Thanks to visit codestin.com
Credit goes to www.scribd.com

0% found this document useful (0 votes)
63 views64 pages

Full IoT Notes

The Internet of Things (IoT) refers to a network of physical objects embedded with technology to connect and exchange data. Key characteristics include dynamic adaptability, self-configuration, and unique identities for devices, while applications span smart homes, healthcare, and industrial uses. Design principles emphasize user value, security, and context, with essential capabilities including connectivity, control, and actionable data.

Uploaded by

aditigzp2005
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
63 views64 pages

Full IoT Notes

The Internet of Things (IoT) refers to a network of physical objects embedded with technology to connect and exchange data. Key characteristics include dynamic adaptability, self-configuration, and unique identities for devices, while applications span smart homes, healthcare, and industrial uses. Design principles emphasize user value, security, and context, with essential capabilities including connectivity, control, and actionable data.

Uploaded by

aditigzp2005
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 64

INTERNET OF THINGS

NOTES
UNIT - I
WHAT IS IOT
The Internet of things (IoT) describes the network of physical objects—"things" or objects—that
are embedded with sensors, software, and other technologies for the purpose of connecting and
exchanging data with other devices and systems over the Internet
Things have evolved due to the convergence of multiple technologies, real-
time analytics, machine learning, commodity sensors, and embedded systems. Traditional fields
of embedded systems, wireless sensor networks, control
systems, automation (including home and building automation), and others all contribute to enabling the
Internet of things. In the consumer market, IoT technology is most synonymous with products pertaining
to the concept of the "smart home", including devices and appliances (such as lighting
fixtures, thermostats, home security systems and cameras, and other home appliances) that support one
or more common ecosystems, and can be controlled via devices associated with that ecosystem, such
as smart phones and smart speakers. IoT can also be used in healthcare systems.
Definition:
A dynamic global n/w infrastructure with self-configuring capabilities based on standard and
interoperable communication protocols where physical and virtual things have identities, physical
attributes and virtual personalities and use intelligent interfaces, and are seamlessly integrated into
information n/w, often communicate data associated with users and their environments.

Characteristics:
1. Dynamic & Self Adapting: IoT devices and systems may have the capability to dynamically adapt
with the changing contexts and take actions based on their operating conditions, users context or
sensed environment.
Eg: the surveillance system is adapting itself based on context and changing conditions.
2. Self-Configuring: allowing a large number of devices to work together to provide certain
functionality.
3. Inter Operable Communication Protocols: support a number of interoperable communication
protocols and can communicate with other devices and also with infrastructure.
4. Unique Identity: Each IoT device has a unique identity and a unique identifier(IP address).
5. Integrated into Information Network: that allow them to communicate and exchange data with
other devices and systems
ARCHITECTURAL OVERVIEW
❖ What is the Internet of Things? - The concept of connecting any device (so long as it has an on/off
switch) to the Internet and to other connected devices. The IoT is a giant network of connected
things and people – all of which collect and share data about the way they are used and about the
environment around them.
❖ How does it work? Devices and objects with built in sensors are connected to an Internet of Things
platform, which integrates data from the different devices and applies analytics to share the most
valuable information with applications built to address specific needs.
❖ These powerful IoT platforms can pinpoint exactly what information is useful and what can safely
be ignored. This information can be used to detect patterns, make recommendations, and detect
possible problems before they occur.
❖ For example, if a car manufacturing business, might want to know which optional components
(leather seats or alloy wheels, for example) are the most popular. Using Internet of Things
technology,it is possible to:
o Use sensors to detect which areas in a showroom are the most popular, and where
customers linger longest;
o Drill down into the available sales data to identify which components are selling fastest;
o Automatically align sales data with supply, so that popular items don’t go out of stock.
❖ The information picked up by connected devices enables to make smart decisions about which
components to stock up on, based on real-time information, which helps save time and money.
❖ With the insight provided by advanced analytics comes the power to make processes more
efficient. Smart objects and systems mean you can automate certain tasks, particularly when these
are repetitive, mundane, time-consuming or even dangerous.

DESIGN PRINCIPLES AND NEEDED


CAPABILITIES

In the near future, our everyday lives will be more and more filled with intelligent, connected
objects. They will appear in our homes, in our working environments and in the cities, we live in as well as
travel with us everywhere we go in the form of wearable, smart clothing and things we cannot even imagine
right now. This development is called the internet of things, IoT.
IoT solutions consist of multiple elements: physical devices like sensors, actuators and interactive
devices, the network connecting these devices, the data gathered from these devices and analyzed to
create a meaningful experience and last but definitely not least, the physical context in which user interacts
with the solution.

Design principles

1. Do your research
When designing IoT-enabled products, designers might make the mistake of forgetting why
customers value these products in the first place. That’s why it’s a good idea to think about the value an
IoT offering should deliver at the initial phase of your design.
When getting into IoT design, you’re not building products anymore. You’re building services and
experiences that improve people’s lives. That’s why in-depth qualitative research is the key to figuring out
how you can do that.
Assume the perspective of your customers to understand what they need and how your IoT
implementation can solve their pain points. Research your target audience deeply to see what their existing
experiences are and what they wish was different about them.

2. Concentrate on value
Early adopters are eager to try out new technologies. But the rest of your customer base might be
reluctant to put a new solution to use. They may not feel confident with it and are likely to be cautious
about using it.
If you want your IoT solution to become widely adopted, you need to focus on the actual tangible
value it’s going to deliver to your target audience.
What is the real end-user value of your solution? What might be the barriers to adopting new
technology? How can your solution address them specifically?
Note that the features the early tech adopters might find valuable might turn out to be completely
uninteresting for the majority of users. That’s why you need to carefully plan which features to include and
in what order, always concentrating on the actual value they provide.

3. Don’t forget about the bigger picture


One characteristic trait of IoT solutions is that they typically include multiple devices that come with
different capabilities and consist of both digital and physical touch points. Your solution might also be
delivered to users in cooperation with service providers.
That’s why it’s not enough to design a single touch point well. Instead, you need to take the bigger
picture into account and treat your IoT system holistically.
Delineate the role of every device and service. Develop a conceptual model of how users will
perceive and understand the system. All the parts of your system need to work seamlessly together. Only
then you’ll be able to create a meaningful experience for your end-users.

4. Remember about the security


Don’t forget that IoT solutions aren’t purely digital. They’re located in the real-world context, and
the consequences of their actions might be serious if something goes wrong. At the same time, building
trust in IoT solutions should be one of your main design drivers.
Make sure that every interaction with your product builds consumer trust rather than breaking it.
In practice, it means that you should understand all the possible error situations that may be related to the
context of its use. Then try to design your product in a way to prevent them. If error situations occur, make
sure that the user is informed appropriately and provided with help.
Also, consider data security and privacy as a key aspect of your implementation. Users need to feel
that their data is safe, and objects located in their workspaces or home can’t be hacked. That’s why quality
assurance and testing the system in the real-world context are so important.

5. Build with the context in mind


And speaking of context, it pays to remember that IoT solutions are located at the intersection of
the physical and digital world. The commands you give through digital interfaces produce real-world
effects. Unlike digital commands, these actions may not be easily undone.
In a real-world context, many unexpected things may happen. That’s why you need to make sure
that the design of your solution enables users to feel safe and in control at all times.
The context itself is a crucial consideration during IoT design. Depending on the physical context of
your solution, you might have different goals in mind. For example, you might want to minimize user
distraction or design devices that will be resistant to the changing weather conditions.
The social context is an important factor, as well. Don’t forget that the devices you design for
workspaces or homes will be used by multiple users.

6. Make good use of prototypes


IoT solutions are often difficult to upgrade. Once the user places the connected object somewhere,
it might be hard to replace it with a new version – especially if the user would have to pay for the upgrade.
Even the software within the object might be hard to update because of security and privacy
reasons. Make sure that your design practices help to avoid costly hardware iterations. Get your solution
right from the start. From the design perspective, it means that prototyping and rapid iteration will become
critical in the early stages of the project.

Needed capabilities

1. Connectivity
It starts with how a device or sensor connects to the internet and a cloud platform. There are many
options to choose from Wi-Fi through a hub or gateway, 2G, or 3G cellular networks. Once you have
connectivity in place, now you can get the device or sensor talking to your cloud IoT platform. Ensure you
find a service provider that can send data through clean API’s that are easy to implement and install. This
will ensure you can get quickly setup and start capturing your data within minutes.

2. Control
The next capability necessary when evaluating an IoT data platform is control of the device. There
are a number of different scenarios for control including controlling a device through an application, device-
to-device communication, or control from the cloud (based on an event, rule or some other pre-
determined condition). For example, if you have a water leak detector, it can automatically send a
command to the device which could be an appliance or part of the core infrastructure to turn off the water
valve. Here, using two-way communication, a signal can be sent from the detector to the device via the
cloud to shut off the water. Lastly, you can program the device from an app (or website) to shut off at a
certain time or schedule based on a pre-programmed rule.

3. Device Management
Device management is also a major consideration. To keep devices and sensors up to date and
functional, a strong device management solution is a core component of an IoT cloud platform. There
are a few main capabilities a device management platform provides, including the ability for manufacturers
to send software or firmware updates OTA (over-the-air), factory provisioning, as well as an out-of-box
experience (OOBE).OOBE is part of a core experience that is often left to the last minute or completely
glossed over. It’s the first experience that an end user, be it a consumer, installer or technicianhas when
interacting with a device for the first time.

4. Actionable Data
The last capability you should consider in a IoT data platform is how you can query the data in a
manner that is clear and meaningful. It’s one thing to get all your data in place, but the value of the data is
only realized when it’s turned into information that can help solve a problem. We want organizations to
focus on their core competency, like making great appliances or services that deliver value to their
customers, rather than focusing on cloud infrastructure that makes it possible.
IOT APPLICATIONS, SENSING AND ACTUATION

IoT Applications

The IoT applications are addressing the societal needs and the advancements to enabling
technologies such as nano-electronics and cyber-physical systems continue to be challenged by a variety
of technical (i.e., scientific and engineering), institutional, and economical issues.

List of IOT Applications


1. Smart Home
2. Wearable
3. Smart City
4. Smart Grid
5. Industrial IoT
6. Connected Car
7. Connected Healthcare
8. Smart Retail
9. Smart Transportation and Mobility
10. Smart Agriculture/ Farming
1) Smart Home
Smart Home has become the revolutionary ladder of success in the residential spaces and it is
predicted Smart homes will become as common as smartphones. The cost of owning a house is the biggest
expense in a homeowner’s life. Smart Home products are promised to save time, energy and money.

2) Wearable
Wearable devices are installed with sensors and software which collect data and information about
the users. This data is later pre-processed to extract essential insights about user. These devices broadly
cover fitness, health and entertainment requirements. The pre-requisite from internet of things technology
for wearable applications is to be highly energy efficient or ultra-low power and small sized.

3) Smart City
Smart cities use IoT devices such as connected sensors, lights, and meters to collect and analyze
data. The cities then use this data to improve infrastructure, public utilities and services, and more.
Smart city devices work to make everyday tasks easier and more efficient, while relieving pain
points related to public safety, traffic, and environmental issues.

4) Smart Grid
The basic idea behind the smart grids is to collect data in an automated fashion and analyze the
behavior or electricity consumers and suppliers for improving efficiency as well as economics of electricity
use. Smart Grids will also be able to detect sources of power outages more quickly and at individual
household levels like nearby solar panel, making possible distributed energy system.

5) Industrial IoT
Industrial internet of things is empowering industrial engineering with sensors, software and big
data analytics to create brilliant machines. IoT holds great potential for quality control and sustainability.
Applications for tracking goods, real time information exchange about inventory among suppliers and
retailers and automated delivery will increase the supply chain efficiency.

6) Connected Cars
A connected car is a vehicle which is able to optimise its own operation, maintenance as well as
comfort of passengers using on-board sensors and internet connectivity.
Most large auto makers as well as some brave startups are working on connected car solutions.
Major brands like Tesla, BMW, Apple, Google are working on bringing the next revolution in automobiles.

7) Connected Healthcare
It can be used for out-patient care by healthcare providers, letting them get ECG, heart rate,
respiratory rate, skin temperature, body posture, fall detection, and activity readings remotely. This can
alert doctors to potential health problems before they arise, or give them additional insights into which
treatments will be most effective for their patients, even when their patients aren’t in the office.

8) Smart Retail
Today, retail stores are constantly focusing on leveraging the emerging technologies like cloud,
mobile, RFID, beacons, etc., to provide connected retail services and better shopping experience to
customers. For example, store owners are integrating sensors in the key zones of retail stores and
connecting them to cloud through a gateway that enables real-time data analysis related to products, sales,
and customers from these sensors.
Interestingly, IoT in retail and connected technologies are taking the retail industry by storm. 96%
retailers are ready to make changes required to implement the Internet of Things in their stores.
9) Smart Transportation and Mobility
Internet of Vehicles (IoV) connected with the concept of Internet of Energy (IoE) represent future
trends for smart transportation.
IoT technology that includes vehicle monitoring and maintenance, real-time tracking of packages,
environmental sensors in shipping containers, information-gathering on employees and tools, and a
number of safety-enhancing features for vehicles and people.

10) Smart Agriculture/ Farming


Farmers are using meaningful insights from the data to yield better return on investment. Sensing
for soil moisture and nutrients, controlling water usage for plant growth and determining custom fertiliser
are some simple uses of IoT.

Sensors and Actuators

Sensors and actuators have a number of similarities and dissimilarities in the functioning or
processing. Here we have listed the differences between the actuator and a sensor.

❖ The main difference between an actuator and a sensor is that the sensor converts the physical
gesture into electrical signals and do different works. Whereas, the actuator is responsible forthe
conversion of electrical signal to mechanical work.
❖ Sensors measure discrete as well as continuous process variables. On the other hand, actuators
are used to impel the parameters of both discrete and continuous processes.
❖ Sensors are widely used to original electrical signals in different electrical application. On the other
hand, actuators are very useful in the production of energy in the form of heat and motion.
❖ Sensors are used as an input device because of the reason it is placed at input dork of the machine.
However, actuator are used as output device as it is mostly placed at output port of the machinery.
❖ Sensors are the one which acts as a brain because it provides information to do work.

