0% found this document useful (0 votes)
3 views55 pages

unit-1

The document provides an overview of the Internet of Things (IoT), defining it as the interconnection of devices that can send and receive data, with applications across various sectors such as agriculture, healthcare, and smart cities. It outlines key characteristics of IoT, including connectivity, intelligence, scalability, and safety, while also discussing the roles of sensors and actuators in IoT systems. Additionally, it covers the physical design of IoT systems, including the types of devices, protocols for communication, and the importance of data processing and storage.
Copyright
© © All Rights Reserved
Available Formats
Download as DOC, PDF, TXT or read online on Scribd
Download as doc, pdf, or txt
0% found this document useful (0 votes)
3 views55 pages

unit-1

The document provides an overview of the Internet of Things (IoT), defining it as the interconnection of devices that can send and receive data, with applications across various sectors such as agriculture, healthcare, and smart cities. It outlines key characteristics of IoT, including connectivity, intelligence, scalability, and safety, while also discussing the roles of sensors and actuators in IoT systems. Additionally, it covers the physical design of IoT systems, including the types of devices, protocols for communication, and the importance of data processing and storage.
Copyright
© © All Rights Reserved
Available Formats
Download as DOC, PDF, TXT or read online on Scribd
Download as doc, pdf, or txt
Download as doc, pdf, or txt
You are on page 1/ 55

UNIT 1

INTERNET OF THINGS
INTERNET OF THINGS:
According to the definition of IoT, It is the way to interconnection with the help of the
internet devices that can be embedded to implement the functionality in everyday objects by
enabling them to send and receive data. Today data is everything and everywhere. Hence, IoT
can also be defined as the analysis of the data generates a meaning action, triggered
subsequently after the interchange of data. IoT can be used to build applications for
agriculture, assets tracking, energy sector, safety and security sector, defence, embedded
applications, education, waste management, healthcare product, telemedicine, smart city
applications, etc.
The term Internet of Things(IoT) has emerged over the past few years as one of the popular
“technology buzz” terms. In today’s technological world IoT figures prominently in
technology discussions due to its rapid growth. There are multiple ways to define IoT.

CHARACTERISTICS OF THE INTERNET OF THINGS :


There are the following characteristics of IoT as follows. Let’s discuss it one by one.
Connectivity –Connectivity is an important requirement of the IoT infrastructure. Things of
IoT should be connected to the IoT infrastructure. Anyone, anywhere, anytime can connect,
this should be guaranteed at all times. For example, connection between people through
internet devices like mobile phones ,and other gadgets, also connection between Internet
devices such as routers, gateways, sensors, etc.
Intelligence and Identity – The extraction of knowledge from the generated data is very
important. For example, a sensor generates data, but that data will only be useful if it is
interpreted properly. Each IoT device has a unique identity. This identification is helpful in
tracking the equipment and at times for querying its status.
Scalability – The number of elements connected to the IoT zone is increasing day by day.
Hence, an IoT setup should be capable of handling the massive expansion. The data generated
as an outcome is enormous, and it should be handled appropriately.
Dynamic and Self-Adapting (Complexity) –IoT devices should dynamically adapt
themselves to the changing contexts and scenarios. Assume a camera meant for the
surveillance. It should be adaptable to work in different conditions and different light
situations (morning, afternoon, night).

Architecture – IoT architecture cannot be homogeneous in nature. It should be hybrid,


supporting different manufacturers ‘ products to function in the IoT network. IoT is not
owned by anyone engineering branch. IoT is a reality when multiple domains come together.

Safety –There is a danger of the sensitive personal details of the users getting compromised
when all his/her devices are connected to the internet. This can cause a loss to the user.
Hence, data security is the major challenge. Besides, the equipment involved is huge. IoT
networks may also be at the risk. Therefore, equipment safety is also critical.

Self Configuring – This is one of the most important characteristics of IoT. IoT devices are
able to upgrade their software in accordance with requirements with a minimum of user
participation. Additionally, they can set up the network, allowing for the addition of new
devices to an already-existing network.

SENSORS IN INTERNET OF THINGS(IOT)


Generally, sensors are used in the architecture of IOT devices.
Sensors are used for sensing things and devices etc. A device that provides a usable output in
response to a specified measurement. The sensor attains a physical parameter and converts it
into a signal suitable for processing (e.g. electrical, mechanical, optical) the characteristics of
any device or material to detect the presence of a particular physical quantity. The output of
the sensor is a signal which is converted to a human-readable form like changes in
characteristics, changes in resistance, capacitance, impedance etc.
IOT HARDWARE
Transducer :
A transducer converts a signal from one physical structure to another.
It converts one type of energy into another type.
It might be used as actuators in various systems.
Sensors characteristics :Static Dynamic
1. Static characteristics :
It is about how the output of a sensor changes in response to an input change after steady state
condition.
Accuracy – Accuracy is the capability of measuring instruments to give a result close to the
true value of the measured quantity. It measures errors. It is measured by absolute and relative
errors. Express the correctness of the output compared to a higher prior system. Absolute error
= Measured value –True value
Relative error = Measured value/True value
Range –Gives the highest and the lowest value of the physical quantity within which the
sensor can actually sense. Beyond these values, there is no sense or no kind of response.
e.g. RTD for measurement of temperature has a range of -200`c to 800`c.
Resolution –Resolution is an important specification towards selection of sensors. The higher
the resolution, better the precision. When the accretion is zero to, it is called threshold.
Provide the smallest changes in the input that a sensor is able to sense.
Precision –It is the capacity of a measuring instrument to give the same reading when
repetitively measuring the same quantity under the same prescribed conditions.
It implies agreement between successive readings, NOT closeness to the true value.
It is related to the variance of a set of measurements.
It is a necessary but not sufficient condition for accuracy.
Sensitivity –Sensitivity indicates the ratio of incremental change in the response of the system
with respect to incremental change in input parameters. It can be found from the slope of the
output characteristics curve of a sensor. It is the smallest amount of difference in quantity that
will change the instrument’s reading.
Linearity –The deviation of the sensor value curve from a particular straight line. Linearity is
determined by the calibration curve. The static calibration curve plots the output amplitude
versus the input amplitude under static conditions.
A curve’s slope resemblance to a straight line describes the linearity.
Drift –The difference in the measurement of the sensor from a specific reading when kept at
that value for a long period of time.
Repeatability –The deviation between measurements in a sequence under the same
conditions. The measurements have to be made under a short enough time duration so as not
to allow significant long-term drift.
Dynamic Characteristics :Properties of the systems
Zero-order system –The output shows a response to the input signal with no delay. It does
not include energy-storing elements.

Ex. potentiometer measure, linear and rotary displacements.


First-order system –When the output approaches its final value gradually.
Consists of an energy storage and dissipation element.
Second-order system –Complex output response. The output response of the sensor oscillates
before steady state.
Sensor Classification :
Passive & Active
Analog & digital
Scalar & vector
Passive Sensor –Can not independently sense the input. Ex- Accelerometer, soil moisture,
water level and temperature sensors.
Active Sensor – Independently sense the input. Example- Radar, sounder and laser altimeter
sensors.
Analog Sensor – The response or output of the sensor is some continuous function of its input
parameter. Ex- Temperature sensor, LDR, analog pressure sensor and analog hall effect.
Digital sensor –Response in binary nature. Design to overcome the disadvantages of analog
sensors. Along with the analog sensor, it also comprises extra electronics for bit conversion.
Example – Passive infrared (PIR) sensor and digital temperature sensor (DS1620).
Scalar sensor –Detects the input parameter only based on its magnitude. The answer for the
sensor is a function of magnitude of some input parameter. Not affected by the direction of
input parameters. Example – temperature, gas, strain, color and smoke sensor.
Vector sensor –The response of the sensor depends on the magnitude of the direction and
orientation of input parameter. Example – Accelerometer, gyroscope, magnetic field and
motion detector sensors.

