysis, storage, and mining of the data.
Example: A node is monitoring a package using devices like an accelerometer and gyroscope.
These devices track vibration levels. controller service sends sensor data to the cloud in the rear
time using WebSocket APL. Data is stored in the cloud and visualized using a cloud-based
application. The analysis component triggers an alert if vibration levels cross a threshold.
IoT level 4
At this level, Multiple nodes collect information and store it in the cloud. Local and rent server
nodes are used to grant and receive information collected in the cloud from various devices.
Observer nodes can process information and use it for applications but not perform control
functions, This level is the best solution where data involvement is big, requirement analysis is
comprehensive and multiple nodes are required,
Example: Analysis is done on the cloud and the entire IoT system has monitored the cloud using
an application. Noise monitoring of an area requires various nodes to function independently of
each other. Each has its own controller service. Data is stored in a cloud database.
IoT level 5
In this level Nodes present locally are of two types end odes and coordinator nodes End nodes
collect data and perform sensing or actuation or both. Coordinator nodes collect data from end
nodes and send it to the cloud. Data is stored and analyzed in the cloud. This level is best for
WSN, where the data involved is big and the requirement analysis is comprehensive.
Example: A monitoring system has various components: end nodes collect various data from the
environment and send it to the coordinator node. The coordinator node acts as a gateway and
allows the data to be transferred to cloud storage using REST API. The controller service on the
coordinator node sends data to the cloud.
IoT Level-6
At this level, the application is also cloud-based and data is stored in the cloud-like of levels.
Multiple independent end nodes perform sensing and actuation and send d to the cloud. The
analytics components analyze the data and store the results in the cloud database. The results are
visualized with a cloud-based application. The centralized controller is aware of the status of all
the end nodes and sends control commands to the nodes.
Example: Weather monitoring consists of sensors that monitor different aspects of the system.
The end nodes send data to cloud storage. Analysis of components, applications, and storage
areas in the cloud. The centralized controller controls all nodes and provides inputs.
DOMAIN SPECIFIC IOT APPLICATIONS
IoT applications span a wide range of domains like:
Home Automation
Smart Cities
Environment
Energy systems
Retail
Logistics
Industry
Agriculture
Health
Home Automation
Smart Lighting
Smart lighting for home helps in saving the energy by adapting the lighting to the ambient
conditions. Energy can be saved by sensing human movements and their environment. Wireless
and Internet connected lights can be operated remotely using mobile or web application.
Smart Appliances
Smart appliances makes the management easier and also provide status information to the users
remotely. For example, a smart refrigerator can keep track of items and notify the user when a
item is low on stock. Examples of smart appliances are TVs, refrigerators, music systems,
washing machines, etc.
Intrusion Detection
Home intrusion detection systems use cameras and sensors to detect intrusions and for raising
alerts. Alerts can be sound, SMS or email sent to the user. An advanced system can even send an
image or a short video clip related to the intrusion event.
Smoke/Gas Detection
Smoke detectors installed at home can detect smoke and alert the users. Smoke detectors use
optical detection, ionization, or air sampling techniques to detect smoke. Gas detectors can detect
harmful gases like CO or LPG. These detectors can send alerts in the form of email, SMS, or
voice.
Smart Cities
Smart Parking
Smart parking makes the search for parking space easier and convenient for drivers. In smart
parking, sensors are used for each parking slot, to detect whether the slot is occupied or not. This
information is aggregated by local controllers and sent over the Internet to the database. Drivers
can use an application to know about empty parking slots.
Smart Lighting
Smart lighting systems for roads, parks, and buildings can help in saving energy. Smart lighting
allows lighting to be dynamically controlled and also adaptive to the ambient conditions. Smart
lights connected to the Internet can be controlled remotely to configure lighting intensity and
lighting schedule.
Smart Roads
Smart roads equipped with sensors can alert the users about poor driving conditions, traffic
congestion, and accidents. Information sensed from the roads can be sent via Internet to
applications or social media. This helps in reducing traffic jams.
Surveillance
Surveillance of infrastructure, public transport and events in cities is required to ensure safety
and security. City wide surveillance requires a large network of connected cameras. The video
feeds from the cameras can be aggregated in cloud-based storage. Video analytics applications
can be used to search for specific patterns in the collected feeds.