Difference between Sensor and Actuator:

SENSOR ACTUATOR
It converts physical characteristics into It converts electrical signals into physical
electrical signals. characteristics.
It takes input from output conditioning unit of
It takes input from environment.
system.
It gives output to input conditioning unit of
It gives output to environment.
system.
Sensor generated electrical signals. Actuator generates heat or motion.

It is placed at input port of the system. It is placed at output port of the system.
It is used to measure the continuous and
It is used to measure the physical quantity.
discrete process parameters.
It gives information to the system about
It accepts command to perform a function.
environment.
Example: Photo-voltaic cell which converts Example: Stepper motor where electrical energy
light energy into electrical energy. drives the motor.

Sensor
Sensor is a device used for the conversion of physical events or characteristics into the electrical
signals. This is a hardware device that takes the input from environment and gives to the system by
converting it.
For example, a thermometer takes the temperature as physical characteristic and then converts it
into electrical signals for the system.

Actuator
Actuator is a device that converts the electrical signals into the physical events or characteristics. It
takes the input from the system and gives output to the environment.
For example, motors and heaters are some of the commonly used actuators.

In a typical IoT system, a sensor may collect information and route to a control center. There,
previously defined logic dictates the decision. As a result, a corresponding command controls an
actuator in response to that sensed input. Thus, sensors and actuators in IoT work together from opposite
ends.

Types of sensors Types of actuators


Humidity Sensors Linear Actuators
Pressure Sensors Rotary Actuators
Proximity Sensors Hydraulic Actuators
Level Sensors Pneumatic Actuators
Accelerometers Electric Actuators
Gas Sensors Thermal and Magnetic Actuators
Temperature sensor Mechanical Actuators

BASICS OF NETWORKING, M2M AND IOT TECHNOLOGY

Basics of Networking
Today computer networks are everywhere. You will find them in homes, offices, factories, hospitals
leisure centers etc.

Home and Office Networks


➢ The network you have at home uses the same networking technologies, protocols and services that are
used in large corporate networks and on the Internet.
➢ The only real difference between a home network and a large corporate network is the size.
➢ A home network will have between 1 and 20 devices and a corporate network will have many
thousands.
➢ If you are completely new to networking then the basic course will introduce you to the basic
networking protocols used in small home/office networks and on the Internet.
➢ Setting Up and building a Home Network will introduce some basic networking component and show
you how to build a home network and connect it to the Internet.

Networking Types
Networks can be wired or wireless with most networks being a mixture of both.

Wired vs Wireless Networks


• Early (pre-2008) networks were predominately wired.
• Today however most networks will use a mixture of wired and wireless network.
• Wired networks use Ethernet as the data link protocol. This is unlikely to change with the IOT, as
IOT devices will be predominantly wireless.
Wired Networks- Advantages and Disadvantages

Advantages:
o Ethernet ports are found on almost all laptops/PCs and netbooks even on those 8 years old.
o Wired networks are faster than Wireless. Data rates were periodically increased from the
original 10 megabits per second, to 1gigabits per second. Most home networks use 10-
100Mbps.
o More secure than Wireless

Disadvantages:
o Need to Use cable which can be unsightly, difficult to run and expensive.
o Can’t be used easily between buildings (planning etc.).
o Note a new technology that uses mains cable overcomes many of these
disadvantages. powerline networking is common on home/small office networks
o Not supported on Mobile phones and tablets.
Wireless Networks – Advantages and Disadvantages

❖ Wireless networks use Wi-fi as the data link protocol. However other wireless options are being
developed for the IOT (Internet of things).

Advantages:
o Generally easier to set up.
o Can be used both on home and public networks
o No cables required.
o Can be used with mobile phones and tablets.

Disadvantages
o Generally Slower than wired networks.
o Limited by range.
o Open to eavesdropping.
o Not as secure depending on set up.

M2M
➔ Shows the end-to-end architecture of M2M systems comprises of M2M area networks,
communication networks and application domain.

1. Machine to machine (M2M) is direct communication between devices using any communications
channel, including wired and wireless.
2. Machine to machine communication can include industrial instrumentation, enabling a sensor or
meter to communicate the information it records (such as temperature, inventory level, etc.) to
application software that can use it (for example, adjusting an industrial process based on
temperature or placing orders to replenish inventory).
3. Such communication was originally accomplished by having a remote network of machines relay
information back to a central hub for analysis, which would then be rerouted into a system like
a personal computer.
4. More recent machine to machine communication has changed into a system of networks that
transmits data to personal appliances. The expansion of IP networks around the world has made
machine to machine communication quicker and easier while using less power. These networks also
allow new business opportunities for consumers and suppliers.
5. M2M is not a new technology, primarily because it doesn’t actually require any wireless
technologies or complex digital devices. A wired connection between two machines can still be
considered an M2M connection, and indeed the very first iterations of this technology used phone
lines to communicate.
6. However, in the modern world, M2M usually refers to machines that communicate using things like
WiFi or mobile networks. In this article, we’re going to take a look at what technology underpins
M2M, and how it’s applied in the real world.
7. M2M generally centers around the concept of telemetry. This is simply where sensors of varying
types will collect information, and then relay it to a central point of some description. In the past,
this central point may have been a person or a personal computer.
8. The data would be interpreted and then used. This is still often the case today. However, modern
M2M systems allow for far more complexity, allowing machines to communicate with one another
and make decisions quickly.

IoT Technology

The Internet of Things (IoT) starts with connectivity, but since IoT is a widely diverse and multifaceted
realm, you certainly cannot find a one-size-fits-all communication solution. Continuing our discussion
on mesh and star topologies, in this article we’ll walk through the six most common types of IoT wireless
technologies.

1. LPWANs
Low Power Wide Area Networks (LPWANs) are the new phenomenon in IoT. By providing long-
range communication on small, inexpensive batteries that last for years, this family of technologies
is purpose-built to support large-scale IoT networks sprawling over vast industrial and commercial
campuses.
LPWANs can literally connect all types of IoT sensors – facilitating numerous applications from
asset tracking, environmental monitoring and facility management to occupancy detection and
consumables monitoring. Nevertheless, LPWANs can only send small blocks of data at a low rate,
and therefore are better suited for use cases that don’t require high bandwidth and are not time-
sensitive.
Also, not all LPWANs are created equal. Today, there exist technologies operating in both the
licensed (NB-IoT, LTE-M) and unlicensed (e.g. MYTHINGS, LoRa, Sigfox etc.) spectrum with varying
degrees of performance in key network factors. For example, while power consumption is a major
issue for cellular-based, licensed LPWANs; Quality-of-Service and scalability are main
considerations when adopting unlicensed technologies. Standardization is another important factor
to think of if you want to ensure reliability, security, and interoperability in the long run.

2. Cellular (3G/4G/5G)
Well-established in the consumer mobile market, cellular networks offer reliable broadband
communication supporting various voice calls and video streaming applications. On the downside,
they impose very high operational costs and power requirements.
While cellular networks are not viable for the majority of IoT applications powered by battery -
operated sensor networks, they fit well in specific use cases such as connected cars or fleet
management in transportation and logistics. For example, in-car infotainment, traffic routing,
advanced driver assistance systems (ADAS) alongside fleet telematics and tracking services can
all rely on the ubiquitous and high bandwidth cellular connectivity.
Cellular next-gen 5G with high-speed mobility support and ultra-low latency is positioned tobe
the future of autonomous vehicles and augmented reality. 5G is also expected to enable real-time
video surveillance for public safety, real-time mobile delivery of medical data sets for connected
health, and several time-sensitive industrial automation applications in the future.
Also recommended for you: IoT Connectivity - 4 Latest Standards That Will Shape 2020 and beyond.

3. Zigbee and Other Mesh Protocols


Zigbee is a short-range, low-power, wireless standard (IEEE 802.15.4), commonly deployed in mesh
topology to extend coverage by relaying sensor data over multiple sensor nodes. Compared to
LPWAN, Zigbee provides higher data rates, but at the same time, much less power-efficiency due
to mesh configuration.
Because of their physical short-range (< 100m), Zigbee and similar mesh protocols (e.g. Z-Wave,
Thread etc.) are best-suited for medium-range IoT applications with an even distribution of nodes
in close proximity. Typically, Zigbee is a perfect complement to Wi-Fi for various home automation
use cases like smart lighting, HVAC controls, security and energy management, etc. – leveraging
home sensor networks.
Until the emergence of LPWAN, mesh networks have also been implemented in industrial contexts,
supporting several remote monitoring solutions. Nevertheless, they are far from ideal for many
industrial facilities that are geographically dispersed, and their theoretical scalability is often
inhibited by increasingly complex network setup and management.

4. Bluetooth and BLE


Defined in the category of Wireless Personal Area Networks, Bluetooth is a short-range
communication technology well-positioned in the consumer marketplace. Bluetooth Classic was
originally intended for point-to-point or point-to-multipoint (up to seven slave nodes) data
exchange among consumer devices. Optimized for power consumption, Bluetooth Low-Energy was
later introduced to address small-scale Consumer IoT applications.
BLE-enabled devices are mostly used in conjunction with electronic devices, typically smartphones
that serve as a hub for transferring data to the cloud. Nowadays, BLE is widely integrated into fitness
and medical wearables (e.g. smartwatches, glucose meters, pulse oximeters, etc.) as well as Smart
Home devices (e.g. door locks) – whereby data is conveniently communicated to and visualized on
smartphones.
The release of Bluetooth Mesh specification in 2017 aims to enable a more scalable deployment of
BLE devices, particularly in retail contexts. Providing versatile indoor localization features, BLE
beacon networks have been used to unlock new service innovations like in-store navigation,
personalized promotions, and content delivery.

5. Wi-Fi
There is virtually no need to explain Wi-Fi, given its critical role in providing high-throughput data
transfer for both enterprise and home environments. However, in the IoT space, its major
limitations in coverage, scalability and power consumption make the technology much less
prevalent.
Imposing high energy requirements, Wi-Fi is often not a feasible solution for large networks of
battery-operated IoT sensors, especially in industrial IoT and smart building scenarios. Instead, it
more pertains to connecting devices that can be conveniently connected to a power outlet like
smart home gadgets and appliances, digital signages or security cameras.

6. RFID
Radio Frequency Identification (RFID) uses radio waves to transmit small amounts of data from an
RFID tag to a reader within a very short distance. Till now, the technology has facilitated a major
revolution in retail and logistics.
By attaching an RFID tag to all sorts of products and equipment, businesses can track their inventory
and assets in real-time – allowing for better stock and production planning as well as optimized
supply chain management. Alongside increasing IoT adoption, RFID continues to be entrenched in
the retail sector, enabling new IoT applications like smart shelves, self-checkout, andsmart mirrors.

What Technologies Have Made IoT Possible?

While the idea of IoT has been in existence for a long time, a collection of recent advances in a number of
different technologies has made it practical.

 Access to low-cost, low-power sensor technology. Affordable and reliable sensors are making IoT
technology possible for more manufacturers.
 Connectivity. A host of network protocols for the internet has made it easy to connect sensors to
the cloud and to other “things” for efficient data transfer.
 Cloud computing platforms. The increase in the availability of cloud platforms enables both
businesses and consumers to access the infrastructure they need to scale up without actually having
to manage it all.
 Machine learning and analytics. With advances in machine learning and analytics, along with access
to varied and vast amounts of data stored in the cloud, businesses can gather insights fasterand
more easily. The emergence of these allied technologies continues to push the boundaries of IoT
and the data produced by IoT also feeds these technologies.
 Conversational artificial intelligence (AI). Advances in neural networks have brought natural-
language processing (NLP) to IoT devices (such as digital personal assistants Alexa, Cortana, and Siri)
and made them appealing, affordable, and viable for home use.
Differences between IoT and M2M
1) Communication Protocols:
o Commonly uses M2M protocols include ZigBee, Bluetooth, ModBus, M-Bus, Wireless M-
Bustec.
o In IoT uses HTTP, CoAP, WebSocket,MQTT, XMPP, DDS, AMQP etc.,
2) Machines in M2M Vs Things inIoT:
o Machines in M2M will be homogenous whereas Things in IoT will beheterogeneous.
3) Hardware Vs SoftwareEmphasis:
o the emphasis of M2M is more on hardware with embedded modules, the emphasis of IoT is
more on software.
4) Data Collection &Analysis
o M2M data is collected in point solutions and often in on-premises storage infrastructure.
o The data in IoT is collected in the cloud (can be public, private or hybridcloud).
5) Applications
o M2M data is collected in point solutions and can be accessed by on-premises applications
such as diagnosis applications, service management applications, and on- premisis
enterpriseapplications.
o IoT data is collected in the cloud and can be accessed by cloud applications suchas analytics
applications, enterprise applications, remote diagnosis and management applications,etc.

FUNDAMENTALS- DEVICES AND GATEWAYS

Devices

The sensing/actuating stage covers everything from legacy industrial devices to robotic camera
systems, water level detectors, air quality sensors, accelerometers, and heart rate monitors. And the scope
of the IoT is expanding rapidly, thanks in part to low-power wireless sensor network technologies and
Power over Ethernet, which enable devices on a wired LAN to operate without the need for an A/C power
source.
Physical devices and controllers that might control multiple devices. These are the thingsin the IoT,
and they include a wide range of endpoint devices that send and receive information. Today, the list of
devices is already extensive. It will become almost unlimited as more equipment is added to the IoT over
time. Devices are diverse, and there are no rules about size, location, form factor, or origin. Some devices
will be the size of a silicon chip. Some will be as large as vehicles. The IoT must support the entire range.
Dozens or hundreds of equipment manufacturers will produce IoT devices.