ACTUATORS IN IOT
An IoT device is made up of a Physical object (“thing”) + Controller (“brain”) + Sensors +
Actuators + Networks (Internet). An actuator is a machine component or system that moves or
controls the mechanism or the system. Sensors in the device sense the environment, then
control signals are generated for the actuators according to the actions needed to perform.
A servo motor is an example of an actuator. They are linear or rotatory actuators, can move to
a given specified angular or linear position. We can use servo motors for IoT applications and
make the motor rotate to 90 degrees, 180 degrees, etc., as per our need.

The following diagram shows what actuators do, the controller directs the actuator based on
the sensor data to do the
work.

Working of IoT devices and use of Actuators


The control system acts upon an environment through the actuator. It requires a source of
energy and a control signal. When it receives a control signal, it converts the source of energy
to a mechanical operation. On this basis, on which form of energy it uses, it has different
types given below.
Types of Actuators:
1. Hydraulic Actuators –A hydraulic actuator uses hydraulic power to perform a mechanical
operation. They are actuated by a cylinder or fluid motor. The mechanical motion is converted
to rotary, linear, or oscillatory motion, according to the need of the IoT device. Ex-
construction equipment uses hydraulic actuators because hydraulic actuators can generate a
large amount of force.
Advantages:
 Hydraulic actuators can produce a large magnitude of force and high speed.
 Used in welding, clamping, etc.
 Used for lowering or raising the vehicles in car transport carriers.
Disadvantages :
 Hydraulic fluid leaks can cause efficiency loss and issues of cleaning.
 It is expensive.
 It requires noise reduction equipment, heat exchangers, and high maintenance systems.
2. Pneumatic Actuators –
A pneumatic actuator uses energy formed by vacuum or compressed air at high pressure to
convert into either linear or rotary motion. Example- Used in robotics, use sensors that work
like human fingers by using compressed air.

Advantages :
 They are a low-cost option and are used at extreme temperatures where using air is a
safer option than chemicals.
 They need low maintenance, are durable, and have a long operational life.
 It is very quick in starting and stopping the motion.
Disadvantages :
 Loss of pressure can make it less efficient.
 The air compressor should be running continuously.
 Air can be polluted, and it needs maintenance.
3. Electrical Actuators –
An electric actuator uses electrical energy, is usually actuated by a motor that converts
electrical energy into mechanical torque. An example of an electric actuator is a solenoid
based electric bell.
Advantages :
 It has many applications in various industries as it can automate industrial valves.
 It produces less noise and is safe to use since there are no fluid leakages.
 It can be re-programmed and it provides the highest control precision positioning.
Disadvantages :
 It is expensive.
 It depends a lot on environmental conditions.
Other actuators are –
Thermal/Magnetic Actuators – These are actuated by thermal or mechanical energy. Shape
Memory Alloys (SMAs) or Magnetic Shape‐Memory Alloys (MSMAs) are used by these
actuators. An example of a thermal/magnetic actuator can be a piezo motor using SMA.
Mechanical Actuators – A mechanical actuator executes movement by converting rotary
motion into linear motion. It involves pulleys, chains, gears, rails, and other devices to
operate.
Example
 A crankshaft.
 Soft Actuators
 Shape Memory Polymers
 Light Activated Polymers
With the expanding world of IoT, sensors and actuators will find more usage in commercial
and domestic applications along with the pre-existing use in industry.

Physical Design of Internet of Things (IOT)


The physical design of an IoT system is referred to as the Things/Devices and protocols that are
used to build an IoT system. all these things/Devices are called Node Devices and every device
has a unique identity that performs remote sensing, actuating and monitoring work. and the
protocols that are used to establish communication between the Node devices and servers over
the internet.
PHYSICAL DESIGN OF IOT

Things/Devices
Things/Devices are used to build a connection, process data, provide interfaces, provide storage,
and provide graphics interfaces in an IoT system. all these generate data in a form that can be
analyzed by an analytical system and program to perform operations and used to improve the
system.
for example, temperature sensor that is used to analyze the temperature generates the data from a
location and is then determined by algorithms.
 Connectivity
Devices like USB hosts and ETHERNET are used for connectivity between the devices and the
server.
 Processor
A processor like a CPU and other units are used to process the data. these data are further used to
improve the decision quality of an IoT system.
 Audio/Video Interfaces
An interface like HDMI and RCA devices is used to record audio and videos in a system.
 Input/Output interface
To give input and output signals to sensors, and actuators we use things like UART, SPI, CAN,
etc.
 Storage Interfaces
Things like SD, MMC, and SDIO are used to store the data generated from an IoT device.
Other things like DDR and GPU are used to control the activity of an IoT system.
IoT Protocols
These protocols are used to establish communication between a node device and a server over
the internet. it helps to send commands to an IoT device and receive data from an IoT device
over the internet. we use different types of protocols that are present on both the server and
client-side and these protocols are managed by network layers like application, transport,
network, and link layer.

Application Layer protocol

In this layer, protocols define how the data can be sent over the network with the lower layer
protocols using the application interface. these protocols include HTTP, WebSocket, XMPP,
MQTT, DDS, and AMQP protocols.
HTTP
Hypertext transfer protocol is a protocol that presents in an application layer for transmitting
media documents. it is used to communicate between web browsers and servers. it makes a
request to a server and then waits till it receives a response and in between the request server
does not keep any data between two requests.
WebSocket
This protocol enables two-way communication between a client and a host that can be run on an
untrusted code in a controlled environment. this protocol is commonly used by web browsers.
MQTT
It is a machine-to-machine connectivity protocol that was designed as a publish/subscribe
messaging transport. and it is used for remote locations where a small code footprint is required.
Transport Layer
This layer is used to control the flow of data segments and handle the error control. also, these
layer protocols provide end-to-end message transfer capability independent of the underlying
network.
CP
The transmission control protocol is a protocol that defines how to establish and maintain a
network that can exchange data in a proper manner using the internet protocol.
UDP
a user datagram protocol is a part of an internet protocol called the connectionless protocol. this
protocol is not required to establish the connection to transfer data.
Network Layer
This layer is used to send datagrams from the source network to the destination network. we use
IPv4 and IPv6 protocols as host identification that transfers data in packets.
IPv4
This is a protocol address that is a unique and numerical label assigned to each device connected
to the network. an IP address performs two main functions host and location addressing. IPv4 is
an IP address that is 32-bit long.
IPv6
It is a successor of IPv4 that uses 128 bits for an IP address. it is developed by the IETF task
force to deal with long-anticipated problems.
Link Layer
Link-layer protocols are used to send data over the network's physical layer. it also determines
how the packets are coded and signaled by the devices.
Ethernet
It is a set of technologies and protocols that are used primarily in LANs. it defines the physical
layer and the medium access control for wired ethernet networks.
WiFi
It is a set of LAN protocols and specifies the set of media access control and physical layer
protocols for implementing wireless local area networks.
SOME IOT PROTOCOLS
What is 6LoWPAN?
6LoWPAN is an IPv6 protocol, and It’s extended from is IPv6 over Low Power Personal Area
Network. As the name itself explains the meaning of this protocol is that this protocol works
on Wireless Personal Area Network i.e., WPAN.
WPAN is a Personal Area Network (PAN) where the interconnected devices are centered
around a person’s workspace and connected through a wireless medium. You can read more
about WPAN at WPAN. 6LoWPAN allows communication using the IPv6 protocol. IPv6 is
Internet Protocol Version 6 is a network layer protocol that allows communication to take
place over the network. It is faster and more reliable and provides a large number of
addresses.
6LoWPAN initially came into existence to overcome the conventional methodologies that
were adapted to transmit information. But still, it is not so efficient as it only allows for the
smaller devices with very limited processing ability to establish communication using one of
the Internet Protocols, i.e., IPv6. It has very low cost, short-range, low memory usage, and
low bit rate.
It comprises an Edge Router and Sensor Nodes. Even the smallest of the IoT devices can now
be part of the network, and the information can be transmitted to the outside world as well.
For example, LED Streetlights.
It is a technology that makes the individual nodes IP enabled.
6LoWPAN can interact with 802.15.4 devices and also other types of devices on an IP
Network. For example, Wi-Fi.
It uses AES 128 link layer security, which AES is a block cipher having key size of
128/192/256 bits and encrypts data in blocks of 128 bits each. This is defined in IEEE
802.15.4 and provides link authentication and encryption.

