Unit-I Introduction of Iot
Unit-I Introduction of Iot
INTRODUCTION OF IOT
IoT comprises things that have unique identities and are connected to internet. By 2020 there will be a total
of 50 billion devices /things connected to internet. IoT is not limited to just connecting things to the internet
but also allow things to communicate and exchange data.
Definition:
A dynamic global n/w infrastructure with self-configuring capabilities based on standard and interoperable
communication protocols where physical and virtual ― things‖ have identities, physical attributes
and virtual personalities and use intelligent interfaces, and are seamlessly integrated into information n/w,
often communicate data associated with users and their environments.
Characteristics:
1) Dynamic & Self-Adapting: IoT devices and systems may have the capability to dynamically adapt with the
changing contexts and take actions based on their operating conditions, user‘s context or sensed environment.
Eg: the surveillance system is adapting itself based on context and changing conditions.
2) Self-Configuring: allowing a large number of devices to work together to provide certainfunctionality.
3) Inter Operable Communication Protocols: support a number of interoperablecommunication protocols ans
can communicate with other devices and also with infrastructure.
4) Unique Identity: Each IoT device has a unique identity and a unique identifier (IPaddress).
5) Integrated into Information Network: that allow them to communicate and exchange data with other
devices and systems.
Applications of IoT:
1) Home
2) Cities
3) Environment
4) Energy
5) Retail
6) Logistics
7) Agriculture
8) Industry
9) Health & LifeStyle
Physical Design Of IoT
1) Things inIoT:
The things in IoT refers to IoT devices which have unique identities and perform remote sensing, actuating
and monitoring capabilities. IoT devices can exchange data with other connected devices applications. It
collects data from other devices and process data either locally orremotely.
An IoT device may consist of several interfaces for communication to other devices both wired and wireless.
These includes (i) I/O interfaces for sensors, (ii) Interfaces for internet connectivity (iii) memory and storage
interfaces and (iv) audio/video interfaces.
2) IoT Protocols:
a) Link Layer: Protocols determine how data is physically sent over the network‘s physical layer or medium.
Local network connect to which host is attached. Hosts on the same link exchange data packets over the link
layer using link layer protocols. Link layer determines how packets are coded and signaled by the h/w device
over the medium to which the host is attached.
Protocols:
802.3-Ethernet: IEEE802.3 is collection of wired Ethernet standards for the link layer.Eg: 802.3 uses co-
axial cable; 802.3i uses copper twisted pair connection; 802.3j uses fiber optic connection; 802.3ae uses
Ethernet over fiber.
802.11-WiFi: IEEE802.11 is a collection of wireless LAN (WLAN) communication standards including
extensive description of link layer. Eg: 802.11a operates in 5GHz band, 802.11b and 802.11g operates in
2.4GHz band, 802.11n operates in 2.4/5GHz band, 802.11ac operates in 5GHz band, 802.11ad operates in
60Ghzband.
802.16 - WiMax: IEEE802.16 is a collection of wireless broadband standards including exclusive description
of link layer. WiMax provide data rates from 1.5 Mb/s to 1 GB/s.
802.15.4-LR-WPAN: IEEE802.15.4 is a collection of standards for low rate wireless personal area network
(LR-WPAN). Basis for high level communication protocols such asZigBee. Provides data rate from 40kb/s
to250kb/s.
2G/3G/4G-Mobile Communication: Data rates from 9.6kb/s(2G) to up to100Mb/s(4G).
B) Network/Internet Layer: Responsible for sending IP datagrams from source n/w to destination n/w.
performs the host addressing and packet routing. Datagrams contains source and destinationaddress.
Protocols:
IPv4: Internet Protocol version4 is used to identify the devices on a n/w using ahierarchical addressing
scheme. 32 bit address. Allows total of 2**32addresses.
IPv6: Internet Protocol version6 uses 128 bit address scheme and allows 2**128addresses.
6LOWPAN:(IPv6overLowpowerWirelessPersonalAreaNetwork)operatesin
2.4 GHz frequency range and data transfer 250 kb/s.
C) Transport Layer: Provides end-to-end message transfer capability independent of theunderlying n/w.