Gateways
 Simply put, an IoT gateway is a physical device or virtual platform that connects sensors, IoT
modules, and smart devices to the cloud.
 Gateways serve as a wireless access portal to give IoT devices access to the internet.
 On the surface, it may sound like a simple router, enabling communication between different
protocols and devices.
 But IoT Gateways are sophisticated technology that does so much more, like edge-computing in
particular.
 An IoT Gateway collects massive data from many connected devices and sensors in any given IoT
ecosystem.
 The gateway pre-processes the data before passing it along to cloud platforms, where the heavy
lifting of transforming data into meaningful intelligence is accomplished.
 IoT gateways also receive information from the cloud, sent back to devices to allow autonomous
management of devices in the field.
“This means that all the information moving through an IoT ecosystem – from an IoT device to the
cloud, or vice versa – goes through a connected IoT gateway.”

DATA MANAGEMENT AND BUSINESS PROCESSES


IN IOT

Data Management
Traditional data management systems handle the storage, retrieval, and update of elementary data
items, records and files. In the context of IoT, data management systems must summarize data online while
providing storage, logging, and auditing facilities for offline analysis. This expands the concept of data
management from offline storage, query processing, and transaction management operations into online-
offline communication/storage dual operations. We first define the data lifecycle within the context of IoT
and then outline the energy consumption profile for each of the phases in order to have a better
understanding of IoT data management.

IoT Data Lifecycle


The lifecycle of data within an IoT system—illustrated in Figure —proceeds from data production to
aggregation, transfer, optional filtering and preprocessing, and finally to storage and archiving. Querying and
analysis are the end points that initiate (request) and consume data production, but data production can
be set to be “pushed” to the IoT consuming services. Production, collection, aggregation, filtering, andsome
basic querying and preliminary processing functionalities are considered online, communication- intensive
operations. Intensive preprocessing, long-term storage and archival and in-depthprocessing/analysis are
considered offline storage-intensive operations.
Storage operations aim at making data available on the long term for constant access/updates,
while archival is concerned with read-only data. Since some IoT systems may generate, process, and store
data in-network for real-time and localized services, with no need to propagate this data further up to
concentration points in the system, “edges” that combine both processing and storage elements may exist
as autonomous units in the cycle. In the following paragraphs, each of the elements in the IoT data lifecycle
is explained
❖ Querying: Data-intensive systems rely on querying as the core process to access and retrieve data. In
the context of IoT, a query can be issued either to request real-time data to be collected for temporal
monitoring purposes or to retrieve a certain view of the data stored within the system. The first case is
typical when a (mostly localized) real-time request for data is needed. The second case represents more
globalized views of data and in-depth analysis of trends and patterns.
❖ Production: Data production involves sensing and transfer of data by the “Things” within the IoT
framework and reporting this data to interested parties periodically (as in a subscribe/notify model),
pushing it up the network to aggregation points and subsequently to database servers, or sending it as
a response triggered by queries that request the data from sensors and smart objects. Data is usually
time-stamped and possibly geo-stamped, and can be in the form of simple key-value pairs, or it may
contain rich audio/image/video content, with varying degrees of complexity in-between.
❖ Collection: The sensors and smart objects within the IoT may store the data for a certain time interval
or report it to governing components. Data may be collected at concentration points or gateways within
the network where it is further filtered and processed, and possibly fused into compact forms for
efficient transmission. Wireless communication technologies such as Zigbee, Wi-Fi and cellular are used
by objects to send data to collection points.
❖ Aggregation/Fusion: Transmitting all the raw data out of the network in real-time is often prohibitively
expensive given the increasing data streaming rates and the limited bandwidth. Aggregation and fusion
techniques deploy summarization and merging operations in real-time to compress the volume of data
to be stored and transmitted.
❖ Delivery: As data is filtered, aggregated, and possibly processed either at the concentration points or
at the autonomous virtual units within the IoT, the results of these processes may need to be sent
further up the system, either as final responses, or for storage and in-depth analysis. Wired or wireless
broadband communications may be used there to transfer data to permanent data stores.
❖ Preprocessing: IoT data will come from different sources with varying formats and structures. Data may
need to be preprocessed to handle missing data, remove redundancies and integrate data from
different sources into a unified scheme before being committed to storage. This preprocessing is
aknown procedure in data mining called data cleaning.
❖ Storage/Update—Archiving: This phase handles the efficient storage and organization of data as
well as the continuous update of data with new information as it becomes available. Archiving refers
to theoffline long-term storage of data that is not immediately needed for the system's ongoing
operations. The core of centralized storage is the deployment of storage structures that adapt to
the various data types and the frequency of data capture.
❖ Processing/Analysis: This phase involves the ongoing retrieval and analysis operations performed
and stored and archived data in order to gain insights into historical data and predict future trends,
or to detect abnormalities in the data that may trigger further investigation or action. Task-specific
preprocessing may be needed to filter and clean data before meaningful operations take place.

Business Processes in IoT


The IoT is changing the way we live our lives and that is something that will only grow and grow,
andit’s certainly something that all businesses need to adapt to. There are some obvious benefits and
some aspects that will require adjustments to processes. Here are some of the main changes and
challenges facing companies as the IoT becomes more ever-present:

❖ Data: As consumers use more and more devices that record data, there are opportunities for
businesses to use this data for marketing and product development purposes, but only if the
processes are in place to measure, analyze and report on this data. Business process management
can automate this processand ensure that it remains effective and agile enough to keep pace with
technological changes.
❖ New ways of buying: The IoT gives consumers the chance to buy directly from their devices,
whether it’s an Amazon Echo or a smartphone or even that legendary refrigerator ordering fresh
milk. Technology is making everything faster and more easily, so they will also be expecting faster
deliveriesand better service. BPM needs to be used to manage the processes that will allow this kind
of development to meet the demand. IoT software and tools can help with this though, with
inventories able to be tracked automatically.
❖ Innovation: Whether it’s new product development or upgrading existing products or services, the
IoToffers the opportunities for businesses to deliver exciting new benefits for their customers.
❖ Customer service: Another area where processes need to be managed carefully because of the
changesthat the IoT have brought in is customer service. Products that utilize the internet should
really be able to be fixed over the internet when something goes wrong. Consumers expect it and
businesses shouldbe able to deliver it, so BPM is needed to ensure that customer service processes
are effective, efficientand easy to cope.
❖ Centralized BPM: Business process management isn’t simply something that is needed to make the
IoT run more smoothly, the benefits can flow back in the opposite direction too. Integrating BPM
softwareinto devices means that the data can be analyzed from a central location and any changes
can be fed back out again.
EVERYTHING AS A SERVICE (XAAS)

XaaS is a general, collective term that refers to the delivery of anything as a service. It recognizes the
vast number of products, tools and technologies that vendors now deliver to users as a service over a
network -- typically the internet -- rather than provide locally or on-site within an enterprise.

Most major companies now offer some form of XaaS, including Microsoft Azure, the various
AmazonWeb Services (AWS), and even Google Apps. In fact, if there are any types of IT services or
computer- based functionality you require, then there is a high probability you can obtain it as XaaS.
Some of the most common types of XaaS include:

Types of XaaS
1. Hardware-as-a-Service (HaaS)
2. Communication-as-a-Service (CaaS)
3. Monitoring as a Service (MaaS)
4. Security-as-a-Service (SECaaS)
5. Software-as-a-Service (SaaS)
6. Infrastructure as a service (IaaS)
7. Desktop-as-a-Service (DaaS)
8. Database-as-a-Service (DBaaS)
9. Network-as-a-service (NaaS)
10. Storage-as-a-Service (STaaS)
11. Platform-as-a service (PaaS)
12. Disaster recovery-as-a-service (DRaaS)

1. Hardware-as-a-Service (HaaS): Managed service providers (MSP) own some hardware and install it
on
customers’ sites on demand. Customers utilize the hardware in accordance with service level
agreements. This pay-as-you-go model is similar to leasing and can be compared to IaaS when
computing resources are located at MSP’s site and provided to users as virtual equivalents of
physical hardware.
2. Communication-as-a-Service (CaaS): This model includes different communication solutions such
as VoIP (voice over IP or Internet telephony), IM (instant messaging), video conference applications
that are hosted in the vendor’s cloud. A company can selectively deploy communication apps that
best suittheir current needs for a certain period and pay for this usage period only.
3. Monitoring-as-a-Service (MaaS) is a security service that provides security to IT assets of any
business24/7. It plays a vital role in securing an enterprise or government clients from any possible
cyber threats. MaaS is a monitoring service that can be outsourced in a flexible and consumption-
based subscription model.
4. Security-as-a-Service (SECaaS): This is the model of outsourced security management. A provider
integrates their security services into your company’s infrastructure and, as a rule, delivers them
over the Internet. Such services may include anti-virus software, encryption, authentication,
intrusion detection solutions and more.
5. Software-as-a-Service (SaaS): It is a cloud-based method of providing software to users. SaaS users
subscribe to an application rather than purchasing it once and installing it. Users can log into and use
aSaaS application from any compatible device over the Internet. The actual application
runsin cloud servers that may be far removed from a user's location.
6. Infrastructure-as-a-Service(IaaS) is an instant computing infrastructure, provisioned and managed
over the internet. A cloud computing service provider, such as Azure, manages the infrastructure,
while you purchase, install, configure and manage your own software—operating systems,
middleware and applications.
7. Desktop-as-a-Service (DaaS): Desktops are delivered as virtual services along with the apps needed
foruse. Thus, a client can work on a personal computer, using the computing capacities of third-
party servers (which can be much more powerful than those of a PC).
8. Database-as-a-Service (DBaaS) is a cloud computing service model that provides users with some
formof access to a database without the need for setting up physical hardware, installing software
or configuring for performance. All of the administrative tasks and maintenance are taken care of
by the service provider so that all the user or application owner needs to do is use the database. Of
course, ifthe customer opts for more control over the database, this option is available and may vary
dependingon the provider.
9. Network-as-a-Service-(NaaS) brings Software Defined Networking (SDN), programmable
networking and API-based operation to WAN services, transport, hybrid cloud, multi-cloud, Private
Network Interconnect, and Internet Exchanges. Historic definitions focused on fundamental
concepts of NaaS including: NaaS describes services for network transport connectivity. NaaS
involves the optimization ofresource allocations by considering network and computing resources
as a unified whole.
10. Storage-as-a-Service (SaaS) is a cloud business model in which a company leases or rents
its storage infrastructure to another company or individuals to store data. The client transfers the
datameant for storage to the service provider on a set schedule over the SaaS provider's wide area
networkor over the Internet.
11. Platform-as-a-Service (PaaS ) as the name suggests, provides you computing platforms which
typically includes operating system, programming language execution environment, database, web
serveretc. Examples: AWS Elastic Beanstalk, Windows Azure, Heroku, Force.com, Google App Engine,
ApacheStratos.
12. Disaster recovery-as-a-Service (DRaaS) is a cloud computing service model that allows an
organizationto back up its data and IT infrastructure in a third-party cloud computing environment
and provide all the DR orchestration, all through a SaaS solution, to regain access and functionality
to IT infrastructure after a disaster. The as-a-service model means that the organization itself
doesn’t have to own all the resources or handle all the management for disaster recovery, instead
relying on the service provider.

ROLE OF CLOUD IN IOT AND SECURITY ASPECTS IN


IOT

Role of Cloud in IoT

➔ The Cloud is a centralized system that helps to deliver and transport data and various files across the
Internet to data centers. The different data and programs can be accessed easily from the
centralized Cloud system. Cloud Computing is an economic solution, as it does not require on-site
infrastructure for storage, processing and analytics. The scalability of Cloud Computing means that
as your business grows, your technological and analytical capabilities can too.
➔ There are different types of Cloud services available, including Microsoft Azure Cloud development,
and more information on each of these varying types of Cloud solutions can be found in our previous
guide.
➔ it is essential that both cloud and IoT form cloud-based IoT applications in a bid to make the most
out of their combination. This alliance has led to the success of IoT. In addition to this, here are a few
morepointers as to why the cloud is important from the point of view of IoT’s success that are-

1. Provides remote processing power


Cloud as a technology empowers IoT to move beyond regular appliances such as air
conditioners, refrigerators etc. This is because the cloud has such a vast storage that it takes away
dependencies onon-premise infrastructure. With the rise of miniaturization and transition of 4G to
higher internet speeds, the cloud will allow developers to offload fast computing processes.
2. Provides security and privacy
IoT’s role in harnessing mobility is immense. However, its prowess would be incomplete without
security. Cloud has made IoT more secure with preventive, detective and corrective controls. It has
enabled users with strong security measures by providing effective authentication and encryption
protocols. In addition to this, managing and securing the identity of users has been possible for IoT
products with the help of biometrics. All of this is possible because of cloud’s security.
3. Removes entry barrier for hosting providers
Today, many innovations in the field of IoT are looking at plug-and-play hosting services. Which
is why the cloud is a perfect fit for IoT. Hosting providers do not have to depend on massive
equipment or even any kind of hardware that will not support the agility IoT devices require. With
the cloud, most hosting providers can allow their clients a ready-to-roll model, removing entry
barriers for them.
4. Facilitates inter-device communication
Cloud acts as a bridge in the form of a mediator or communication facilitator when it comes to
IoT. Many powerful APIs like Cloudflare, Cloud Cache and Drops are enabled by cloud
communications, allowing easy linking to smartphones. This eases devices to talk to each other and
not just us, which essentially is the tenet of IoT cloud.
It would be fair to say that cloud can accelerate the growth of IoT. However, deploying cloud
technology also has certain challenges and shortcomings. Not because the cloud is flawed as a
technology but thecombination of IoT cloud can burden users with some obstacles. If you ever go
ahead with an IoT cloudsolution, it is better if you know the kind of challenges you may face in
advance.