Basic Requirements of 6LoWPAN:


 The device should be having sleep mode in order to support the battery saving.
 Minimal memory requirement.
 Routing overhead should be lowered.

Features of 6LoWPAN:
 It is used with IEEE 802.15,.4 in the 2.4 GHz band.
 Outdoor range: ~200 m (maximum)
 Data rate: 200kbps (maximum)
 Maximum number of nodes: ~100
Advantages of 6LoWPAN:
 6LoWPAN is a mesh network that is robust, scalable, and can heal on its own.
 It delivers low-cost and secure communication in IoT devices.
 It uses IPv6 protocol and so it can be directly routed to cloud platforms.
 It offers one-to-many and many-to-one routing.
 In the network, leaf nodes can be in sleep mode for a longer duration of time.
Disadvantages of 6LoWPAN:
 It is comparatively less secure than Zigbee.
 It has lesser immunity to interference than that Wi-Fi and Bluetooth.
 Without the mesh topology, it supports a short range.
Applications of 6LoWPAN:
 It is a wireless sensor network.
 It is used in home-automation,
 It is used in smart agricultural techniques, and industrial monitoring.

Security and Interoperability with 6LoWPAN:


Security: 6LoWPAN security is ensured by the AES algorithm, which is a link layer security,
and the transport layer security mechanisms are included as well.
Interoperability: 6LoWPAN is able to operate with other wireless devices as well which
makes it interoperable in a network.

IPv4 vs IPv6
What is IP?
An IP stands for internet protocol. An IP address is assigned to each device connected to a
network. Each device uses an IP address for communication. It also behaves as an identifier as
this address is used to identify the device on a network. It defines the technical format of the
packets. Mainly, both the networks, i.e., IP and TCP, are combined together, so together, they are
referred to as a TCP/IP. It creates a virtual connection between the source and the destination.
We can also define an IP address as a numeric address assigned to each device on a network. An
IP address is assigned to each device so that the device on a network can be identified uniquely.
To facilitate the routing of packets, TCP/IP protocol uses a 32-bit logical address known as
IPv4(Internet Protocol version 4).
An IP address consists of two parts, i.e., the first one is a network address, and the other one is a
host address.
There are two types of IP addresses:
 IPv4
 IPv6
What is IPv4?
IPv4 is a version 4 of IP. It is a current version and the most commonly used IP address. It is a
32-bit address written in four numbers separated by 'dot', i.e., periods. This address is unique for
each device.
For example, 66.94.29.13
The above example represents the IP address in which each group of numbers separated by
periods is called an Octet. Each number in an octet is in the range from 0-255. This address can
produce 4,294,967,296 possible unique addresses.
In today's computer network world, computers do not understand the IP addresses in the standard
numeric format as the computers understand the numbers in binary form only. The binary
number can be either 1 or 0. The IPv4 consists of four sets, and these sets represent the octet. The
bits in each octet represent a number.
Each bit in an octet can be either 1 or 0. If the bit the 1, then the number it represents will count,
and if the bit is 0, then the number it represents does not count.
Representation of 8 Bit Octet

The above representation shows the structure of 8- bit octet.


Now, we will see how to obtain the binary representation of the above IP address, i.e.,
66.94.29.13
Step 1: First, we find the binary number of 66.

To obtain 66, we put 1 under 64 and 2 as the sum of 64 and 2 is equal to 66 (64+2=66), and the
remaining bits will be zero, as shown above. Therefore, the binary bit version of 66 is 01000010.
Step 2: Now, we calculate the binary number of 94.
To obtain 94, we put 1 under 64, 16, 8, 4, and 2 as the sum of these numbers is equal to 94, and
the remaining bits will be zero. Therefore, the binary bit version of 94 is 01011110.
Step 3: The next number is 29.

To obtain 29, we put 1 under 16, 8, 4, and 1 as the sum of these numbers is equal to 29, and the
remaining bits will be zero. Therefore, the binary bit version of 29 is 00011101.
Step 4: The last number is 13.

To obtain 13, we put 1 under 8, 4, and 1 as the sum of these numbers is equal to 13, and the
remaining bits will be zero. Therefore, the binary bit version of 13 is 00001101.
Drawback of IPv4
Currently, the population of the world is 7.6 billion. Every user is having more than one device
connected with the internet, and private companies also rely on the internet. As we know that
IPv4 produces 4 billion addresses, which are not enough for each device connected to the
internet on a planet. Although the various techniques were invented, such as variable- length
mask, network address translation, port address translation, classes, inter-domain translation, to
conserve the bandwidth of IP address and slow down the depletion of an IP address. In these
techniques, public IP is converted into a private IP due to which the user having public IP can
also use the internet. But still, this was not so efficient, so it gave rise to the development of the
next generation of IP addresses, i.e., IPv6.

What is IPv6?
IPv4 produces 4 billion addresses, and the developers think that these addresses are enough, but
they were wrong. IPv6 is the next generation of IP addresses. The main difference between IPv4
and IPv6 is the address size of IP addresses. The IPv4 is a 32-bit address, whereas IPv6 is a 128-
bit hexadecimal address. IPv6 provides a large address space, and it contains a simple header as
compared to IPv4.
It provides transition strategies that convert IPv4 into IPv6, and these strategies are as follows:
Dual stacking: It allows us to have both the versions, i.e., IPv4 and IPv6, on the same device.
Tunneling: In this approach, all the users have IPv6 communicates with an IPv4 network to
reach IPv6.
Network Address Translation: The translation allows the communication between the hosts
having a different version of IP.
This hexadecimal address contains both numbers and alphabets. Due to the usage of both the
numbers and alphabets, IPv6 is capable of producing over 340 undecillion (3.4*1038) addresses.
IPv6 is a 128-bit hexadecimal address made up of 8 sets of 16 bits each, and these 8 sets are
separated by a colon. In IPv6, each hexadecimal character represents 4 bits. So, we need to
convert 4 bits to a hexadecimal number at a time
Address format
The address format of IPv4:

The address format of IPv6:

The above diagram shows the address format of IPv4 and IPv6. An IPv4 is a 32-bit decimal
address. It contains 4 octets or fields separated by 'dot', and each field is 8-bit in size. The
number that each field contains should be in the range of 0-255. Whereas an IPv6 is a 128-bit
hexadecimal address. It contains 8 fields separated by a colon, and each field is 16-bit in size.
Differences between IPv4 and IPv6
Ipv4 Ipv6

Address length IPv4 is a 32-bit address. IPv6 is a 128-bit address.

Fields IPv4 is a numeric address that IPv6 is an alphanumeric


consists of 4 fields which are address that consists of 8
separated by dot (.). fields, which are separated by
colon.

Classes IPv4 has 5 different classes of IP IPv6 does not contain classes
address that includes Class A, Class of IP addresses.
B, Class C, Class D, and Class E.

Number of IP IPv4 has a limited number of IP IPv6 has a large number of IP


address addresses. addresses.

VLSM It supports VLSM (Virtual Length It does not support VLSM.


Subnet Mask). Here, VLSM means
that Ipv4 converts IP addresses into
a subnet of different sizes.

Address It supports manual and DHCP It supports manual, DHCP,


configuration configuration. auto-configuration, and
renumbering.

Address space It generates 4 billion unique It generates 340 undecillion


addresses unique addresses.

End-to-end In IPv4, end-to-end connection In the case of IPv6, end-to-end


connection integrity is unachievable. connection integrity is
integrity achievable.
Security features In IPv4, security depends on the In IPv6, IPSEC is developed
application. This IP address is not for security purposes.
developed in keeping the security
feature in mind.

Address In IPv4, the IP address is In IPv6, the representation of


representation represented in decimal. the IP address in hexadecimal.

Fragmentation Fragmentation is done by the Fragmentation is done by the


senders and the forwarding routers. senders only.