Set up on connection with ACK as in TCP and without ACK as in UDP. Provides functions such as error
control, segmentation, flow control and congestion control. Protocols:
TCP: Transmission Control Protocol used by web browsers (along with HTTP and HTTPS), email (along
with SMTP, FTP). Connection oriented and stateless protocol. IP Protocol deals with sending packets, TCP
ensures reliable transmission of protocols in order. Avoids n/w congestion and congestion collapse.
UDP: User Datagram Protocol is connectionless protocol. Useful in time sensitive applications, very small
data units to exchange. Transaction oriented and stateless protocol. Does not provide guaranteed delivery.
D) Application Layer: Defines how the applications interface with lower layer protocols tosend data
over the n/w. Enables process-to-process communication using ports.
Protocols:
HTTP: Hyper Text Transfer Protocol that forms foundation of WWW. Follow request- response model
Stateless protocol.
CoAP: Constrained Application Protocol for machine-to-machine (M2M) applications with constrained
devices, constrained environment and constrained n/w. Uses client- server architecture.
Web Socket: allows full duplex communication over a single socket connection.
MQTT: Message Queue Telemetry Transport is light weight messaging protocol based on publish-subscribe
model. Uses client server architecture. Well suited for constrained environment.
XMPP: Extensible Message and Presence Protocol for real time communication and streaming XML data
between network entities. Support client-server and server-server communication.
DDS: Data Distribution Service is data centric middleware standards for device-to-deviceor machine-to-
machine communication. Uses publish-subscribe model.
AMQP: Advanced Message Queuing Protocol is open application layer protocol for business messaging.
Supports both point-to-point and publish-subscribe model.
LOGICAL DESIGN of IoT
Refers to an abstract represent of entities and processes without going into the low levelspecifies of
implementation.
1) IoT Functional Blocks 2) IoT Communication Models 3) IoT Comm. APIs
1) IoT Functional Blocks: Provide the system the capabilities for identification, sensing, actuation,
communication and management.
Device: An IoT system comprises of devices that provide sensing, actuation, monitoring and control
functions.
Communication: handles the communication for IoT system.
Services: for device monitoring, device control services, data publishing services and services for device
discovery.
Management: Provides various functions to govern the IoTsystem.
Security: Secures IoT system and priority functions such as authentication, authorization,message and
context integrity and data security.
Application: IoT application provide an interface that the users can use to control andmonitor various
aspects of IoTsystem.
2) IoT CommunicationModels:
1) Request-Response 2) Publish-Subscibe 3)Push-Pull 4) ExclusivePair
1) Request-Response Model:
In which the client sends request to the server and the server replies to requests. Is astateless
communication model and each request-response pair is independent of others.
2) Publish-Subscribe Model:
Involves publishers, brokers and consumers. Publishers are source of data. Publishers send datato the topics
which are managed by the broker. Publishers are not aware of the consumers. Consumers subscribe to the
topics which are managed by the broker. When the broker receives data for a topic from the publisher, it sends
the data to all the subscribed consumers.
3) Push-Pull Model: in which data producers push data to queues and consumers pull data from the queues.
Producers do not need to aware of the consumers. Queues help in decoupling the message between the
producers and consumers.
4) Exclusive Pair: is bi-directional, fully duplex communication model that uses a persistent connection
between the client and server. Once connection is set up it remains open until the client send a request to
close the connection. Is a stateful communication model and server is aware of all the open connections.
2) IoT Level 2: has a single node that performs sensing and/or actuating and local analysis as shown in fig.
Data is stored in cloud and application is usually cloud based. Level2 IoT systems are suitable for solutions
where data are involved is big, however, the primary analysis requirement is not computationally intensive
and can be done locally itself. An e,g., of Level2 IoT system for Smart Irrigation.
3) IoT Level 3: system has a single node. Data is stored and analyzed in the cloud application is cloud based as
shown in fig. Level3 IoT systems are suitable for solutions where the data involved is big and analysis
requirements are computationally intensive. An example of IoT level3 system for tracking package handling.
4) IoT Level 4: System has multiple nodes that perform local analysis. Data is stored in the cloud and application
is cloud based as shown in fig. Level4 contains local and cloud based observer nodes which can subscribe to
and receive information collected in the cloud from IoT devices. An example of a Level4 IoT system for
Noise Monitoring.
5) IoT Level 5: System has multiple end nodes and one coordinator node as shown in fig. The end nodes that
perform sensing and/or actuation. Coordinator node collects data from the end nodes and sends to the cloud.