Security Aspect in IoT


As most of the systems are using existing wireless networks such aswifi, zigbee, zwave, GSM
etc.IoTsystems can be hacked using wireless devices. In order to have safe and secure use of IoT
devices and IoT network, following precautions are advisable. These are very useful as IoT security
aspects for both the user as well as IoT network service provider.
1. Do not store any critical business or personal data in internet cloud.
2. Do not store any password in your IoT device or anywhere in internet cloud.
3. Do not install any malware without verifying its authenticity.
4. Always install third-party software from authentic and genuine websites.
5. Do not be hurry in start using the IoT device, first secure your newly purchased IoT device with
anti-malware and anti-virus softwares.
6. If possible, regularly change the password of IoT device in order to improve the security.
7. Do not bring any sensitive business material for re-work at home if home network is less secured
compare to office network. Do not store such material in easily hackable storage devices or
public storage locations. Moreover, avoid using wifi network for such work.
8. Switch off unused IoT devices as they are vulnerable for potential attack by hackers in a home
network. For example, switch off IoT compliant thermostats when not needed.
9. Switch off wifi in your smartphone when you do not require internet access. This is because it
has been found that smartphone-based fitness applications are vulnerable to leak passwords as
well aslocation information easily over public wifi networks.
10. Business, finance and banking related companies should store the data and retain them till they
areneeded. Once they are no longer required, they should be deleted to minimize the possible
hacking.
11. House owner should be cautious enough so that no unclaimed IoT device get installed or placed
intheir premises without their notice. As later these devices can be utilized by hackers for their
bad intention.
12. IoT Service provider should provide regular software patches for smart watch, IoT sensors, IoT
gadgets, healthcare applications used in smartphone etc. This helps IoT devices to be more
secure.These patches should be robust enough to take care of modern and latest malwares and
viruses.
13. Individually wireless networks based on various technologies are already been secured, which
also helps avoid any possible security threats. Refer following links for further study on IoT
security.
UNIT – II

Building IOT with Arduino

Internet of Things

The Internet of Things (IoT) is a scenario in which objects, animals or people are provided with
single identifiers and the capability to automatically transfer and the capability to automatically
transfer data more to a network without requiring human-to-human or human-to-computer
communication.

Arduino Board:
➢ An Arduino is actually a microcontroller-based kit.
➢ It is basically used in communications and in controlling or operating many devices.
➢ Arduino UNO board is the most popular board in the Arduino board family.
➢ In addition, it is the best board to get started with electronics and coding.
➢ Some boards look a bit different from the one given below, but most Arduino’s
havemajority of these components in common.
➢ It consists of two memories- Program memory and the data memory.
➢ The code is stored in the flash program memory, whereas the data is stored in the data
memory.
➢ Arduino Uno consists of 14 digital input/output pins (of which 6 can be used as PWM
outputs), 6 analog inputs, a 16 MHz crystal oscillator, a USB connection, a power jack, an
ICSP header, and a reset button
16.AREF
17.Arduino Reset 15.Digital I/O

14.TX and RX
LEDs

1.Power
USB 13.Power
LED
indicator
4.Crystal Oscillator

12.ICSP pin
3.Voltage
Regulator
11.Main
microcontroller
2.Power
(Barrel Jack)
5.Arduino Reset
10.Analog pins
6,7,8,9.Pins (3.3,
5, GND, Vin)
1. Power USB
Arduino board can be powered by using the USB cable from your computer. All you need
to do is connect the USB cable to the USB connection (1).
2. Power (Barrel Jack)
Arduino boards can be powered directly from the AC mains power supply by connecting
it to the Barrel Jack (2).
3. Voltage Regulator
The function of the voltage regulator is to control the voltage given to the Arduino board
and stabilize the DC voltages used by the processor and other elements.
4. Crystal Oscillator
The crystal oscillator helps Arduino in dealing with time issues. How does Arduino
calculate time? The answer is, by using the crystal oscillator. The number printed on top of the
Arduino crystal is 16.000H9H. It tells us that the frequency is 16,000,000 Hertz or 16 MHz.
5. Arduino Reset
You can reset your Arduino board, i.e., start your program from the beginning. You can
reset the UNO board in two ways. First, by using the reset button (17) on the board. Second, you
can connect an external reset button to the Arduino pin labelled RESET (5).
6,7,8,9.Pins (3.3, 5, GND, Vin)
• 3.3V (6) − Supply 3.3 output volt
• 5V (7) − Supply 5 output volt
• Most of the components used with Arduino board works fine with 3.3 volt and 5 volt.
• GND (8)(Ground) − There are several GND pins on the Arduino, any of which can be
used to ground your circuit.
• Vin (9) − This pin also can be used to power the Arduino board from an external power
source, like AC mains power supply.
10. Analog pins
The Arduino UNO board has six analog input pins A0 through A5. These pins can read the
signal from an analog sensor like the humidity sensor or temperature sensor and convert it
into a digital value that can be read by the microprocessor.

11. Main microcontroller


Each Arduino board has its own microcontroller (11). You can assume it as the brain of
your board. The main IC (integrated circuit) on the Arduino is slightly different from board to
board. The microcontrollers are usually of the ATMEL Company. You must know what IC your
board has before loading up a new program from the Arduino IDE. This information is available
on the top of the IC. For more details about the IC construction and functions, you can refer to the
data sheet.

12. ICSP pin


Mostly, ICSP (12) is an AVR, a tiny programming header for the Arduino consisting of
MOSI, MISO, SCK, RESET, VCC, and GND. It is often referred to as an SPI (Serial
Peripheral Interface), which could be considered as an "expansion" of the output. Actually,
you are slaving the output device to the master of the SPI bus.

13. Power LED indicator

This LED should light up when you plug your Arduino into a power source to indicate that
your board is powered up correctly. If this light does not turn on, then there is something
wrong with the connection.

14. TX and RX LEDs

On your board, you will find two labels: TX (transmit) and RX (receive). They appear in
two places on the Arduino UNO board. First, at the digital pins 0 and 1, to indicate the pins
responsible for serial communication. Second, the TX and RX led (13). The TX led flashes
with different speed while sending the serial data. The speed of flashing depends on the
baud rate used by the board. RX flashes during the receiving process.

15. Digital I/O

• The Arduino UNO board has 14 digital I/O pins (15) (of which 6 provide PWM (Pulse
Width Modulation) output. These pins can be configured to work as input digital pins to
read logic values (0 or 1) or as digital output pins to drive different modules like LEDs,
relays, etc. The pins labeled “~” can be used to generate PWM.

16. AREF
• AREF stands for Analog Reference. It is sometimes, used to set an external
referencevoltage (between 0 and 5 Volts) as the upper limit for the analog input pins.
Program an Arduino
➢ The most important advantage with Arduino is the programs can be directly loaded to
thedevice without requiring any hardware programmer to burn the program.
➢ This is done because of the presence of the 0.5KB of Bootloader which allows
theprogram to be burned into the circuit.
➢ All we have to do is to download the Arduino software and writing the code.
➢ The Arduino tool window consists of the toolbar with the buttons like verify, upload,
new, open, save, serial monitor.
➢ It also consists of a text editor to write the code, a message area which displays the
feedback like showing the errors, the text console which displays the output and a series
of menus like the File, Edit, Tools menu.

Steps to program an Arduino


➢ Programs written in Arduino are known as sketches. A basic sketch consists of 3 parts

1. Declaration of Variables.
2. Initialization: It is written in the setup () function.
3. Control code: It is written in the loop () function.

➢ The sketch is saved with .ino extension. Any operations like verifying, opening a sketch,
saving a sketch can be done using the buttons on the toolbar or using the tool menu.

➢ The sketch should be stored in the sketchbook directory.

➢ Chose the proper board from the tools menu and the serial port numbers.

➢ Click on the upload button or chose upload from the tools menu. Thus the code is
uploaded by the bootloader onto the microcontroller.

Basic Adruino functions are:


➢ digitalRead(pin): Reads the digital value at the given pin.

➢ digitalWrite(pin, value): Writes the digital value to the given pin.

➢ pinMode(pin, mode): Sets the pin to input or output mode.

➢ analogRead(pin): Reads and returns the value.

➢ analogWrite(pin, value): Writes the value to that pin.


➢ serial.begin(baud rate): Sets the beginning of serial communication by setting the bit
rate.
Design your own Arduino
➢ The following components are needed to design Arduino Board- A breadboard, a led, a
power jack, a IC socket, a microcontroller, few resistors, 2 regulators, 2 capacitors.

• The IC socket and the power jack are mounted on the board.

• Add the 5v and 3.3v regulator circuits using the combinations of


regulatorsand capacitors.

• Add proper power connections to the microcontroller pins.

• Connect the reset pin of the IC socket to a 10K resistor.

• Connect the crystal oscillators to pins 9 and 10

• Connect the led to the appropriate pin.

• Mount the female headers onto the board and connect them to the
respectivepins on the chip.

• Mount the row of 6 male headers, which can be used as an alternative


toupload programs.

• Upload the program on the Microcontroller of the readymade Adruino


andthen pry it off and place back on the user kit.

Advantages of Arduino Board

1. It is inexpensive
2. It comes with an open source hardware feature which enables users to develop their own
kit using already available one as a reference source.
3. The Arduino software is compatible with all types of operating systems like Windows,
Linux, and Macintosh etc.
4. It also comes with open source software feature which enables experienced software
developers to use the Arduino code to merge with the existing programming language
libraries and can be extended and modified.
5. It is easy to use for beginners.
6. We can develop an Arduino based project which can be completely stand alone
orprojects which involve direct communication with the software loaded in the
computer.
7. It comes with an easy provision of connecting with the CPU of the computer using
serialcommunication over USB as it contains built in power and reset circuitry.
Raspberry Pi
➢ The Raspberry Pi is a very cheap computer that runs Linux, but it also provides a set of
GPIO (general purpose input/output) pins that allow you to control electronic
components for physical computing and explore the Internet of Things (IoT).
➢ Raspberry Pi was basically introduced in 2006.
➢ It is particularly designed for educational use and intended for Python.
➢ A Raspberry Pi is of small size i.e., of a credit card sized single board computer, which is
developed in the United Kingdom (U.K) by a foundation called Raspberry Pi.
➢ There have been three generations of Raspberry Pis: Pi 1, Pi 2, and Pi 3
➢ The first generation of Raspberry (Pi 1) was released in the year 2012, that has two
typesof models namely model A and model B.
➢ Raspberry Pi can be plugged into a TV, computer monitor, and it uses a standard
keyboard and mouse.
➢ It is user friendly as can be handled by all the age groups.
➢ It does everything you would expect a desktop computer to do like word-
processing,browsing the internet spreadsheets, playing games to playing high definition
videos.
➢ All models feature on a broadcom system on a chip (SOC), which includes chip graphics
processing unit GPU(a Video Core IV), an ARM compatible and CPU.
➢ The CPU speed ranges from 700 MHz to 1.2 GHz for the Pi 3 and on board memory
range from 256 MB to 1 GB RAM.
➢ An operating system is stored in the secured digital SD cards and program memory
ineither the MicroSDHC or SDHC sizes.
➢ Most boards have one to four USB slots, composite video output, HDMI and a 3.5
mmphone jack for audio. Some models have WiFi and Bluetooth.
➢ Several generations of Raspberry Pis have been released.
➢ All models feature a Broadcom system on a chip (SoC) with an integrated ARM-
compatible central processing unit (CPU) and on-chip graphics processing unit (GPU).
➢ Processor speed ranges from 700 MHz to 1.4 GHz for the Pi 3 Model B+ or 1.5 GHz for the
Pi 4; on-board memory ranges from 256 MB to 1 GB with up to 4 GB available onthe Pi
4 random-access memory (RAM).
➢ Secure Digital (SD) cards in MicroSDHC form factor (SDHC on early models) are used to
store the operating system and program memory.
➢ The boards have one to five USB ports. For video output, HDMI and composite video are
supported, with a standard 3.5 mm tip-ring-sleeve jack for audio output.
➢ Lower-level output is provided by a number of GPIO pins, which support common
protocols like I²C. The B-models have an 8P8C Ethernet port and the Pi 3 and Pi Zero W
have on-board Wi-Fi and Bluetooth.
Components and Peripherals

➢ Voltages: Two 5V pins and two 3V3 pins are present on the board, as well as a number
of ground pins (0V). The remaining pins are all general purpose 3V3 pins
➢ A GPIO pin designated as an output pin can be set to high (3V3) or low (0V). A GPIO pin
designated as an input pin can be read as high (3V3) or low (0V).
➢ Processor & RAM: Raspberry based on ARM11 processor. Latest version supports
700MHz processor and 512MB SDRAM. The Central processing unit is the brain of the
raspberry pi board and that is responsible for carrying out the instructions of the
computerthrough logical and mathematical operations.
➢ Ethernet: The Ethernet port of the raspberry pi is the main gateway for communicating
with additional devices. The raspberry pi Ethernet port is used to plug your home router
to access the internet.
➢ USB Ports: It has 2 USB ports. USB port provide current upto 100mA. For
connecting devices that draw current more than 100mA, an external USB
powered hub is required.
➢ Ethernet Port: It has standard RJ45 Ethernet port. Connect Ethernet cable or
USB wifi adapter to provide internet connectivity.
➢ HDMI Output: It supports both audio and video output. Connect raspberry Pi
to monitorusing HDMI cable.
➢ Composite video Output: Raspberry comes with a composite video output
with an RCAjack that supports both PAL and NTSC video output.
➢ Audio Output: It has 3.5mm audio output jack. This audio jack is used for
providing audio output to old television along with RCA jack for video.
➢ GPIO Pins: It has a number of general purpose input/output pins. These pins
are used to connect other electronic components. For example, you can
connect it to the temperature sensor to transmit digital data.
➢ Display Serial Interface (DSI): DSI interface are used to connect an LCD panel
to Raspberry PI.
➢ Cameral Serial Interface(CSI): CSI interface are used to connect a camera
module to Raspberry PI.
➢ SD Card slot: Raspberry does not have built in OS and storage. Plug in an SD
card loaded with Linux to SD card slot.
➢ Power Input: Raspberry has a micro USP connector for power input.
➢ Memory: The raspberry pi model A board is designed with 256MB of SDRAM
and model B is designed with 51MB.Raspberry pi is a small size PC compare
with other PCs.The normal PCs RAM memory is available in gigabytes. But in
raspberry pi board, the RAM memory is available more than 256MB or
512MB
➢ Status LEDs: Raspberry has 5 status LEDs.
Status LED Function
ACT SD card Access
PWR 3.3V power is present
FDX Full duplex LAN Connected
LNK Link/Network Activity
100 100 Mbit LAN connected
Raspberry PI Interfaces:
➢ It supports SPI, serial and I2C interfaces for data transfer.
➢ Serial : Serial Interface on Raspberry has receive(Rx) and Transmit(Tx) pins for
communication with serial peripherals.
➢ SPI: Serial Peripheral Interface (SPI) is a synchronous serial data protocol used for
communicating with one or more peripheral devices. In an SPI connection, there
is one master device and one or more peripheral devices. There are 5 pins
Raspberry for SPI interface.
o MISO(Master In Slave Out): Master line for sending data to the peripherals.
o MOSI(Master Out Slave In): Slave Line for sending data to the master.
o SCK(Serial Clock): Clock generated by master to synchronize data
transmission
o CE0(Chip Enable 0): To enable or disable devices.
o CE1(Chip Enable 1): To enable or disable devices.
➢ I2C: I2C Interface pins are used to connect hardware modules. I2C
interface allowssynchronous data transfer with two pins: SDA(data line)
and SCL (Clock Line)

Features of Raspberry PPI


1. Where the system processing is huge. They can process high end programs for
applications like Weather Station, Cloud server, gaming console etc. With 1.2GHz
clock speed and 1 GB RAM RASPBERRY PI can perform all those advanced functions.