Packet flow It does not provide any mechanism It uses flow label field in the
identification for packet flow identification. header for the packet flow
identification.

Checksum field The checksum field is available in The checksum field is not
IPv4. available in IPv6.

Transmission IPv4 is broadcasting. On the other hand, IPv6 is


scheme multicasting, which provides
efficient network operations.

Encryption and It does not provide encryption and It provides encryption and
Authentication authentication. authentication.

Number of octets It consists of 4 octets. It consists of 8 fields, and each


field contains 2 octets.
Therefore, the total number of
octets in IPv6 is 16.
Difference between WiFi and BlueTooth
Both WiFi and Bluetooth are wireless technologies that are widely used to send and receive data
wirelessly using radio signals. WiFi is for high-speed Internet access that connects nearby
devices with each other and share the Internet via hotspots, whereas Bluetooth is used for
connecting devices in short range.
Go through this article to find out more about the features of WiFi and Bluetooth and how they
are different from each other.

What is WiFi?
WiFi stands for Wireless Fidelity. It defines any network based on the 802.11 standards, allows
computers and devices with the required wireless capacity to communicate via radio waves with
other computers or devices. IEEE established the 802.11 network standards, which describe how
two wireless devices interact over the air.
WiFi is a small network where smartphones, computers or other networkable devices are
connected to each other wirelessly within a small range and share Internet using hotspots. WiFi
uses radio frequency waves for wireless high-speed Internet and network connections. The size
of a WiFi antenna is very small and can be put on small routers. WiFi can be used to connect
printers, computers, gaming consoles, mobile and so on.
WiFi specifies how to physically create a wireless network using approaches similar to the
Ethernet standard. WiFi is built into most of today's computers and mobile devices, such as
smartphones and handheld game consoles.
The WiFi standard is widely used in hotspots, which allow mobile users to connect to the
internet using their WiFi-enabled wireless computers and devices. WiFi is also used in many
homes and small companies to connect computers and devices wirelessly.

What is Bluetooth?
Bluetooth was created under the IEEE 802.15.1 standard, which is used for wireless
communication via radio transmissions. Bluetooth was first introduced in 1994 as a wireless
replacement for RS-232 connections.
Bluetooth connects a wide range of devices and establishes personal networks in the unlicensed
2.4 GHz spectrum. The device class determines the operating range. Many digital gadgets, such
as MP3 players, mobile and peripheral devices, and personal computers, use Bluetooth.
Unlike previous wireless technologies, Bluetooth provides high-level services such as file
pushing, voice transmission, and serial line emulation to its network and devices.
A scattered ad-hoc topology is the name given to the Bluetooth topology. It defines a Piconet, a
small cell that consists of a group of devices connected in an ad-hoc manner.
Bluetooth ensures data security and privacy when in use. It employs a 128-bit random number, a
device's 48-bit MAC address, and two keys: authentication (128 bits) and encryption (256 bits)
(8 to 128 bits). Non-secure, service level, and link-level are the three modes of operation.
Advantages of Using Bluetooth
Wireless − One of the advantages of Bluetooth is that it transmits data without the use of any
cables. You may send and receive files without having to worry about wires with this method.
Wireless Bluetooth technology is also used in a variety of different applications. Personal
security systems, finding devices, and health monitoring are examples of such uses.
Availability − Bluetooth is now a standard function on most gadgets, including smartphones and
tablets.
Usability − Because of its ease of use, Bluetooth can be used by even the most inexperienced
user. The Bluetooth pairing process is pretty simple. There is no need to install any software or
drivers.
Efficiency − Bluetooth is energy efficient which results in minimal power consumption. This is
usually due to the Bluetooth low-power signals.
Disadvantages of Using Bluetooth
Speed − Data transfer is relatively sluggish in all wireless methods. In the case of Bluetooth, this
is especially true. The transmission rate of Bluetooth 3.0 and Bluetooth 4.0 is 25 Mbps in
general.
Range − A Bluetooth connection has a maximum range of 100 meters. Bluetooth has a limited
range of communication (typically lower than a WiFi connection).
Safety and security − Even though Bluetooth has several security features, its security level is
significantly lower because it utilizes radio frequencies. Bluetooth allows hackers to obtain your
personal information quickly.
Reliability − Even though the majority of Bluetooth implementations follow the standard, there
are still worries about Bluetooth compatibility. This is due to a variety of factors, including
profiles, drivers, and versions.
Comparison between WiFi and Bluetooth
The following table highlights the major differences between WiFi and Bluetooth.

Key WiFi Bluetooth

WiFi stands for Wireless Fidelity. Wi- Bluetooth is a wireless technology that is
Definition Fi is a technology that enables devices used to connect devices in short range.
to connect to the Internet wirelessly.

WiFi requires wireless adaptor on all Bluetooth requires an Bluetooth adaptor


Component devices and Wireless Router for on all devices for connectivity.
connectivity.

WiFi consumes high power. Bluetooth is easier to use and consumes


Power less power than Wi-Fi because it only
Consumption requires an adapter on each connecting
device.

WiFi is more secure than Bluetooth. Bluetooth is less secure than other
Security
wireless technologies such as WiFi.

Number of Wi-Fi allows more devices and users Bluetooth restricts the number of devices
Users to communicate at the same time. that can connect at any given moment.

Bandwidth WiFi needs high bandwidth. Bluetooth has a low bandwidth.

WiFi coverage area is up to 32 meters. Bluetooth coverage area is about 10


Coverage
meters.
WiFi establishes a wireless network that allows computers and devices with the required wireless
capacity to communicate via radio waves. Bluetooth, on the other hand, is a wireless technology
that is used to connect devices in short range.

What is MQTT in IoT?


Internet of Things (IoT) and machine-to-machine (M2M) technologies need to use a messaging
and connectivity protocol in order to exchange information from a remote location.
A few desirable features of such a protocol are:
Small code footprint (to make it easy to implement in small devices)
Low power consumption
Low bandwidth consumption
Low latency
Use of a publish/subscribe (“pub/sub”) pattern
MQTT fulfills all of these requirements and has the momentum of the big public clouds—
Amazon Web Services, Microsoft Azure, and Google Cloud Platform—behind it. In this article,
we’ll explore why MQTT is the most popular choice of messaging protocol for IoT products.

What is MQTT?
MQTT (Message Queuing Telemetry Transport) is a lightweight messaging protocol that was
developed by IBM and first released in 1999. It uses the pub/sub pattern and translates messages
between devices, servers, and applications.
The MQTT protocol was initially created in order to link sensors on oil pipelines with
communications satellites, with an emphasis on minimal battery loss and bandwidth
consumption.
Since its inception, MQTT has continued to undergo development, with version 5.0 arriving in
May 2018. Version 3.1.1 was submitted to the OASIS consortium in 2013 and accepted as an
ISO standard.
How Does MQTT Work?
MQTT architecture
The connected devices in the MQTT protocol are known as “clients,” which communicate with a
server referred to as the “broker.” The broker handles the task of data transmission between
clients.
Whenever a client (known as the “publisher”) wants to distribute information, it will publish to a
particular topic, the broker then sends this information to any clients that have subscribed to that
topic (known as “subscribers”).
The publisher does not need any data on the number or the locations of subscribers. In turn,
subscribers do not need any data about the publisher. Any client can be a publisher, subscriber,
or both. The clients are typically not aware of each other, only of the broker that serves as the
intermediary. This setup is popularly known as the “pub/sub model.”
Bottom of Form
MQTT messages
When a client wants to send data to the broker, this is known as a “publish.” When a client wants
to receive data from the broker, it will “subscribe” to a topic or topics. When a client subscribes
to a certain topic, it will receive all messages published on that topic going forward.
Along with the message itself, the publisher also sends a QoS (Quality of Service) level. This
level defines the guarantee of delivery for the message. These QoS levels are as follows:
At most once: When the message is published, the broker will only receive the message “at most
once.” This level should not be used for mission-critical information since it carries the risk that
the subscribers will not receive the message.
At least once: The publisher continues to resend the message until it receives an
acknowledgment from the broker regarding the particular message. In other words, it’s more
important that the message is received than it is to ensure it is only received once. This is
probably the most commonly used QoS level.
Exactly once: The publisher and broker work together to ensure the broker will receive and act
on a message exactly once. This requires some additional overhead in the form of a four-part
handshake. Although this is the safest QoS level, it is also the slowest and therefore only used
when necessary.
How Does MQTT Work in IoT Projects?
In this section, we’ll discuss how you can use MQTT in an IoT project, using one of our recent
clients as an example.
An automotive battery company wanted to offer “fresher” batteries to sell to its customers
nationwide. This meant implementing a “first in, first out” strategy so that batteries wouldn’t sit
on the shelf for too long.
Of course, this required the company to track the dates of arrival of the stock on their shelves. In
need of a trusted IoT partner, the company reached out to Very.
Very helped install IoT sensors on the company’s batteries and on their shelves. These sensors
transmit information via MQTT to Amazon Web Services (AWS) in the cloud. Each battery has
a signal-emitting device that sends a Bluetooth signal to convey its presence on the rack. In
addition, a single battery-powered hub wakes up once per day in order to transmit information to
AWS using MQTT (as well as the TLS protocol for secure transmission).