Data is stored and analyzed in the cloud and application is cloud based. Level5 IoT systems are suitable for
solution based on wireless sensor network, in which data involved is big and analysis requirements are
computationally intensive. An example of Level 5 system for Forest Fire Detection.
6) IoT Level 6: System has multiple independent end nodes that perform sensing and/or actuation and sensed
data to the cloud. Data is stored in the cloud and application is cloudbased as shown in fig. The analytics
component analyses the data and stores the result in the cloud data base. The results are visualized with cloud
based application. The centralized controller is aware of the status of all the end nodes and sends control
commands to nodes. An example of a Level6 IoT system for Weather Monitoring System.
DOMAIN SPECIFIC IoTs
1) Home Automation:
a) Smart Lighting: helps in saving energy by adapting the lighting to the ambient conditions and switching
on/off or diming the light when needed.
b) Smart Appliances: make the management easier and also provide status information to the users remotely.
c) Intrusion Detection: use security cameras and sensors (PIR sensors and door sensors)to detect intrusion and
raise alerts. Alerts can be in the form of SMS or email sent to the user.
d) Smoke/Gas Detectors: Smoke detectors are installed in homes and buildings todetect smoke that is
typically an early sign of fire. Alerts raised by smoke detectors can be in the form of signals to a fire alarm
system. Gas detectors can detect the presence of harmful gases such as CO, LPG etc.,
2) Cities:
a) Smart Parking: make the search for parking space easier and convenient for drivers. Smart parking are
powered by IoT systems that detect the no. of empty parking slots and send information over internet to smart
application backends.
b) Smart Lighting: for roads, parks and buildings can help in saving energy.
c) Smart Roads: Equipped with sensors can provide information on driving condition, travel time estimating
and alert in case of poor driving conditions, traffic condition and accidents.
d) Structural Health Monitoring: uses a network of sensors to monitor the vibration levels in the structures
such as bridges and buildings.
e) Surveillance: The video feeds from surveillance cameras can be aggregated in cloud based scalable storage
solution.
f) Emergency Response: IoT systems for fire detection, gas and water leakage detection can help in generating
alerts and minimizing their effects on the critical infrastructures.
3) Environment:
a) Weather Monitoring: Systems collect data from a no. of sensors attached and send the data to cloud based
applications and storage back ends. The data collected in cloud can then be analyzed and visualized by cloud
based applications.
b) Air Pollution Monitoring: System can monitor emission of harmful gases (CO2, CO,NO, NO2 etc.,) by
factories and automobiles using gaseous and meteorological sensors. The collected data can be analyzed to
make informed decisions on pollutions control approaches.
c) Noise Pollution Monitoring: Due to growing urban development, noise levels in cities have increased and
even become alarmingly high in some cities. IoT based noise pollution monitoring systems use a no. of noise
monitoring systems that are deployed at different places in a city. The data on noise levels from the station is
collected on servers or in the cloud. The collected data is then aggregated to generate noise maps.
d) Forest Fire Detection: Forest fire can cause damage to natural resources, property and human life. Early
detection of forest fire can help in minimizing damage.
e) River Flood Detection: River floods can cause damage to natural and human resources and human life. Early
warnings of floods can be given by monitoring the water level and flow rate. IoT based river flood
monitoring system uses a no. ofsensor nodes that monitor the water level and flow rate sensors.
4) Energy:
a) Smart Grids: is a data communication network integrated with the electrical grids that collects and analyze
data captured in near-real-time about power transmission, distribution and consumption. Smart grid
technology provides predictive information and recommendations to utilities, their suppliers, and their
customers on how best to manage power. By using IoT based sensing and measurement technologies, the
healthof equipment and integrity of the grid can be evaluated.
b) Renewable Energy Systems: IoT based systems integrated with the transformers at the point of
interconnection measure the electrical variables and how much power is fed into the grid. For wind energy
systems, closed-loop controls can be used to regulate the voltage at point of interconnection which coordinate
wind turbine outputsand provides power support.
c) Prognostics: In systems such as power grids, real-time information is collected using specialized electrical
sensors called Phasor Measurement Units (PMUs) at thesubstations. The information received from PMUs
must be monitored in real-time for estimating the state of the system and for predicting failures.