2. RASPBERRY PI 3 has wireless LAN and Bluetooth facility by which you can setup
WIFI HOTSPOT for internet connectivity.

3. RASPBERRY PI had dedicated port for connecting touch LCD display which is a
feature that completely omits the need of monitor.

4. RASPBERRY PI also has dedicated camera port so one can connect camera without
any hassle to the PI board.

5. RASPBERRY PI also has PWM outputs for application use.

6. It supports HD steaming

Applications
✓ Hobby projects.
✓ Low cost PC/tablet/laptop
✓ IoT applications
✓ Media center
✓ Robotics
✓ Industrial/Home automation
✓ Server/cloud server
✓ Print server
✓ Security monitoring
✓ Web camera
✓ Gaming
✓ Wireless access point

➢ IoT Communication Model


• Request-Response
In Request–Response communication model client sends request to the server
and the server responds to the request. When the server receives the request it
decides how to respond, fetches the data, retrieves resources, and prepares the
response and sends to the client. R-R is a communication model where request
and response pair is independent of each others.

• Publish-Subscribe:
This model involves publishers, brokers and consumers. Publishers are the
sources of data. Publishers send the data to the topic which are managed by the
broker. Publishers are not aware of the consumers.
Consumers subscribe to the topics which are managed by the broker. When
broker receives the data from the Publisher, it sends to all the consumers.

• Push-Pull:
In this model the producers push the data in queues and the consumers pull the data
from the queues. Producers do not need to be aware of the consumers. Queues help
in decoupling the messaging between the producer and consumers. Queues also act
as buffer which helps in situation when there is mismatch between the rate at which
the producers push the data and consumers pull the data.
Sensors
Sensor is a device that when exposed to a physical phenomenon (temperature,
displacement, force, etc.) produces a proportional output signal (electrical, mechanical,
magnetic, etc.). The term transducer is often used synonymously with sensors.
However, ideally, a sensor is a device that responds to a change in the physical
phenomenon. On the other hand, a transducer is a device that converts one form of
energy into another form of energy. Sensors are transducers when they sense one form
of energy input and output in a different form of energy. For example, a thermocouple
responds to a temperature change (thermal energy) and outputs a proportional change
in electromotive force (electrical energy). Therefore, a thermocouple can be called a
sensor and or transducer.

Types of Sensors:
1. Linear Sensors:
Among many linear displacement sensors, strain gage
provides high resolution at low noise level and is least
expensive. A typical resistance strain gage consists of
resistive foil arranged. Strain gage 1 is bonded to the
loading member whereas strain gage 2 is bonded to a
second member made of same material, but not loaded.
This arrangement compensates for any temperature
effect.

2. Acceleration Sensors

Measurement of acceleration is important for systems subject toshock and vibration.


Although acceleration can be derived from the time history data obtainable from
linear or rotary sensors, the accelerometers hose output is directly proportional to the
acceleration is preferred. Two common types include the seismicmass type and the
piezoelectric
accelerometer. The seismic mass type accelerometer is based on the relative motion
between a mass and the supporting structure. The natural frequency of the seismic
mass limits its use to low to medium frequency applications. The piezoelectric
accelerometer, however, is compact and more suitable for high frequency
applications.

3. Force, Torque, and Pressure Sensors


Among many type of force/torque sensors, the strain gage dyanamometers and
piezoelectric type are most common. Both are available to measure force and/or torque
either in one axis or multiple axes. The dynamometers make use of mechanical
members that experiences elastic deflection when loaded. These typesof sensors are
limited by their natural frequency. On the other hand, the piezoelectric sensors are
articularly suitable for dynamic loadings in a wide range of frequencies. They provide
high stiffness, high resolution over a wide measurement range, and arecompact.
4. Flow Sensors

Pitot Tube Rotameter

Flow sensing is relatively a difficult task. The fluid medium can be liquid, gas, or a
mixture of the two. Furthermore, the flow could be laminar or turbulent and can be a
time-varying phenomenon. The venture meter and orifice plate restrict the flow and use
the pressure difference to determine the flow rate. The pitot tube pressure probe is
another popular method of measuring flow rate. When positioned againstthe flow,
they measure the total and static pressures. The flow velocity and in turn the flow rate
can then be determined. The rotameter and the turbine meters when placed in the flow
path, rotate at a speed proportional to the flow rate. The electromagnetic flow meters
use noncontact method. Magnetic field is applied in the transversedirection of the flow
and the fluid acts as the conductor to induce voltage proportionalto the flow rate.

5. Ultrasonic flow meters


measure fluid velocity by passing high-frequency sound waves through fluid. A
schematic diagram of the ultrasonic flow meter is as shown in Fig. The transmitters
(T) provide the sound signal source. As the wave travels towards the receivers (R), its
velocity is influenced by the velocity of the fluid flow due to the doppler effect. The
control circuit compares the time to interpret the flow rate. This can be used for very
high flow rates and can also be used for both upstream and downstream flow. The other
advantage is that it can be used for corrosive fluids, fluids with abrasiveparticles, as it is
like a noncontact sensor.

6. Temperature Sensors
A variety of devices are available to measure temperature, the most common of which
are thermocouples, thermisters, resistance temperature detectors (RTD), and infrared
types. Thermocouples are the most versatile, inexpensive, and have a wide range (up to
1200∞C typical). A thermocouple simply consists of two dissimilar metal
wires joined at the ends to create the sensing junction. When used in conjunctionwith a
reference junction, the temperature difference between the reference junction and the actual
temperature shows up as a voltage potential. Thermisters are semiconductor devices whose
resistance changes as the temperature changes. They are good for very high sensitivity
measurements in a limited range of up to 100
∞ C. The relationship between the temperature and the resistance is nonlinear. The RTD s use
the phenomenon that the resistance of a metal changes withtemperature. They are, however,
linear over a wide range and most stable.

7. Proximity Sensors
They are used to sense the proximity of an object relative to another object. They usually provide
a on or off signal indicating the presence or absence of an object. Inductance, capacitance,
photoelectric, and hall effect types are widely used as proximity sensors. Inductance proximity
sensors consist of a coil wound around asoft iron core. The inductance of the sensor changes
when a ferrous object is in its proximity. This change is converted to a voltage-triggered switch.
Capacitance types are similar to inductance except the proximity of an object changes the gap
and affects the capacitance. Photoelectric sensors are normally aligned with an infrared light
source. The proximity of a moving object interrupts the light beam causing the voltage level to
change. Hall effect voltage is produced when a current-carrying conductor is exposed to a
transverse magnetic field. The voltage is proportional to transverse distance between the hall
effect sensor and an object in its proximity.

8. Light Sensors

Light intensity and full field vision are two important measurements used in many control
applications. Phototransistors,photoresistors, and photodiodes aresome of the more common type
of light intensity sensors. A commonphotoresistor is made of cadmium sulphide whose resistance
is maximum
when the sensor is in dark. When the photoresistor is exposed to light, its resistance drops in
proportion to the intensity of light. When interfaced with a circuit and balanced, the change in
light intensity will show up as change in voltage. These sensors are simple, reliable, and cheap,
used widely for measuring light intensity.

Actuators
Actuators are basically the muscle behind a mechatronics system that accepts a control
command (mostly in the form of an electrical signal) and producesa change in the physical system by
generating force, motion, heat, flow, etc. Normally, the actuators are used in conjunction with the
power supply and a couplingmechanism. The power unit provides either AC or DC power at the rated
voltage and current. The coupling mechanism acts as the interface between the actuator and the
physical system. Typical mechanisms include rack and pinion, gear drive, belt drive, lead screw and
nut, piston, and linkages.
Types of Actuators

1. Electrical Actuators
Electrical switches are the choice of actuators for most of the on-off typecontrol action. Switching
devices such as diodes, transistors, triacs, MOSFET,and relays accept a low energy level command signal
from the controller and switch on or off electrical devices such as motors, valves, and heating elements.
For example, a MOSFET switch. The gate terminal receives the low energy control signal from the
controller that makes or breaks the connection between the power supply and the actuator load.
When switches are used, the designer must make sure that switch bounce problem is eliminated either
by hardware or software.

2. Electromechanical Actuators
The most common electromechanical actuator is a motor that converts
electrical energy to mechanical motion. Motors are the principal means of
converting electrical energy into mechanical energy in industry. Broadly
they can be classified as DC motors, AC motors, and stepper motors. The
stepper motor is a discrete (incremental) positioning device that moves
one step at a time for each pulse command input. Since they accept direct
digital commands and produce a mechanical motion, the stepper motors
are used widely in industrial control applications. They are mostly used
in fractional horsepower applications. With the rapid progress in low cost
and high frequency solid-state drives, they are finding increased
applications.
Figure shows a simplified unipolar stepper motor. The winding-1 is between the top and bottom
stator pole, and the winding-2 is between the left and right motor poles. The rotor is a permanent
magnet with six poles resulting in a single step angle of 30∞. With appropriate excitation of winding-
1, the top stator pole becomes a north pole and the bottom stator pole becomes a south pole. This
attracts the rotor into the position as shown. Now if the winding-1 is de-energized and winding-2 is
energized, the rotor will turn 30∞.

3. Electromagnetic Actuators
The solenoid is the most common electromagnetic actuator. A DC solenoid actuator consists of a soft
iron core enclosed within a current carrying coil. When the coil is energized, a magnetic field is
established that provides the force to push or pull the iron core. AC solenoid devices are also
encountered, such as AC excitation relay. A solenoid operated directional control valve is shown in
Fig. 2.10. Normally, due to the spring force, the soft iron core is pushed to the extreme left position
as shown. When the solenoid is excited, the soft iron core will move to the right extreme position thus
providing the electromagnetic actuation. Another important type is the electromagnet. The
electromagnets are used extensively inapplications that require large forces.
4. Smart Material Actuators
Unlike the conventional actuators, the smart material actuators
typically become part of the load bearing structures. This is achieved
by embedding the actuators in a distributed manner and integrating
into the load bearing structure that could be used to suppress
vibration, cancel the noise, and change shape. Of the many smart
material actuators, shape memory alloys, piezoelectric (PZT),
magnetostrictive,
, logical fluids, and ion exchange polymers are most common.
The PZT actuators are essentially piezocrystals with top and bottom conducting filmsas shown in Fig.
When an electric voltage is applied across the two conducting films, the crystal expands in the
transverse direction as shown by the dotted lines. When the voltage polarity is reversed, the crystal
contracts thereby providing bidirectional actuation.

5. Micro- and Nanoactuators


Microactuators, also called micromachines,
microelectromechanical system (MEMS), and microsystems
are the tiny mobile devices being developed utilizing the
standard microelectronics processes with the integration of
semiconductors and machined micromechanical elements.
Another definition states that any device produced by
assembling extremely small functional parts of around 1–15
mm is called a micromachine.
In electrostatic motors, electrostatic force is dominant, unlike the conventional motors that are
based on magnetic forces. For smaller micromechanical systems the electrostatic forces are well
suited as an actuating force. Figure 2.15 shows one type of electrostatic motor. The rotor is an annular
disk with uniform permitivity andconductivity. In operation, a voltage is applied to the two conducting
parallel plates separated by an insulation layer. The rotor rotates with a constant velocity between the
two coplanar concentric arrays of stator electrodes.

I/O interfaces
The Input Output Interface (IOI) is a technique for exchanging data between internal and
external storage and I/O devices.
The Input-Output Interface (I/O) is a means for moving data between internal storage devices,
such as memory, and external peripheral devices. A peripheral device, often known as an
input-output device, is a device that provides input and output for a computer. Consider the
following scenario: Input devices, such as a keyboard and mouse, offer input to the computer,
and output devices, such as a monitor and printer, provide output to the computer. In addition
to external hard drives, several peripheral devices that can provide both input and output are
also available.
For peripherals connected to a computer to communicate with the central processing unit,
special communication cables are required.
The communication link's aim is to reconcile the disparities between the central computer and
each peripheral.