The Benefits of MQTT


The benefits of MQTT include:
 Lightweight code footprint: Devices need only a few lines of code in order to get up
and running with the MQTT protocol.
 Minimized data packets: MQTT is very energy-efficient. This is great if a device is
battery-powered or has little CPU power.
 Speed: MQTT operates in real time, with no delays outside of QoS.
 Ease of implementation: MQTT already has libraries in programming languages such
as Elixir and Python.
 Last will and testament: If a client unexpectedly disconnects, you can set message
instructions to be sent to all subscribers in order to remedy the situation.
 Retained messages: Each topic can have one retained message that a client automatically
receives when it subscribes (like a pinned post on social media).
 Common Alternatives to MQTT
XMPP
 XMPP (Extensible Messaging and Presence Protocol) is a communications protocol
based on the XML language for storing and transporting data. It is frequently used to
power instant messaging services such as Jabber.
 Some of the differences between XMPP and MQTT are:
 The XMPP code footprint is slightly heavier, and you need an XML parser to encode and
decode information.
 XMPP does not have support for the pub/sub model by default (although it can with an
extension).
 XMPP takes up more bandwidth than MQTT.
 HTTP(S)
 HTTP (Hypertext Transfer Protocol) and its extension HTTPS (Hypertext Transfer
Protocol Secure) are communications protocols that are the foundation of the World
Wide Web. However, they are stateless and carry more overhead per transmission than
MQTT. In addition, HTTPS has a lower throughput than MQTT, meaning that you can’t
send as many messages in the same period of time.
 MQTT plays a crucial role in making IoT projects more “low-lift” in terms of technical
specifications while achieving the desired connections among devices, servers, and
applications.

COMMUNICATION MODELS IN IOT (INTERNET OF THINGS)


IoT devices are found everywhere and will enable circulatory intelligence in the future. For
operational perception, it is important and useful to understand how various IoT devices
communicate with each other. Communication models used in IoT have great value. The IoTs
allow people and things to be connected any time, any space, with anything and anyone, using
any network and any service.
Types of Communication Model:
1. Request & Response Model – This model follows a client-server architecture.
The client, when required, requests the information from the server. This request is usually in
the encoded format.
This model is stateless since the data between the requests is not retained and each request is
independently handled.
The server Categories the request, and fetches the data from the database and its resource
representation. This data is converted to response and is transferred in an encoded format to
the client. The client, in turn, receives the response.
On the other hand — In Request-Response communication model client sends a request to
the server and the server responds to the request. When the server receives the request it
decides how to respond, fetches the data retrieves resources, and prepares the response, and
sends it to the client.

2. Publisher-Subscriber Model –This model comprises three entities: Publishers, Brokers,


and Consumers.
Publishers are the source of data. It sends the data to the topic which are managed by the
broker. They are not aware of consumers.
Consumers subscribe to the topics which are managed by the broker.
Hence, Brokers responsibility is to accept data from publishers and send it to the appropriate
consumers. The broker only has the information regarding the consumer to which a particular
topic belongs to which the publisher is unaware of.
3. Push-Pull Model – The push-pull model constitutes data publishers, data consumers, and
data queues.
Publishers and Consumers are not aware of each other.
Publishers publish the message/data and push it into the queue. The consumers, present on the
other side, pull the data out of the queue. Thus, the queue acts as the buffer for the message
when the difference occurs in the rate of push or pull of data on the side of a publisher and
consumer.
Queues help in decoupling the messaging between the producer and consumer. Queues also
act as a buffer which helps in situations where there is a mismatch between the rate at which
the producers push the data and consumers pull the data.
4. Exclusive Pair –Exclusive Pair is the bi-directional model, including full-duplex
communication among client and server. The connection is constant and remains open till the
client sends a request to close the connection.
The Server has the record of all the connections which has been opened.
This is a state-full connection model and the server is aware of all open connections.
WebSocket based communication API is fully based on this model.

WHAT IS STATELESS AND STATEFUL PROTOCOLS?


1. Stateless Protocol
 It is a network model in which the client sends a request to the server and the server in
return sends a response back according to the current state just like the Request-Response
model.
 The server is not obliged to keep the session information or the status of each
communication partner for multiple requests.
 They are very easy to implement on the Internet.
 Stateless protocols work better when the crash occurs because no state needs to be
restored, a failed server can simply reboot after a crash.
 Examples:- HTTP (Hypertext Transfer Protocol), UDP (User Datagram
Protocol), DNS (Domain Name System).
2. Stateful Protocol
 In this protocol, suppose a client sends a request to the server and the server doesn't
respond, then the client resends a request to the server.
 Stateful protocols are logically heavy to implement on the Internet.
 Stateful Protocol does not work better at the time of the crash because stateful servers
must retain information about the state and session details of internal states.
 Examples:- FTP (File Transfer Protocol), Telnet.

IOT COMMUNICATION APIS


What are APIs?
An API is an interface used by programs to access an application.
It enables a program to send commands to another program and receive replies from the app.
IoT APIs are the interface points between an IoT device and the Internet and/or other network
components.
Here we will talk about the REST-based API and the Websocket based API.
REST-based APIs
 Representational state transfer (REST) is a set of architectural principles by which you
can design Web services the Web APIs that focus on the system's resources and how
resource states are addressed and transferred.
 URIs (example: - example.com/api/tasks) are used to depict resources in the RESTful
web service.
 Client tries to access these resources via URIs using commands like GET, PUT, POST,
DELETE and so on that are defined by HTTP.
 In response, the server responds with a JSON object or XML file.
 The REST APIs follow the request-response model.
The rest architectural constraints are as follows:
1) Client-server
Let me explain it to you by giving a suitable example. The client should not be concerned with
the storage of data which is a concern of the server, similarly, the server should not be concerned
about the user interface, which is the concern of the client. Separation makes it possible for the
client and server to be developed and updated independently.
2) Stateless
The status of the session remains entirely on the client.
1) Cache-able
This property defines whether the response to any request can be cached or not. If a
response can be cached, then a client cache is granted the right to reuse that response data
for subsequent matching requests.
2) Layered system
A layered system defines the boundaries of the components within each specific layer.
For example, A client is unable to tell whether it is connected to the end server or an
intermediate node. As simple as that!
3) Uniform interface
This specifies that the technique of communication between a client and a server must be
uniform throughout the communication period.
Code on Demand(Optional Constraint)
Servers may provide executable code or scripts for execution by clients in their context.
Websocket based APIs