5) Retail:
a) Inventory Management: IoT systems enable remote monitoring of inventory using data collected by
RFIDreaders.
b) Smart Payments: Solutions such as contact-less payments powered by technologies such as Near Field
Communication (NFC) and Bluetooth.
c) Smart Vending Machines: Sensors in a smart vending machines monitors its operations and send the data
to cloud which can be used for predictive maintenance.
6) Logistics:
a) Route generation & scheduling: IoT based system backed by cloud can provide first response to the route
generation queries and can be scaled upto serve a large transportation network.
b) Fleet Tracking: Use GPS to track locations of vehicles in real-time.
c) Shipment Monitoring: IoT based shipment monitoring systems use sensors such as temp, humidity, to
monitor the conditions and send data to cloud, where it can be analyzed to detect food spoilage.
d) Remote Vehicle Diagnostics: Systems use on-board IoT devices for collecting data on Vehicle operations
(speed, RPM etc.,) and status of various vehicle subsystems.
7) Agriculture:
a) Smart Irrigation: to determine moisture amount in soil.
b) Green House Control: to improve productivity.
8) Industry:
a) Machine diagnosis and prognosis
b) Indoor Air Quality Monitoring
9) Health and Lifestyle:
a) Health & Fitness Monitoring
b) Wearable Electronics.
IoT and M2M
M2M (Machine to Machine):
Machine-to-Machine (M2M) refers to networking of machines (or devices) for the purposeof remote
monitoring and control and data exchange.
Term which is often synonymous with IoT is Machine-to-Machine (M2M).
IoT and M2M are often used interchangeably.
Fig. Shows the end-to-end architecture of M2M systems comprises of M2M area networks,
communication networks and application domain.
An M2M area network comprises of machines (or M2M nodes) which have embedded network modules for
sensing, actuation and communicating various communication protocols can be used for M2M LAN such as
ZigBee, Bluetooth, M-bus, Wireless M-Busetc., these protocols provide connectivity between M2M nodes
within an M2M area network.
The communication network provides connectivity to remote M2M area networks. The communication
network provides connectivity to remote M2M area network. The communication network can use either
wired or wireless network (IP based). While the M2M are networks use either properietorary or non-IP
based communication protocols,the communication network uses IP-based network. Since non-IP based
protocols areused within M2M area network, the M2M nodes within one network cannotcommunicate with
nodes in an external network.
To enable the communication between remote M2M are network, M2M gateways are used.
Fig. Shows a block diagram of an M2M gateway.
The communication between M2M nodes and the M2M gateway is based on the communication protocols
which are naive to the M2M are network. M2M gateway performs protocol translations to enable Ip-
connectivity for M2M are networks. M2M gateway acts as a proxy performing translations from/to native
protocols to/fromInternet Protocol(IP). With an M2M gateway, each mode in an M2M area network appears
as a virtualized node for external M2M area networks.
Differences between IoT and M2M
1) Communication Protocols:
□ Commonly uses M2M protocols include ZigBee, Bluetooth, Modbus, M-Bus,Wireless M-Bus,etc.,
□ In IoT uses HTTP, CoAP, Web Socket, MQTT, XMPP, DDS, AMQP etc.,
2) Machines in M2M Vs Things in IoT:
□ Machines in M2M will be homogenous whereas Things in IoT will beheterogeneous.
3) Hardware Vs Software Emphasis:
□ The emphasis of M2M is more on hardware with embedded modules, the emphasisof IoT is more on
software.
4) Data Collection &Analysis
□ M2M data is collected in point solutions and often in on-premises storageinfrastructure.
□ The data in IoT is collected in the cloud (can be public, private orhybrid cloud).
5) Applications
□ M2M data is collected in point solutions and can be accessed by on-premises applications such as diagnosis
applications, service management applications, and on- premises enterprise applications.
□ IoT data is collected in the cloud and can be accessed by cloud applications such as analytics applications,
enterprise applications, remote diagnosis and management applications, etc.
SDN and NVF for IoT
Software Defined Networking (SDN):
• Software-Defined Networking (SDN) is a networking architecture that separates the control plane from the
data plane and centralizes the network controller.
• Software-based SDN controllers maintain a unified view of the network
• The underlying infrastructure in SDN uses simple packet forwarding hardware asopposed to specialized
hardware in conventional networks.