The following are the main differences:


1. Electronic devices are CPU and memory, whereas electromechanical and electromagnetic
devices are peripherals. As a result, signal values may need to be converted.
2. Because peripheral data transfer rates are typically slower than CPU data transfer rates,
a synchronization mechanism may be required.
3. The word format in the CPU and RAM differs from the data codes and formats in
the peripherals.
4. Peripheral operating modes differ from one another and must be managed so as not to interfere
with the operation of other peripherals attached to the CPU.
Computer systems include additional hardware components between the CPU and peripherals
to supervise and synchronize all input and out transfers in order to resolve these mismatches.
● Because they connect the CPU bus to peripheral devices, these components are known
as Interface Units.
Functions
● It's utilized to keep the CPU's operating speed in sync with the input-output
devices.
● It chooses the input-output device that is best suited for the input-output device's
interpretation.
● It can send out signals such as control and timing signals.
● Data buffering is possible through the data bus in this case.
● There are several types of error detectors.
● Serial data is converted to parallel data and vice versa.
● It can also convert digital data to analog signals and the other way around.
Unit – III
Software Components- Programming API’s (using Python / Node.js /Arduino)
for Communication

The Arduino Rest API is a way for Arduino and other external systems to communicate data.
It is possible to operate Arduino from afar using the Arduino Rest API framework. The
confluence of APIs and IoT creates new integration possibilities. The creation of an API
ecosystem is a fascinating topic, and the way we use APIs to access IoT services exposed
by remote IoT boards is a difficult component.
In greater detail, a client application uses the Arduino Rest API to read or transmit data to
the Arduino board. An external system or application that retrieves sensor values is a
common use case for HTTP Rest API.
When different systems and boards are connected and share information, the Arduino Rest
API framework can be used in IoT projects. The Arduino Rest API is used by IoT cloud
companies as well. This type of method is used when an external application (client) submits
a request to Arduino, and Arduino responds with data.
Because the Arduino Rest API uses the HTTP protocol, these queries are synchronous. Other
protocols, like as MQTT, can be utilized in IoT applications. When Arduino is acting as a
server in a client-server scenario, the Arduino API over HTTP plays a critical role. MQTT,
for example, employs a structure known as publish-subscribe.

Arduino rest framework


There is an intriguing library called aRest that may be used to construct a Rest API
architecture. This library is a framework for Restful services that includes a number of useful
features. This library works with a variety of development boards, including Arduino,
Raspberry Pi, and ES8266. More information is available on a Rest website.
This library is easy to use and may be acquired from the Arduino library directly
through the Arduino IDE.
We can implement the API using this library because it supports aRest:
● Reading pin values in rest style
● Writing pin values in rest style
● Remote sketch function call

Arduino implementations
Now that we've covered the fundamentals of Arduino and how to utilize it to connect it to an
external system, we'll go through how to put it into reality. We'll use Rest API requests to
control an LED strip in this example. Because we need to concentrate on the Arduino Rest
API, the sketch is straightforward. The LED strip is a Neopixels RGB Stick Board, and it is
able to select a single RGB led color using the Adafruit library.
The following sketch demonstrates how to connect it to an Arduino UNO.
Fig : Arduino UNO

The Neopixel components in this image are different, but the connections are the
same.
We want to change the color of the led strip using a Rest JSON API call. The color
is supplied as a HEX parameter to the sketch function. This sample exemplifies the
library's versatility. The Arduino code is straightforward:
// Create aREST
instance AREST rest =
aREST();
// NeoPixel Init
Adafruit_NeoPixel pixels = Adafruit_NeoPixel(NUMPIXELS, PIN, NEO_GRB +
NEO_KHZ800);

Void setup() {
Serial.begin(115200);

// Register RGB function


Rest.function("rgb",
setPixelColor); Serial.println("Try
DHCP...");
If (Ethernet.begin(macAdd) == 0) {
Serial.println("DHCP FAIL...Static IP");
Ethernet.begin(macAdd , ip, myDns, myGateway) ;
}
Server.begin();
Serial.print("server IP: ");
Serial.println(Ethernet.localIP());

Pixels.begin();
Serial.println("Setup
complete.\n");
}
Void loop() {
// listen for incoming clients
EthernetClient client =
server.available(); Rest.handle(client);
Wdt_reset();
}
Int setPixelColor(String hexColor) {
HexColor="0x" + hexColor;
Serial.println("Hex color " +
hexColor); Long n = strtol(
&hexColor[0], NULL, 16);
Serial.println("N :" + String(n));
Long r = n << 16;
Long g = n << 8 &&
0xFF; Long b = n &&
0xFF;
// set single pixel color
Return 1;
}
SetColor is the Arduino function that we'd like to make available via an Arduino HTTP
Rest API. As a result, the sketch registers it as rgb at line 36.

Protocols-MQTT
MQTT (Message Queuing Telemetry Transport) is an IBM-developed lightweight
messaging protocol that was initially introduced in 1999. It interprets communications
between devices, servers, and applications using the pub/sub pattern.
The MQTT protocol was established with the goal of connecting sensors on oil
pipelines to communications satellites with the least amount of battery loss and
bandwidth use possible.
MQTT has been evolving since its creation, with version 5.0 being released in May
2018. Version 3.1.1 was accepted as an ISO standard after being submitted to the
OASIS consortium in 2013.
Advantages
The following are some of the advantages of MQTT:
● Lightweight code footprint - The MQTT protocol requires only a few lines of
code to get up and running on devices.
● Minimized data packets - MQTT is a low-energy protocol. If a device is
battery- powered or has a low CPU, this is ideal.
● Speed - Outside of QoS, MQTT functions in real time with no delays.

● Ease of Implementation - MQTT includes libraries in a number of programming


languages, including Elixir and Python.
● Last will and testament - If a client disconnects abruptly, you can send a message
to all subscribers with information on how to fix the problem.
● Retained messages - When a client subscribes to a topic, it will automatically get
one retained message for that subject (like a pinned post on social media).

MQTT architecture
In the MQTT protocol, connected devices are known as "clients," and they
communicate with a server known as the "broker." Data communication between
clients is handled by the broker.
When a customer (known as a "publisher") wants to disseminate information, it publishes
to a specific topic, which the broker then distributes to any clients who have subscribed
to that topic (known as "subscribers").

The publisher does not require information on the number of subscribers or their
locations. As a result, subscribers do not require any information about the publisher.
Any client can be both a publisher and a subscriber. The clients are usually unaware of
each other and are only aware of the broker who acts as an intermediary. The “pub/sub
model” is a popular term for this structure.

Fig 4: MQTT workflow

MQTT messages
A “publish” occurs when a customer wishes to submit data to the broker. A client will
"subscribe" to a subject or topics if they desire to get data from the broker. When a
client subscribes to a topic, it will get all future messages that are published on that
subject.
The publisher additionally sends a QoS (Quality of Service) level along with the
message. This level specifies the message's delivery guarantee. The following are the
levels of QoS:
● At most once - The broker will only get the message "at most once" after it is
published. This level should not be utilized for mission-critical information since it
increases the danger of the message not being received by the intended recipients.
● At least once - The publisher will continue to resend the message until it obtains a
response from the broker on the specific message. In other words, ensuring that the
message is received is more critical than ensuring that it is only received once. This is
most likely the most used QoS level.
● Exactly once - The publisher and the broker collaborate to ensure that the broker
receives and acts on messages only once. This necessitates some more effort in the
form of a four-part handshake. This is the safest QoS level, but it's also the slowest,
therefore it's only used when absolutely required.

ZigBee
Zigbee is a standards-based wireless technology that enables low-cost, low-power wireless
M2M and internet of things (IoT) networks.
Zigbee is an open standard for low-data-rate, low-power applications. This allows for the
mixing of implementations from different manufacturers in theory, but in practice, vendors
have expanded and personalized Zigbee devices, resulting in interoperability concerns.
Unlike Wi-Fi networks, which employ a mesh networking protocol to avoid hub devices
and establish a self-healing design, Zigbee networks support significantly lower data rates
and utilize a mesh networking protocol to avoid hub devices and build a self-healing
architecture.
Furthermore, these mesh networks self-configure when devices are added or withdrawn,
and their interconnection allows for a greater coverage range than competitors like
Bluetooth Low Energy.
Despite this, Zigbee remains a low-range communication standard, with a coverage
range of up to 100 meters. As a result, it's an excellent solution for personal spaces such
as smart homes or in-building operations.
A coordinator, a router, and a device make up a Zigbee network. The coordinator
serves as the network's hub, connecting all of its components and managing data
transfer and storage.
The routers in the network support Zigbee coordinators. These are data-transfer devices
that send and receive data from a variety of devices, including televisions, doors,
cameras, and thermostats.
Zigbee is known for its secure connections, which is why it's often the chosen choice
for personal area networks, particularly in corporate networks with sensitive data.
Because of its low power consumption, Zigbee is a better choice for IoT connectivity than
Wifi. It's utilized for a variety of tasks, such as smart building automation, temperature
management, and more.
Zigbee is an ideal partner for any business where little amounts of data are exchanged
rarely, such as remote monitoring or in-building applications.
The properties of ZigBee set it unique from other conceivable IoT protocols, allowing
it to carve out its own niche in the market. Because of its mesh topography, it can handle
longer distances than Bluetooth Low Energy, and its extremely low energy consumption
makes it more IoT-friendly than Wi-Fi.
According to Gigaom, after the chips are extensively utilized in houses, the next stage
will be to include a ZigBee chip in cellphones. Because the homeowner's primary method
of communicating with sensors in the home is through their smartphone or tablet, having
such a chip built inside would put it in the hands of millions of smartphone owners who
could turn it on at the touch of a button.
ZigBee radios are currently installed in homes via a hub, router, or set-top box, making
their adoption by homeowners reliant on service providers and early adopters of
products such as the Almond Router, SmartThings hub, or Revolv hub.

However, ZigBee already has a considerable presence in the market. In fact, if you
have a Nest thermostat, Comcast's new router, or a Hue lighting, you already have
ZigBee chips.
Unfortunately, the specification has had several difficulties in recent years, with
interoperability issues highlighting much of its content. The issue is that the standard is
more than simply a wireless transport method; it also includes a layer of software that
can build profiles that conflict with other ZigBee profiles. So, unlike Wi-Fi, it's possible
that two ZigBee-enabled devices won't be able to communicate with one another.
Another obstacle that ZigBee must overcome is Z-Wave, its closest competitor. According
to Gigaom, nine out of ten sensors use the proprietary Z-wave protocol instead of ZigBee,
and more startups are releasing Bluetooth Low Energy devices that can talk with
smartphones.

Bluetooth
Bluetooth was created by Ericsson in 1994 to provide wireless headsets. Bluetooth has
since evolved into a wide range of products, including Bluetooth headsets, speakers,
printers, game controllers, and much more.
Bluetooth is particularly vital for the Internet of Things, which includes smart homes
and industrial applications, which is quickly developing. It's a low-power, low-range,
high-bandwidth solution for connectivity. When Bluetooth devices (for example, your
phone and your wireless speaker) connect, the parent-child paradigm is used, with one
device acting as the parent and the others as the children. The parent communicates with
the child, and the youngster listens for the parent to communicate with him or her.
Because a Bluetooth parent can have up to seven children, your computer can
connect to several devices through Bluetooth at the same time. A “piconet” is a
Bluetooth connection between two or more devices.
A device can be a parent in one piconet and a kid in another at the same time, and the
parent-child relationship can also change. When you put your Bluetooth device in pairing
mode to connect it, it becomes the parent for a short time in order to establish a connection
before connecting as the child.
Bluetooth, unlike WiFi, which we discussed in the previous chapter, was designed for
portable devices and related applications, so it excels when you need to connect two
devices with minimal configuration. Furthermore, because Bluetooth uses weak signals,
there is less interference, and devices may interact even in noisy surroundings.
Machines sending short bursts of data in excessively loud surroundings are common in
the Industrial Internet of Things. WiFi is too difficult to set up when there are hundreds
of sensors and devices sending data.
The lesser bandwidth of Bluetooth is a disadvantage, although for many industrial
applications, this isn't an issue.
Bluetooth can also be used in a smart home. Many smart home gadgets don't require high
bandwidth connections, and setting up Bluetooth is significantly easier.
Furthermore, recent Bluetooth versions may build a self-healing mesh network, which
implies that individual devices can still interact even if one is removed or loses power.
If your door locks, HVAC system, washer, dryer, fridge, and lights are all connected,
you don't want them to all fail at the same time.
Bluetooth Strengths and Weaknesses
Bluetooth's main strength is communication between Bluetooth-enabled devices such
as smartphones and tablets and specialized Bluetooth-enabled equipment. Bluetooth
requires a gateway for access since, unlike cellular or satellite communications, it does
not connect directly to the Internet. Bluetooth now has a range of roughly 328 feet (100
meters), making it ideal for use in the home and small business. Multiple gateways can
be set up throughout a facility to receive Bluetooth communications forlarger spaces.
Bluetooth 5 was announced by the Bluetooth SIG in March 2016, and it will double the
existing range of the technology, perhaps making Bluetooth more appealing for IoT
applications than Wi-Fi because it uses less power. Despite the improved range,
Bluetooth IoT requires device-to-device communications to take place within a specific
radius, and after the devices have communicated, their data must still reach a gateway
for Internet access. When compared to satellite or wireless cellular networks,which can
monitor object data regardless of location and interact with the internet
instantaneously, satellite or wireless cellular networks are superior. Cellular connectivity
will continue to be a better choice in remote locations, such as when used to track oil
and construction equipment.