 Websocket APIs enable bi-directional and duplex communication between customers and
servers.
 Unlike REST, there is no need to set up a connection every now and then to send
messages between a client and a server.
 It works on the principle of the exclusive pair model. Can you recall it? Yes. Once a
connection is set up, there is a constant exchange of messages between the client and the
server. All we need is to establish a dedicated connection to start the process. the
communication goes on unless the connection is terminated.
 It is a stateful type.
 Due to one time dedicated connection setup, there is less overhead, lower traffic and less
latency and high throughput.
 So Web socket is the most suitable IoT Communication APIs for IoT System.
INTERNET OF THINGS (IOT) ENABLING TECHNOLOGIES
IoT(internet of things) enabling technologies are
 Wireless Sensor Network
 Cloud Computing
 Big Data Analytics
 Communications Protocols
 Embedded System
1. Wireless Sensor Network(WSN) :A WSN comprises distributed devices with sensors
which are used to monitor the environmental and physical conditions. A wireless sensor
network consists of end nodes, routers and coordinators. End nodes have several sensors
attached to them where the data is passed to a coordinator with the help of routers. The
coordinator also acts as the gateway that connects WSN to the internet.
Example –
 Weather monitoring system
 Indoor air quality monitoring system
 Soil moisture monitoring system
 Surveillance system
 Health monitoring system
2. Cloud Computing :It provides us the means by which we can access applications as
utilities over the internet. Cloud means something which is present in remote locations.
With Cloud computing, users can access any resources from anywhere like databases,
webservers, storage, any device, and any software over the internet.
Characteristics
 Broad network access
 On demand self-services
 Rapid scalability
 Measured service
 Pay-per-use
 Provides different services, such as –IaaS (Infrastructure as a service)
Infrastructure as a service provides online services such as physical machines, virtual
machines, servers, networking, storage and data center space on a pay per use basis.
Major IaaS providers are Google Compute Engine, Amazon Web Services and
Microsoft Azure etc.Ex : Web Hosting, Virtual Machine etc.
PaaS (Platform as a service)Provides a cloud-based environment with a very thing required to
support the complete life cycle of building and delivering West web based (cloud)
applications – without the cost and complexity of buying and managing underlying hardware,
software provisioning and hosting. Computing platforms such as hardware, operating systems
and libraries etc. Basically, it provides a platform to develop applications.
Ex : App Cloud, Google app engine
SaaS (Software as a service)It is a way of delivering applications over the internet as a
service. Instead of installing and maintaining software, you simply access it via the internet,
freeing yourself from complex software and hardware management.
SaaS Applications are sometimes called web-based software on demand software or hosted
software.
SaaS applications run on a SaaS provider’s service and they manage security availability and
performance.
Ex : Google Docs, Gmail, office etc.
3. Big Data Analytics: It refers to the method of studying massive volumes of data or big
data. Collection of data whose volume, velocity or variety is simply too massive and tough to
store, control, process and examine the data using traditional databases.
Big data is gathered from a variety of sources including social network videos, digital images,
sensors and sales transaction records.
Several steps involved in analyzing big data –
 Data cleaning
 Munging
 Processing
 Visualization
 Examples –
 Bank transactions
 Data generated by IoT systems for location and tracking of vehicles
 E-commerce and in Big-Basket
 Health and fitness data generated by IoT system such as a fitness band
4. Communications Protocols: They are the backbone of IoT systems and enable network
connectivity and linking to applications. Communication protocols allow devices to exchange
data over the network. Multiple protocols often describe different aspects of a single
communication. A group of protocols designed to work together is known as a protocol suite;
when implemented in software they are a protocol stack.
They are used in

 Data encoding
 Addressing schemes
5. Embedded Systems: It is a combination of hardware and software used to perform special
tasks.
It includes microcontroller and microprocessor memory, networking units (Ethernet Wi-Fi
adapters), input output units (display keyword etc.) and storage devices (flash memory).
It collects the data and sends it to the internet. Embedded systems used in
Examples –
 Digital camera
 DVD player, music player
 Industrial robots
 Wireless Routers etc.
WIRELESS SENSOR NETWORK (WSN)
Wireless Sensor Network (WSN) is an infrastructure-less wireless network that is deployed in
a large number of wireless sensors in an ad-hoc manner that is used to monitor the system,
physical or environmental conditions.
Sensor nodes are used in WSN with the onboard processor that manages and monitors the
environment in a particular area. They are connected to the Base Station which acts as a
processing unit in the WSN System. Base Station in a WSN System is connected through the
Internet to share data.
WSN can be used for processing, analysis, storage, and mining of the data.

Applications of WSN:
 Internet of Things (IOT)
 Surveillance and Monitoring for security, threat detection
 Environmental temperature, humidity, and air pressure
 Noise Level of the surrounding
 Medical applications like patient monitoring
 Agriculture
 Landslide Detection
Challenges of WSN:
 Quality of Service
 Security Issue
 Energy Efficiency
 Network Throughput
 Performance
 Ability to cope with node failure
 Cross layer optimisation
 Scalability to large scale of deployment

Components of WSN:
Sensors:
Sensors in WSN are used to capture the environmental variables and which is used for data
acquisition. Sensor signals are converted into electrical signals.
Radio Nodes: It is used to receive the data produced by the Sensors and sends it to the WLAN
access point. It consists of a microcontroller, transceiver, external memory, and power source.
WLAN Access Point: It receives the data which is sent by the Radio nodes wirelessly, generally
through the internet.
Evaluation Software: The data received by the WLAN Access Point is processed by a software
called as Evaluation Software for presenting the report to the users for further processing of the
data which can be used for processing, analysis, storage, and mining of the data.