Emergency Response
IoT systems can be used to monitor buildings, gas and water pipelines, public transport and
power substations. These systems provides alerts and helps in mitigating disasters. Along with
cloud-based applications IoT systems helps to provide near real-time detection of adverse events.
Environment
Weather Monitoring
IoT-based weather monitoring systems use different sensors to gather data. That data is sent to
the cloud-based storage. The collected can be analyzed and visualized with applications. Weather
alerts can be subscribed by users from such applications.
IoT-based forest fire detection systems use number of nodes deployed at various locations in the
forest. Each monitoring node collects data about ambient conditions. This data will be collected
and analyzed for the presence of fire and corresponding people will be alerted.
Retail
Inventory Management
The inventory in a store or warehouse can be managed by using IoT. The products or
items in the store can be attached with RFID tags. By using the RFID tags, the RFID
reader or software can automatically show the number of items in the store or warehouse.
If a product goes out of stock a notification can be sent to the store owner automatically.
Smart Payments
Now-a-days new types of payments are coming into picture like QR codes, NFC, contact
less technologies etc. These technologies enables smart payments.
Smart Vending Machines
A smart vending machine contains several items. A consumer can insert money and get
the item they want as shown in the image below. Several sensors can be attached to these
vending machines such that whenever an item quantity is less, the owner of that machine
will be automatically notified so that the owner can be arrangements to get that item
beforehand.
Also, the vending machines can maintain the history of the consumers. So, when a consumer
visits the vending machine next day, it can suggest the same item that the consumer purchased
before.
Logistics
Route Generation and Scheduling
While delivering packages to various locations, different sensors can be fixed in those
routes and they can be monitored remotely through an application. By looking at the data
sent by the sensors, the delivery company can automatically know which routes are less
congested and schedule the delivery of packages in such routes.
Fleet Tracking
A delivery company will have several delivery personnel working with them. Different
people will use different vehicles for delivering the packages. Sensors can be fixed to
those vehicles and their location can be tracked to know how long will it take to deliver
the package.
Shipment Monitoring
The packages can be fixed with RFID tags or other form of remote tracking sensors to
send data periodically to a server via Internet. The delivery company can use that data to
track where the package is and update the user about the remaining time that will be
needed to deliver the package.
Remote Vehicle Diagnostics
A vehicle rental company can fix sensors into the vehicles before giving them for rent to
the customers. The company can check the data sent by the sensors to know the current
location of the vehicle and easily track them.
Agriculture
Smart Irrigation
Irrigation refers to the watering of plants. By using different sensors like temperature
sensor, humidity sensor, soil moisture sensor, etc., data can be collected about the soil
and the environment and let the framer know when to turn on the water sprinklers to
provide water to the plants. This process is illustrated in the figure given below.
Green House Control
A green house is an artificial field that can be grown inside buildings or on the roof tops.
It is a controlled environment in which several types of sensors are fixed to gather data
about the soil, environment and other parameters.
The data from the green house is aggregated at a local gateway and sent to the server via
Internet. The data at the server is analyzed and appropriate alerts are sent to the owner of
the green house. This process is illustrated in the figure below.
Industry
Machine Diagnosis & Prognosis
The machines used in the industry can be fixed with sensors. The data from the sensors
can be used to diagnose the machines. We can know if the machine is working up to the
expected performance or not. The data analysis will also let the owner of the machine
know when the life of machine will be over.
Indoor Air Quality Monitoring
The quality of air for the working personnel inside the industry is also important. Often
times leakage of dangerous gases leads to the death of industry personnel. Sensors can be
fixed at different location to monitor the working environment for any leakage of
hazardous gases and notify the appropriate personnel to deal with it.
Health & Lifestyle
Health and Fitness Monitoring
With the advent of IoT remote healthcare has become a viable option for attending to
patients. There is no need for patient to visit hospital for every minor health problem.
The doctor can attend to such patients from a remote location. Different sensors can be
fixed on near the patient to monitor the health vitals of that patient. The data sent by the
sensors is monitored by the doctor and appropriate decisions are made.
Wearable Electronics
Now-a-days there are different types of wearables available in the market to monitor
health and lifestyles. Some examples of such wearables are smart watches, smart glasses,
smart patches, smart garments, etc., as shown in the below figure.
https://www.startertutorials.com/blog/domain-specific-iot-applications.html
FOR FURTHER REFERENCE