CoAP
In the Internet of Things, the Confined Application Protocol (CoAP) is a customized
web transfer protocol for usage with constrained nodes and constrained networks.
CoAP is a protocol that allows basic, restricted devices to connect to the Internet of
Things, even across constrained networks with poor bandwidth and availability.
Machine-to-machine (M2M) applications such as smart energy and building
automation are common uses.
The main features of CoAP protocols are:
● Web protocol used in M2M with constrained requirements
● Asynchronous message exchange
● Low overhead and very simple to parse
● URI and content-type support
● Proxy and caching capabilities

Architecture
CoAP is a document transport protocol, similar to HTTP. Unlike HTTP, CoAP is created
with restricted devices in mind.
HTTP TCP transfers are substantially larger than CoAP packets. To save space, bitfieldsand
mappings from strings to integers are frequently utilized. Packets are simple to create
and can be parsed in place on restricted devices without spending additional RAM.
CoAP uses UDP rather than TCP. Connectionless datagrams are used to communicate
between clients and servers. In the application stack, retries and reordering are
implemented. By eliminating the need for TCP, compact microcontrollers may be able
to provide complete IP networking. CoAP enables the usage of UDP broadcast and
multicast for addressing.
The client/server model is used in CoAP. Clients send requests to servers, and servers
respond. Clients have access to resources that they can GET, PUT, POST, and DELETE.
Through simple proxies, CoAP is meant to work with HTTP and the RESTful web in
general.
CoAP can be used on top of SMS and other packet-based communications protocols
because it is datagram-based.
CoAP can be represented as follows from the abstraction protocol layer:

Fig: CoAP
The CoAp protocol is made up of two layers: messages and request/response. The
Messages layer is responsible for UDP and asynchronous messages. Based on
request/response messages, the Request/Response layer manages request/response
interaction.
Four different message types are supported by CoAP:
● Confirmable
● Non-confirmable
● Acknowledgment
● Reset

The CoAp protocol, it's helpful to define a few terminologies.


● Endpoint - An object that takes part in the CoAP protocol. An Endpoint is
usually associated with a host.
● Sender - The person or thing who transmits a message.
● Recipients - A message's final destination.
● Client - The sender of a request and the recipient of the response.
● Server - The entity that accepts a client's request and responds with a response to
the client.

UDP
User Datagram Protocol (UDP) is less widespread in IoT (and data transmission in
general) than TCP. However, IoT manufacturers favor UDP since it requires fewer
network resources to transmit and does not require a continual connection between the
two endpoints. To put it another way, it uses less data and utilizes less energy.
Resource constrained devices
Low-power, lossy networks are frequently used by IoT devices (LLNs). Because LLNs
are optimized for power efficiency, they have a limited number of resources. The
Constrained Application Protocol (CoAP) was created expressly to assist these devices
in communicating, and it works on UDP-capable devices.
Low downlink transmissions
UDP does not acknowledge that a communication has been received. Although the sender
has no way of knowing whether the data packets have reached, the exchange requires less
downlink budget. UDP can be a useful communication protocol for communications with
limited downlink allowances.
Low power applications
Because IoT devices send data on a regular basis, losing a single datapoint is rarely a
problem. Every time a datapoint is lost or contains an error, attempting to resend the data
uses an additional battery. Because UDP does not provide an acknowledgement, the device
can shut down faster after sending or receiving data. This makes UDP appealing to
developers who want to get the most out of their resources.
UDP Security
While UDP is simple to set up and has a lower overhead, it makes your devices more
exposed to cyber threats.
It's more difficult to deliver a packet to a specific application using TCP because it
establishes a direct connection and provides a sequence number. Intercepting, altering,
and replicating data packets to attack a device, application, or network is easy with UDP.
Botnets (large networks of compromised computers, including IoT devices) can also
deliver false packets to a computer using UDP. Bots frequently transmit spam to non-
existent ports, forcing the computer to respond by stating that the port is inaccessible. This
swiftly diverts network resources away from legitimate data transmissions, potentially
causing the network to go down.
You must be vigilant about IoT security with UDP and be certain that your hardware
and network-level security can secure your customers' data and keep your devices from
becoming liabilities.

UDP datagrams
UDP traffic is carried in datagram packets, each of which is made up of a single message
unit. The first eight bytes hold the header information, but the remaining bytes hold the
actual message. The header of a UDP datagram is broken into four pieces, each of which
is two bytes long. These are the components:
● Source port - This 16-bit (2-byte) information is used to identify the data-sending
sender port. The range of permitted UDP port numbers is 0 to 65535.
● Destination port - This 16-bit data is used to identify the port on which the data
will be received by the receiver. The range of permitted UDP port numbers is 0 to
65535. This parameter is mandatory and identifies the receiver's port.
● Length - The length field gives the UDP packet's total length (UDP header and UDP
data). This specific field is a 16-bit field. In the absence of UDP data, the Length field
must be at least 8 bytes long.
● Checksum - The checksum value computed by the sender before delivering the data
to the recipient is stored in this field. UDP checksums keep message data from being
tampered with. The checksum value is an encoding of the datagram data that is calculated
by the sender first and then by the receiver. In UDP, checksums are optional, whereas in
TCP, checksums are required.

UDP Features
The User Datagram Protocol offers properties that make it useful for applications that can
suffer data loss. Consider the following scenario:
● It permits packets to be lost and received in a different order than when they
were sent, making it ideal for real-time applications where latency is an issue.
● It's suitable for transaction-based protocols like DNS and Network Time Protocol
(NTP).
● Gaming, audio or video conferencing, and streaming media are examples of
applications where a large number of customers are connected and real-time mistake
correction isn't required.

Advantages of UDP
The UDP/IP stack has the following benefits over the TCP/IP stack:
1) It is superior to TCP for applications that require continual data flow, large amounts of
data, and a higher level of speed than reliability.
2) Because it provides point-to-multipoint transmission, UDP is the best choice for
multicast and broadcast applications. In contrast to TCP/IP, where the sender is
responsible for each packet, the sender does not need to keep track of data
retransmission for many receivers.
3) UDP has a tiny packet header overhead (only 8 bytes), but TCP has a header of 20
bytes.

TCP
TCP is used in conjunction with the Internet Protocol (IP), which specifies how
computers exchange data packets. TCP and IP are the fundamental rules that govern the
Internet. The Internet Engineering Task Force (IETF) defines TCP in RFC 793, a
Request for Comment (RFC) standards document. TCP is a connection-oriented
protocol, which means it establishes and maintains a connection until both ends'
application programs have done exchanging messages.
TCP (Transmission Control Protocol) is a connection-oriented transport-layer protocol
that provides end-to-end reliable and ordered data transfer between applications
operating on Internet hosts. It was created four decades ago. TCP has remained the
dominant transport-layer protocol on the Internet ever since, with many key applications
(such as the WWW, e-mail, file transfer, instant messaging, and so on) relying on it.
However, as the Internet has grown beyond its core qualities, TCP has faced and
overcome enormous hurdles.
TCP has been effectively employed on mobile networks, despite the fundamental premise
of TCP congestion control that the Internet is a wired network and the challenges that
arise in wireless environments. TCP's extensive presence in mobile phones today is due
to optimization approaches.
The Internet of Things is a new challenge for TCP (IoT). Tens of billions of affordable
devices (e.g., sensors, actuators, etc.) attached to everyday things will be connected to
the Internet to enable smart scenarios in this big networking trend. IoT devices, on the
other hand, are frequently constrained (in terms of memory, computation, and energy),
employ low-speed and error-prone connectivity, and have multi-hop networks.
TCP has been heavily chastised as a transport-layer protocol for the Internet of Things due
to these challenging networking settings. As a result, many early IP-based IoT
implementations had to rely on UDP for application-layer dependability. The Constrained
Application Protocol (CoAP), a lightweight RESTful application-layer protocol designed
at the IETF for the Internet of Things, took the same approach.
Similarly, the IPv6 over Low Power Wireless Personal Area Networks project produced
enhancements for UDP header compression while neglecting TCP.

Unit – IV
DATA ACQUIRING AND STORAGE:
Following subsections describe devices data, and steps in acquiring and storing data for an
application, service or business process.
Data Generation:
⦿ Data generates at devices that later on, transfers to the Internet through a gateway.
Data generates as follows:
⦿ ● Passive devices data: Data generate at the device or system, following the result of
interactions. A passive device does not have its own power source. An external sourcehelps
such a device to generate and send data. Examples are an RFID (Example 2.2) or an ATM
debit card (Example 2.3). The device may or may not have an associated microcontroller,
memory and transceiver. A contactless card is an example of the former and a label or
barcode is the example of the latter.
⦿ Active devices data: Data generates at the device or system or following the result of
interactions. An active device has its own power source. Examples are active RFID,
streetlight sensor (Example 1.2) or wireless sensor node. An active device also has an
associated microcontroller, memory and transceiver.
⦿ Event data: A device can generate data on an event only once. For example, on detection of
the traffic or on dark ambient conditions, which signals the event. The event on darkness
communicates a need for lighting up a group of streetlights (Example 1.2). A system
consisting of security cameras can generate data on an event of security breach or on
detection of an intrusion. A waste container with associate circuit can generate data in the
event of getting it filled up 90% or above. The components and devices in an automobile
generate data of their performance and functioning. For example, on wearing out of a brake
lining, a play in steering wheel and reduced air- conditioning is felt. The data communicates
to the Internet. The communication takes place as and when the automobile reaches near a
Wi-Fi access point.
⦿ Device real-time data: An ATM generates data and communicates it to the server
instantaneously through the Internet. This initiates and enables Online Transactions
Processing (OLTP) in real time.
⦿ Event-driven device data: A device data can generate on an event only once. Examples are:
(i) a device receives command from Controller or Monitor, and then performs action(s)
using an actuator. When the action completes, then the device sends an acknowledgement;
(ii) When an application seeks the status of a device, then the devicecommunicates the status.

Data Acquisition:
Data acquisition means acquiring data from IoT or M2M devices. The data communicates
after the interactions with a data acquisition system (application). The application interacts and
communicates with a number of devices for acquiring the needed data. The devices send data on
demand or at programmed intervals. Data of devices communicate using the network, transport
and security layers (Figure 2.1). An application can configure the devices for the data when devices
have configuration capability. For example, the system can configure devices to send data at
defined periodic intervals.
Each device configuration controls the frequency of data generation. For example, system can
configure an umbrella device to acquire weather data from the Internet weather service, once each
working day in a week (Example 1.1). An ACVM can be configured to communicate the sales data
of machine and other information, every hour. The ACVM system can be configured to
communicate instantaneously in event of fault or in case requirement of a specific chocolate flavour
needs the Fill service

⦿ Application can configure sending of data after filtering or enriching at the gateway at the
data- adaptation layer. The gateway in-between application and the devices can provision
for one or more of the following functions—transcoding, data management and device
management. Data management may be provisioning of the privacy and security, and data
integration, compaction and fusion (Section 2.3).
⦿ Device-management software provisions for device ID or address, activation, configuring
(managing device parameters and settings), registering, deregistering, attaching, and
detaching (Section 2.3.2). Example 5.2 gives the process of acquiring data from the
embedded component devices in the automobiles for Automotive Components and
Predictive Automotive Maintenance System (ACPAMS) application.

Data Validation:
⦿ Data acquired from the devices does not mean that data are correct, meaningful or consistent.
Data consistency means within expected range data or as per pattern or data not corrupted
during transmission. Therefore, data needs validation checks. Data validation software do the
validation checks on the acquired data. Validation software applies logic, rules and semantic
annotations. The applications or services depend on valid data. Then only the analytics,
predictions, prescriptions, diagnosis and decisions can be acceptable
⦿ Large magnitude of data is acquired from a large number of devices, especially, from
machines in industrial plants or embedded components data from large number of
automobiles or health devices in ICUs or wireless sensor networks, and so on. Validation
software, therefore, consumes significant resources. An appropriate strategy needs to be
adopted. For example, the adopted strategy may be filtering out the invalid data at the
gateway or at device itself or controlling the frequency of acquiring or cyclically
scheduling the set of devices in industrial systems. Data enriches, aggregates, fuses or
compacts at the adaptation layer.

Data Categorisation for Storage:


⦿ Data from large number of devices and sources categorises into a fourth category called Big
data. Data is stored in databases at a server or in a data warehouse or on a Cloud as Big data.
⦿ Assembly Software for the Events A device can generate events. For example, a sensor can
generate an event when temperature reaches a preset value or falls below a threshold. A
pressure sensor in a boiler generates an event when pressure exceeds a critical value which
warrants attention.
⦿ Each event can be assigned an ID. A logic value sets or resets for an event state. Logic 1 refers
to an event generated but not yet acted upon. Logic 0 refers to an event generated and acted
upon or not yet generated. A software component in applications can assemblethe events (logic
value, event ID and device ID) and can also add Date time stamp. Events from IoTs and logic-
flows assemble using software.

Data Store:
⦿ A data store is a data repository of a set of objects which integrate into the store. Features of
data store are: ● Objects in a data-store are modeled using Classes which are defined by the
database schemas. ● A data store is a general concept. It includes data repositories such as
database, relational database, flat file, spreadsheet, mail server, web server, directory
services and VMware ● A data store may be distributed over multiple nodes. Apache
Cassandra is an example of distributed data store.