IOT AND CLOUD COMPUTING


One component that improves the success of the Internet of Things is Cloud Computing.
Cloud computing enables users to perform computing tasks using services provided over the
Internet. The use of the Internet of Things in conjunction with cloud technologies has become
a kind of catalyst: the Internet of Things and cloud computing are now related to each other.
These are true technologies of the future that will bring many benefits.
Due to the rapid growth of technology, the problem of storing, processing, and accessing large
amounts of data has arisen. Great innovation relates to the mutual use of the Internet of
Things and cloud technologies. In combination, it will be possible to use powerful processing
of sensory data streams and new monitoring services. As an example, sensor data can be
uploaded and saved using cloud computing for later use as intelligent monitoring and
activation using other devices. The goal is to transform data into insights and thus drive cost-
effective and productive action.
 Benefits And Functions of IoT Cloud:There are many benefits of combining these
services –
 IoT Cloud Computing provides many connectivity options, implying large network
access. People use a wide range of devices to gain access to cloud computing
resources: mobile devices, tablets, laptops. This is convenient for users but creates the
problem of the need for network access points.
 Developers can use IoT cloud computing on-demand. In other words, it is a web
service accessed without special permission or any help. The only requirement is
Internet access.
 Based on the request, users can scale the service according to their needs. Fast and
flexible means you can expand storage space, edit software settings, and work with the
number of users. Due to this characteristic, it is possible to provide deep computing
power and storage.
 Cloud Computing implies the pooling of resources. It influences increased
collaboration and builds close connections between users.
 As the number of IoT devices and automation in use grows, security concerns emerge.
Cloud solutions provide companies with reliable authentication and encryption
protocols.
 Finally, IoT cloud computing is convenient because you get exactly as much from the
service as you pay. This means that costs vary depending on use: the provider
measures your usage statistics. A growing network of objects with IP addresses is
needed to connect to the Internet and exchange data between the components of the
network.
 It is important to note that cloud architecture must be well-designed since reliability,
security, economy, and performance optimization depends upon it. Using well-
designed CI/CD pipelines, structured services, and sandboxed environments results in
a secure environment and agile development.
Comparison of Internet of Things and Cloud Computing: Cloud is a centralized system
helping to transfer and deliver data and files to data centers over the Internet. A variety of data
and programs are easy to access from a centralized cloud system.
The Internet of Things refers to devices connected to the Internet. In the IoT, data is stored in
real-time, as well as historical data. The IoT can analyze and instruct devices to make
effective decisions, as well as track how certain actions function.
Cloud computing encompasses the delivery of data-to-data centers over the Internet. IBM
divides cloud computing into six different categories:
Platform as a Service (PaaS) –The cloud contains everything you need to build and deliver
cloud applications so there is no need to maintain and buy equipment, software, etc.
Software as a Service (SaaS) –In this case, applications run in the cloud and other companies
operate devices that connect to users’ computers through a web browser.
Infrastructure as a Service (IaaS) – IaaS is an option providing companies with storage,
servers, networks and hubs processing data for each use.
Public cloud – Companies manage spaces and provide users with quick access through the
public network.
Private cloud – The same as a public cloud, but only one person has access here, which can
be an organization, an individual company, or a user.
Hybrid cloud – Based on a private cloud, but provides access to a public cloud.
Now, the Internet of Things refers to connecting devices to the Internet. Everyday devices
such as cars and household appliances may have an Internet connection, and with the
advancement of the Internet of Things, more and more devices will join this list.
Pairing with edge computing:Data processing at the network edge or edge computing is
used with IoT solutions and enables faster processing and response times. To get a better
understanding of how this works, consider a large factory with many implemented IoT
sensors. In this situation, it makes sense, before sending data to the cloud for processing, to
aggregate it close to the border to prevent cloud overload by reducing direct connections.
Data centers with this approach make data processing much faster. Yet, an approach that is
only based on the edge will never provide a complete view of business operations. If there is
no cloud solution, then the factory only controls each unit individually. Also, it has no way of
imagining how these units work in relation to each other. This is why only the combination of
the edge and the cloud will enable businesses to benefit from IoT developments.
The Role of Cloud Computing on the Internet of Things:Cloud computing works to
improve the efficiency of daily tasks in conjunction with the Internet of Things. Cloud
computing is about providing a path for data to reach its destination while the Internet of
Things generates a huge amount of data.
According to Amazon Web Services, there are four benefits of cloud computing:
No need to pre-guess infrastructure capacity needs
Saves money, because you only need to pay for those resources that you use, the larger the
scale, the more savings
In a few minutes, platforms can be deployed around the world
Flexibility and speed in providing resources to developers
Thus, the role of cloud computing in IoT is to work together to store IoT data, providing easy
access when needed. It’s important to note that cloud computing is an easy way to move large
data packets across the Internet generated by the IoT.
In, cloud computing in combination with the Internet of Things will make fundamental
changes to the life of mankind, particularly in how information is managed. The cloud is the
only technology that can analyze, store, and access the IoT depending on the deployment
model. Because of the nature of on-demand information, cloud computing with an Internet
connection is available on any device at any time. As hybrid cloud adoption grows, many
companies are realizing its benefits and the need to implement it. Cloud computing will
continue to open up new opportunities for the IoT for a long time to come.
The three main components of the cloud listed below will revolutionize the Internet of
Things:-
 Computing power
 Reliability
 Connectivity
EMBEDDED DEVICES (SYSTEM) IN (IOT)
It is essential to know about the embedded devices while learning the IoT or building the projects
on IoT. The embedded devices are the objects that build the unique computing system. These
systems may or may not connect to the Internet.
An embedded device system generally runs as a single application. However, these devices can
connect through the internet connection, and able communicate through other network devices.
Embedded System Hardware
The embedded system can be of type microcontroller or type microprocessor. Both of these types
contain an integrated circuit (IC).
The essential component of the embedded system is a RISC family microcontroller like
Motorola 68HC11, PIC 16F84, Atmel 8051 and many more. The most important factor that
differentiates these microcontrollers with the microprocessor like 8085 is their internal read and
writable memory. The essential embedded device components and system architecture are
specified below.
Embedded System Software
The embedded system that uses the devices for the operating system is based on the language
platform, mainly where the real-time operation would be performed. Manufacturers build
embedded software in electronics, e.g., cars, telephones, modems, appliances, etc. The embedded
system software can be as simple as lighting controls running using an 8-bit microcontroller. It
can also be complicated software for missiles, process control systems, airplanes etc.

IOT LEVELS- DEPLOYMENT TEMPLATES


Developing an IoT Level Template system consists of the following components:
 Device: These may be sensors or actuators capable of identifying, remote sensing, or
monitoring.
 Resources: These are software components on IoT devices for accessing and processing.
storing software components or controlling actuators connected to the device. Resources
also include software components that enable network access.
 Controller Service: It is a service that runs on the device and interacts with web
services. The controller service sends data from the device to the web service and
receives commands from the application via web services for controlling the device.
 Database: Stores data generated from the device
 Web Service: It provides a link between IoT devices, applications, databases, and
analysis components.
 Analysis Component: It performs an analysis of the data generated by the lol device and
generates results in a form which are easy for the user to understand.
 Application: It provides a system for the user to view the system status and view product
data. It also allows users to control and monitor various aspects of the IoT system.
IoT Levels
 IoT level 1
 IoT systems have a single device that performs sensing or actuation, stores a. analyses it
and hosts the application, IoT system-level-l is the best example for modeling low
complexity and low-cost solution where the analysis requirement is hok comprehensive
and data involved is not big.
 Example: We can understand with the help of an eg. let's look at the IoT device that
monitors the lights in a house. The lights are controlled through switches. The database
has maintained the status of each light and also REST services deployed locally allow
retrieving and updating the state of each light and trigger the switches accordingly. For
controlling the lights and applications, the application has an interface. The device is
connected to the internet and hence the application can be accessed remotely as well.
IoT level 2
A node performs sensing/actuation and local analysis. Data is stored in the cloud. this level is
facilitated where the data involved is big and primary analysis is not comprehensive
Example: Cloud-based application is used for monitoring and controlling the IoT system A
single node monitors the soil moisture in the field Which is sent to the database on the cloud
using REST APIS. The controller service continuously monitors moisture levels.
IoT level 3
At this level, the application is cloud-based. A single node monitors the environment and stores
data in the cloud. This is suitable where data is comprehensive and analysis 1 computationally
intensive.

Example: A node is monitoring a package using devices like an accelerometer and gyroscope.
These devices track vibration levels. controller service sends sensor data to the cloud in the rear
time using WebSocket APL. Data is stored in the cloud and visualized using a cloud-based
application. The analysis component triggers an alert if vibration levels cross a threshold.
IoT level 4
At this level, Multiple nodes collect information and store it in the cloud. Local and rent server
nodes are used to grant and receive information collected in the cloud from various devices.
Observer nodes can process information and use it for applications but not perform control
functions, This level is the best solution where data involvement is big, requirement analysis is
comprehensive and multiple nodes are required,

Example: Analysis is done on the cloud and the entire IoT system has monitored the cloud using
an application. Noise monitoring of an area requires various nodes to function independently of
each other. Each has its own controller service. Data is stored in a cloud database.
IoT level 5
In this level Nodes present locally are of two types end odes and coordinator nodes End nodes
collect data and perform sensing or actuation or both. Coordinator nodes collect data from end
nodes and send it to the cloud. Data is stored and analyzed in the cloud. This level is best for
WSN, where the data involved is big and the requirement analysis is comprehensive.

Example: A monitoring system has various components: end nodes collect various data from the
environment and send it to the coordinator node. The coordinator node acts as a gateway and
allows the data to be transferred to cloud storage using REST API. The controller service on the
coordinator node sends data to the cloud.
IoT Level-6
At this level, the application is also cloud-based and data is stored in the cloud-like of levels.
Multiple independent end nodes perform sensing and actuation and send d to the cloud. The
analytics components analyze the data and store the results in the cloud database. The results are
visualized with a cloud-based application. The centralized controller is aware of the status of all
the end nodes and sends control commands to the nodes.