SDN Architecture
Key elements of SDN:
1) Centralized Network Controller
With decoupled control and data planes and centralized network controller, the network administrators can
rapidly configure the network.
2) Programmable Open APIs
SDN architecture supports programmable open APIs for interface between the SDN application and control
layers (Northbound interface).
3) Standard Communication Interface (Open Flow)
SDN architecture uses a standard communication interface between the control and infrastructure layers
(Southbound interface). Open Flow, which is defined by the Open Networking Foundation (ONF) is the
broadly accepted SDN protocolfor the South bound interface.
Network Function Virtualization (NFV)
• Network Function Virtualization (NFV) is a technology that leverages virtualization to consolidate the
heterogeneous network devices onto industry standard high volume servers, switches and storage.
• NFV is complementary to SDN as NFV can provide the infrastructure on which SDNcan run.
NFV Architecture
Key elements of NFV:
Virtualized Network Function (VNF):
VNF is a software implementation of a network function which is capable of running over the
NFV Infrastructure (NFVI).
1) NFV Infrastructure (NFVI):
NFVI includes compute, network and storage resources that are virtualized.
2) NFV Management and Orchestration:
NFV Management and Orchestration focuses on all virtualization-specific management tasks
and covers the orchestration and life-cycle management of physical and/or software resources
that support the infrastructure virtualization, and the life-cycle management of VNFs.
Need for IoT Systems Management
Managing multiple devices within a single system requires advanced management
capabilities.
1. Automating Configuration: IoT system management capabilities can helping
automating the system configuration.
2. Monitoring Operational & Statistical Data: Management systems can help in
monitoring operational and statistical data of a system. This data can be used for fault
diagnosis or prognosis.
3. Improved Reliability: A management system that allows validating the system
configurations before they are put into effect can help in improving the system
reliability.
4. System Wide Configurations: For IoT systems that consists of multiple devices or
nodes, ensuring system wide configuration can be critical for the correct functioning of
the system.
5. Multiple System Configurations: For some systems it may be desirable to have
multiple valid configurations which are applied at different times or in certain
conditions.
6. Retrieving & Reusing Configurations: Management systems which have the
capability of retrieving configurations from devices can help in reusing the
configurations for other devices of the same type.
IoT Systems Management with NETCONF-YANG
YANG is a data modeling language used to model configuration and state data manipulated by
the NETCONF protocol.
The generic approach of IoT device management with NETCONF-YANG.
Roles of various components are:
1) Management System
2) Management API
3) Transaction Manager
4) Rollback Manager
5) Data Model Manager
6) Configuration Validator
7) Configuration Database
8) Configuration API
9) Data Provider API
1) Management System: The operator uses a management system to send NETCONF messages
to configure the IoT device and receives state information and notifications from the device as
NETCONFmessages.
2) Management API: allows management application to start NETCONFsessions.
3) Transaction Manager: executes all the NETCONF transactions and ensures that ACID
properties hold true for the transactions.
4) Rollback Manager: is responsible for generating all the transactions necessary torollback a
current configuration to its original state.
5) Data Model Manager: Keeps track of all the YANG data models and the corresponding
managed objects. Also keeps track of the applications which provide data for each part ofa data
model.
6) Configuration Validator: checks if the resulting configuration after applying a transaction
would be a valid configuration.
7) Configuration Database: contains both configuration and operational data.
8) Configuration API: Using the configuration API the application on the IoT device can be read
configuration data from the configuration data store and write operational data to the
operational data store.
9) Data Provider API: Applications on the IoT device can register for callbacks for various
events using the Data Provider API. Through the Data Provider API, the applications can report
statistics and operational data.
Steps for IoT device Management with NETCONF-YANG
1) Create a YANG model of the system that defines the configuration and state data of the
system.
2) Complete the YANG model with the ‗In tool‘which comes with Libnetconf.
3) Fill in the IoT device management code in the Trans API module.
4) Build the callbacks C file to generate the library file.
5) Load the YANG module and the Trans API module into the Netopeer server using Netopeer
manager tool.
6) The operator can now connect from the management system to the Netopeer server using the
Netopeer CLI.
Operator can issue NETCONF commands from the Netopeer CLI. Command can be issued to
change the configuration dsta, get operational