Example: Weather monitoring consists of sensors that monitor different aspects of the system.
The end nodes send data to cloud storage. Analysis of components, applications, and storage
areas in the cloud. The centralized controller controls all nodes and provides inputs.
DOMAIN SPECIFIC IOT APPLICATIONS
IoT applications span a wide range of domains like:
 Home Automation
 Smart Cities
 Environment
 Energy systems
 Retail
 Logistics
 Industry
 Agriculture
 Health
Home Automation
Smart Lighting
Smart lighting for home helps in saving the energy by adapting the lighting to the ambient
conditions. Energy can be saved by sensing human movements and their environment. Wireless
and Internet connected lights can be operated remotely using mobile or web application.
Smart Appliances
Smart appliances makes the management easier and also provide status information to the users
remotely. For example, a smart refrigerator can keep track of items and notify the user when a
item is low on stock. Examples of smart appliances are TVs, refrigerators, music systems,
washing machines, etc.
Intrusion Detection
Home intrusion detection systems use cameras and sensors to detect intrusions and for raising
alerts. Alerts can be sound, SMS or email sent to the user. An advanced system can even send an
image or a short video clip related to the intrusion event.
Smoke/Gas Detection
Smoke detectors installed at home can detect smoke and alert the users. Smoke detectors use
optical detection, ionization, or air sampling techniques to detect smoke. Gas detectors can detect
harmful gases like CO or LPG. These detectors can send alerts in the form of email, SMS, or
voice.
Smart Cities
Smart Parking
Smart parking makes the search for parking space easier and convenient for drivers. In smart
parking, sensors are used for each parking slot, to detect whether the slot is occupied or not. This
information is aggregated by local controllers and sent over the Internet to the database. Drivers
can use an application to know about empty parking slots.
Smart Lighting
Smart lighting systems for roads, parks, and buildings can help in saving energy. Smart lighting
allows lighting to be dynamically controlled and also adaptive to the ambient conditions. Smart
lights connected to the Internet can be controlled remotely to configure lighting intensity and
lighting schedule.

Smart Roads
Smart roads equipped with sensors can alert the users about poor driving conditions, traffic
congestion, and accidents. Information sensed from the roads can be sent via Internet to
applications or social media. This helps in reducing traffic jams.

Structural Health Monitoring


A network of sensors are used to monitor the vibration levels in the structures. Data from the
sensors is analyzed to assess the health of the structures. By analyzing the data it is possible to
detect cracks, locate damages to the structures and also calculate the remaining life of the
structure.

Surveillance
Surveillance of infrastructure, public transport and events in cities is required to ensure safety
and security. City wide surveillance requires a large network of connected cameras. The video
feeds from the cameras can be aggregated in cloud-based storage. Video analytics applications
can be used to search for specific patterns in the collected feeds.

Emergency Response
IoT systems can be used to monitor buildings, gas and water pipelines, public transport and
power substations. These systems provides alerts and helps in mitigating disasters. Along with
cloud-based applications IoT systems helps to provide near real-time detection of adverse events.
Environment
Weather Monitoring

IoT-based weather monitoring systems use different sensors to gather data. That data is sent to
the cloud-based storage. The collected can be analyzed and visualized with applications. Weather
alerts can be subscribed by users from such applications.

Air Pollution Monitoring


IoT-based air pollution monitoring systems can monitor harmful gas emissions by factories and
vehicles using gaseous and meteorological sensors. The collected data can be analyzed to take
decisions on pollution control approaches.

Noise Pollution Monitoring


IoT-based noise pollution monitoring systems use a number of noise pollution monitoring
systems that are deployed at different places in the city. The data on noise levels from the
stations is collected on servers or in the cloud. The collected data can be analyzed to generate
noise maps.

Forest Fire Detection

IoT-based forest fire detection systems use number of nodes deployed at various locations in the
forest. Each monitoring node collects data about ambient conditions. This data will be collected
and analyzed for the presence of fire and corresponding people will be alerted.

River Floods Detection


IoT-based flood monitor systems use number of sensor nodes to monitor the water level. Data
from the sensors is aggregated on the server or in the cloud. Monitoring applications raise alerts
in case of rapid increase in water level or when rapid flow rate is detected.
Energy
 Smart Grids
Smart grid is a data communications network integrated with the electrical grid. Smart grid
technology provides predictive information and recommendations to utilities, their suppliers and
consumers, and how best to manage power. Smart meters can capture real-time power
consumption and allows to manage power distribution remotely.
 Renewable Energy Systems
Renewable energy sources (like solar and wind) produce variable output. Variable output
produces local voltage swings that can impact power quality. IoT-based systems integrated with
the transformers measures how much power is fed into the grid.
 Prognostics
Energy systems have a large number of critical components whose health is essential for working
correctly. IoT-based monitoring systems allows for the data to be gathered about these critical
components. Analysis of massive amounts of data gathered by sensors can provide predictions
for the impending failures.

Retail
 Inventory Management
The inventory in a store or warehouse can be managed by using IoT. The products or
items in the store can be attached with RFID tags. By using the RFID tags, the RFID
reader or software can automatically show the number of items in the store or warehouse.
If a product goes out of stock a notification can be sent to the store owner automatically.
 Smart Payments
Now-a-days new types of payments are coming into picture like QR codes, NFC, contact
less technologies etc. These technologies enables smart payments.
 Smart Vending Machines
A smart vending machine contains several items. A consumer can insert money and get
the item they want as shown in the image below. Several sensors can be attached to these
vending machines such that whenever an item quantity is less, the owner of that machine
will be automatically notified so that the owner can be arrangements to get that item
beforehand.
Also, the vending machines can maintain the history of the consumers. So, when a consumer
visits the vending machine next day, it can suggest the same item that the consumer purchased
before.
Logistics
 Route Generation and Scheduling
While delivering packages to various locations, different sensors can be fixed in those
routes and they can be monitored remotely through an application. By looking at the data
sent by the sensors, the delivery company can automatically know which routes are less
congested and schedule the delivery of packages in such routes.
 Fleet Tracking
A delivery company will have several delivery personnel working with them. Different
people will use different vehicles for delivering the packages. Sensors can be fixed to
those vehicles and their location can be tracked to know how long will it take to deliver
the package.
 Shipment Monitoring
The packages can be fixed with RFID tags or other form of remote tracking sensors to
send data periodically to a server via Internet. The delivery company can use that data to
track where the package is and update the user about the remaining time that will be
needed to deliver the package.
 Remote Vehicle Diagnostics
A vehicle rental company can fix sensors into the vehicles before giving them for rent to
the customers. The company can check the data sent by the sensors to know the current
location of the vehicle and easily track them.
Agriculture
 Smart Irrigation
 Irrigation refers to the watering of plants. By using different sensors like temperature
sensor, humidity sensor, soil moisture sensor, etc., data can be collected about the soil
and the environment and let the framer know when to turn on the water sprinklers to
provide water to the plants. This process is illustrated in the figure given below.
 Green House Control
A green house is an artificial field that can be grown inside buildings or on the roof tops.
It is a controlled environment in which several types of sensors are fixed to gather data
about the soil, environment and other parameters.
 The data from the green house is aggregated at a local gateway and sent to the server via
Internet. The data at the server is analyzed and appropriate alerts are sent to the owner of
the green house. This process is illustrated in the figure below.
Industry
 Machine Diagnosis & Prognosis
The machines used in the industry can be fixed with sensors. The data from the sensors
can be used to diagnose the machines. We can know if the machine is working up to the
expected performance or not. The data analysis will also let the owner of the machine
know when the life of machine will be over.
 Indoor Air Quality Monitoring
The quality of air for the working personnel inside the industry is also important. Often
times leakage of dangerous gases leads to the death of industry personnel. Sensors can be
fixed at different location to monitor the working environment for any leakage of
hazardous gases and notify the appropriate personnel to deal with it.
 Health & Lifestyle
 Health and Fitness Monitoring
With the advent of IoT remote healthcare has become a viable option for attending to
patients. There is no need for patient to visit hospital for every minor health problem.
The doctor can attend to such patients from a remote location. Different sensors can be
fixed on near the patient to monitor the health vitals of that patient. The data sent by the
sensors is monitored by the doctor and appropriate decisions are made.
 Wearable Electronics
Now-a-days there are different types of wearables available in the market to monitor
health and lifestyles. Some examples of such wearables are smart watches, smart glasses,
smart patches, smart garments, etc., as shown in the below figure.
https://www.startertutorials.com/blog/domain-specific-iot-applications.html
FOR FURTHER REFERENCE

You might also like