⦿ A data store may consist of multiple schemas or may consist of data in only one scheme.
Example of only one scheme data store is a relational database. Repository in English means a
group, which can be related upon to look for required things, for special information or
knowledge
⦿ For example, a repository of paintings of artists. A database is a repository of data which can
be relied upon for reporting, analytics, process, knowledge discovery and intelligence.
⦿ A flat file is another repository. Flat file means a file in which the records have no structural
interrelationship (Section 5.3). Section 5.5.1 explains the spreadsheet concept. VMware uses
data store to refer to a file that stores a virtual machine

Data Centre Management:


⦿ A data centre is a facility which has multiple banks of computers, servers, large memory
systems, high speed network and Internet connectivity. The centre provides data security and
protection using advanced tools, full data backups along with data recovery, redundant data
communication connections and full system power as well as electricity supply backups.
⦿ Large industrial units, banks, railways, airlines and units for whom data are the critical
components use the services of data centres. Data centres also possess a dust free, heating,
ventilation and air conditioning (HVAC), cooling, humidification and dehumidification
equipment, pressurisation system with a physically highly secure environment.
⦿ The manager of data centre is responsible for all technical and IT issues, operations of computers
and servers, data entries, data security, data quality control, network quality control and the
management of the services and applications used for data processing

Server Management:
⦿ Server management means managing services, setup and maintenance of systems of all types
associated with the server.
⦿ A server needs to serve around the clock. Server management includes managing the following:
⦿ Short reaction times when the system or network is down
⦿ High security standards by routinely performing system maintenance and updation
⦿ Periodic system updates for state-of-the art setups ● Optimised performance
⦿ Monitoring of all critical services, with SMS and email notifications
⦿ Security of systems and protection
⦿ Maintaining confidentiality and privacy of data
⦿ High degree of security and integrity and effective protection of data, files and databases at the
organisation
⦿ Protection of customer data or enterprise internal documents by attackers which includes spam
mails, unauthorised use of the access to the server, viruses, malwares and worms
⦿ Strict documentation and audit of all activities

Spatial Storage:
⦿ Consider goods with RFID tags. When goods move from one place to another, the IDs of goods
as well as locations are needed in tracking or inventory control applications. Spatial storage is
storage as spatial database which is optimised to store and later on receives queries from the
applications. Suppose a digital map is required for parking slots in a city. Spatial data refers to
data which represents objects defined in a geometric space. Points, lines and polygons are
common geometric objects which can be represented in spatial databases. Spatial database can
also represent database for 3D objects, topological coverage, linear networks, triangular
irregular networks and other complex structures.
Additional functionality in spatial databases enables efficient processing
⦿ Internet communication by RFIDs, ATMs, vehicles, ambulances, traffic lights, streetlights, waste
containers are examples of where spatial database are used.
⦿ Spatial database functions optimally for spatial queries. A spatial database can perform typical
SQL queries, such as select statements and performs a wide variety of spatial operations.
Spatial database has the following features:
⦿ Can perform geometry constructors. For example, creating new geometries
⦿ Can define a shape using the vertices (points or nodes)
⦿ Can perform observer functions using queries which replies specific spatial information such as
location of the centre of a geometric object Can perform spatial measurements which mean
computing distance between geometries, lengths of lines, areas of polygons and other
parameters
⦿ Can change the existing features to new ones using spatial functions and can predicate spatial
relationships between geometries using true or false type queries
⦿ Can perform spatial measurements which mean computing distance between geometries, lengths
of lines, areas of polygons and other parameters
⦿● Can change the existing features to new ones using spatial functions and can predicate
spatial relationships between geometries using true or false type queries

Cloud Computing Features and Advantages:


⦿ Essential features of cloud storage and computing are:
⦿ ● On demand self-service to users for the provision of storage, computing servers, software
delivery and server time
⦿ ● Resource pooling in multi-tenant model
⦿ ● Broad network accessibility in virtualised environment to heterogeneous users,
clients, systems and devices
⦿ ● Elasticity
⦿ ● Massive scale availability
⦿ ● Scalability
⦿ ● Maintainability
⦿ ● Homogeneity
● Virtualisation

Cloud Computing Concerns:


⦿ Concerns in usage of cloud computing are:
⦿ ● Requirement of a constant high-speed Internet connection
⦿ Limitations of the services available
⦿ ● Possible data loss
⦿ ● Non delivery as per defined SLA specified performance
⦿ ● Different APIs and protocols used at different clouds
⦿ ● Security in multi-tenant environment needs high trust and low risks
⦿ ● Loss of users’ control

Cloud Deployment Models:


⦿ Following are the four cloud deployment models: 1. Public cloud: This model is
provisioned by educational institutions, industries, government institutions or
businesses or enterprises and is open for public use.
⦿ 2. Private cloud: This model is exclusive for use by institutions, industries, businesses or
enterprises and is meant for private use in the organisation by the employees and associated
users only.
⦿ 3. Community cloud: This model is exclusive for use by a community formed by institutions,
industries, businesses or enterprises, and for use within the community organisation,
employees and associated users. The community specifies security and compliance
considerations
⦿ 4. Hybrid cloud: A set of two or more distinct clouds (public, private or community) with
distinct data stores and applications that bind between them to deploy the proprietary or
standard technology.
⦿ Cloud platform architecture is a virtualised network architecture consisting of a cluster of
connected servers over the data centres and Service Level Agreements (SLAs) between
them.
⦿ A cloud platform controls and manages resources, and dynamically provisions the networks,
servers and storage. Cloud platform applications and network services are utility, grid and
distributed services. Examples of cloud platforms are Amazon EC2, Microsoft Azure,
Google App Engine, Xively, Nimbits, AWS IoT, CISCO IoT, IOx and Fog, IBM IoT
Foundation, TCS Connected Universe Platform.

EVERYTHING AS A SERVICE AND CLOUD SERVICE MODELS:


⦿ Cloud connects the devices, data, applications, services, persons and business. Cloud services
can be considered as distribution service—a service for linking the resources (computing
functions, data store, processing functions, networks, servers and applications) and for
provision of coordinating between the resources.
⦿ Figure 6.2 shows four cloud service models and examples. Cloud computing can be
considered by a simple equation: Cloud Computing = SaaS + Paas + IaaS + DaaS … 6.2
⦿ SaaS means Software as a Service. The software is made available to an application or
service on demand. SaaS is a service model where the applications or services deploy and
host at the cloud, and are made available through the Internet on demand by the service
user. The software control, maintenance, updation to new version and infrastructure,
platform and resource requirements are the responsibilities of the cloud service provider.
⦿ PaaS means Platform as a Service. The platform is made available to a developer of an
application on demand. PaaS is a service model where the applications and services develop
and execute using the platform (for computing, data store and distribution services) which
is made available through the Internet on demand for the developer of the applications. The
platform, network, resources, maintenance, updation and security as per the developers’
requirements are the responsibilities of the cloud service provider.
⦿ IaaS means Infrastructure as a Service. The infrastructure (data stores, servers, data centres

and network) is made available to a user or developer of application on demand. Developer

installs the OS image, data store and application and controls them at the infrastructure. IaaS is
a service model where the applications develop or use the infrastructure which is
made available through the Internet on demand on rent (pay as per use in multi-tenancy model)
by a developer or user. IaaS computing systems, network and security are the responsibilities of
the cloud service provider. DaaS means Data as a Service
⦿ Data at a data centre is made available to a user or developer of application on demand.
DaaS is a service model where the data store or data warehouses is made available through
the Internet on demand on rent (pay as per use in multi tenancy model) to an enterprise. The
data centre management, 24×7 power, control, network, maintenance, scale up, data
replicating and mirror nodes and systems as well as physical security are the responsibilities
of the data centre service provider.
⦿ Data at a data centre is made available to a user or developer of application on demand.
DaaS is a service model where the data store or data warehouse is made available through
the Internet on demand on rent (pay as per use in multi tenancy model) to an enterprise. The
data centre management, 24×7 power, control, network, maintenance, scale up, data
replicating and mirror nodes and systems as well as physical security are the responsibilities
of the data centre service provider.
Unit – V
APPLICATION OF IOT

Home Automation:
Home automation has received a lot of attention of late in the IoT/M2M context. Basic
applications of the automated home include remote media control, heating control, lighting
control (including low power landscape lighting control), and appliance control. Sensed homes,
as examples of smart space, are seen as “next-step/nextgeneration” applications. Smart meters
and energy efficiency (making use o potential of SG), discussed above, also fit this category.
Telehealth (e.g., assisted living and in-home m- health services) also can be captured under this
set of applications; security and emergency services also can be included here instrumentation
of elements supporting daily living (e.g., appliances), comfort, health, security, and energy
efficiency can improve the quality of life and the quality of experience. Home control
applications include but are not limited to:
• _ Lighting control
• _ Thermostat/HVAC
• _ White goods/
• _ Appliance control
• _ In-home displays
Home security applications include but are not limited to:
• _ Door access phone
• _ Window locks
• _ Motion detector
• _ Smoke/fire alert
• _ Baby monitors
• _ Medical pendant
See Figure :for an illustrative example.
Energy efficiency at home is a key application of interest because of the possibility of
monetary saving for the consumer. Occupancy sensors can be used to establish whether there
is somebody in a room or not and when the room becomes unoccupied the lights are
automatically switched off; other types of sensors can be used to control te energy
consumption from different equipments (e.g., temperature, TVs, and so on). The sensors and
actuators can be autonomous (as in the case of light sensors), or can be connected to
anM2Mgateway control node (wirelessly or using wires, e.g., via PLC). By integrating the data
from a plethora of sensors (e.g., outside temperature, multizone heating status), the gateway
can dispatch the appropriate commands to the relevant actuators (e.g., to switch off the heater
in a room or zone, or in the entire house). The M2M system allows reducing energy
consumption by automatically adapting the use of the house equipment to various short-term
situations (people moving in and out of rooms, people going to work and retuning later) or
long- term situations (people taking vacations or long weekends or managing a second/vacation
home)

Smart Cities:

Cities around the world are getting “smarter” everyday through the implementation of
Internet of Things (IoT) devices. “What exactly does it mean for a city to get smarter?” you ask.
According to Kate Meis of Green Biz, “Smart cities are communities that are building
infrastructure to continuously improve the collection, aggregation and use of data to improve
the lives of their residents by harnessing the growing data revolution, low-cost sensors and
research collaborations, and doing so securely to protect public safety and individual privacy.”

A more efficient water supply


The Internet of Things has the potential to transform the way cities consume water.
Smart meters can improve leak detection and data integrity; prevent lost revenue due to
inefficiency, and boost productivity by reducing the amount of time spent entering and
analyzing data. Also, these meters can be designed to feature customer-facing portals,
providing residents with real-time access to information about their consumption and water
supply.
An innovative solution to traffic congestion
As more and more people move to cities, traffic congestion – which is already a massive
problem – is only going to get worse. Fortunately, the Internet of Things is well positioned to
make improvements in this area that can benefit residents immediately. For example, smart
traffic signals can adjust their timing to accommodate commutes and holiday traffic and keep
cars moving. City officials can collect and aggregate data from traffic cameras, mobile phones,
vehicles, and road sensors to monitor traffic incidents in real-time. Drivers can be alerted of
accidents and directed to routes that are less congested. The possibilities are endless and the
impact will be substantial.

More reliable public transportation


Public transportation is disrupted whenever there are road closures, bad weather, or
equipment breakdowns. IoT can give transit authorities the real-time insights they need to
implement contingency plans, ensuring that residents always have access to safe, reliable, and
efficient public transportation. This might be done using insights from cameras or connected
devices at bus shelters or other public areas.

Energy-efficient buildings
IoT technology is making it easier for buildings with legacy infrastructure to save
energy and improve their sustainability. Smart building energy management systems, for
instance, use IoT devices to connect disparate, nonstandard heating, cooling, lighting, and fire-
safety systems to a central management application. The energy management application then
highlights areas of high use and energy drifts so staff can correct them.
Research shows that commercial buildings waste up to 30 percent of the energy they
use, so savings with a smart building energy management system can be significant. As more
smart city buildings use energy management systems, the city will become more sustainable as
a whole.
Improved public safety
Smart cities and their CSP partners often implement video monitoring systems to tackle
the safety concerns that come up in every growing city. Some cities now have hundreds of
cameras monitoring traffic for accidents and public streets for safety concerns. Video analytics
softwarehelps process the thousands of hours of video footage each camera produces, whittling
it down to only important events. Systems using IoT technology turn every camera attached to
the system into a sensor, with edge computing and analytics starting right from the source.
Artificial intelligence technology like machine learning will then complete the analysis and
send video footage to humans who can react quickly to solve problems and keep residents safe.
Cities are also improving public safety with smart lighting initiatives that replace
traditional streelights with connected LED infrastructure. Not only do the LED lights last longer
and conserve energy, they also provide information on outages in real time. City workers can
use that information to ensure important areas are well lit to deter crimes and make the public
feel safer.
Energy:
The general goal is to monitor and control the consumption of utilities-supplied
consumable assets, such as electricity, gas, and water. Utility companies deploy intelligent
metering services by incorporating M2M communication modules into metering devices (“the
thing”); these intelligent meters are able to send information automatically (or on demand) to
a server application that can directly bill or control the metered resource. The ultimate objective
is to improve energy distribution performance and efficiency by utilizing accurate real-time
information on endpoint consumption. A variation of this application for metering of gas,
electricity, and water is a pre-payment arrangement: here a consumer can purchase a specific
volume of gas, electricity, water, and so on by pre-payment; the information about the
purchased volume is securely transmitted to the metering device and then securely stored on
the M2M modules. During use, the actual information about the consumed volume is
transmitted to theM2Mmodule, and when the purchased volume has been consumed, the supply
can be stopped (via a secure actuation capability) (5, 37). See Figure 3.2 for an example of a
smart flowmeter for a water utility application; similar concepts apply to natural gas or electric
power.

The advanced metering infrastructure (AMI) is the electric information service


infrastructure that is put in place between the end-user (or end device) and the power utility.
AMI is a system for implementing the SG, and it is the principal means for realizing DR.
According to press time market forecasts, shipments of smart meter units were expected to
continue to grow at a 15% annual rate, with a total of about half-a- billion meters shipped by
2015. Proponents expect that the use of smart appliances and energy management systems will
allow consumers to manage and reduce their energy bills and overall consumption. The
combination of the AMI meter and an appropriate home area network (HAN) enables
consumers to become aware of electricity consumption costs on a near real-time basis; to be
able to monitor their energy usage; and to manage their usage based on their financial metrics.
To assist consumers in managing their energy use, manufacturers are designing products that
contain built-in communication systems that communicate with the HAN (and the AMI meter).
AMI can utilize a number of methods and communication standards to connect the end device
to the applications of the utility company. To communicate between physical service
layers, some combinations and/or refinements of existing
communication protocols are required. See Figure 3.3, loosely modeled after reference (37). While
a number of power line carrier (PLC)-based communication approaches are technically feasible, at
the current time none of these technologies and protocols have reached the level of technical
maturity and cost competitiveness to enable one toinstitutionalize a viable solution. However, there
is work underway by several industry and/or standards organizations to develop standards for
devices supporting these applications.

Retail Management:

Retailers are adopting IoT solutions across a number of applications that are improving
store operations, reducing theft, increasing purchases through cross selling, enabling precise
inventory management, and most importantly enhancing the consumer’s shopping experience.
The IoT is enabling physical retailers to compete more strongly against the online challengers,
to regain lost market share and continually attract consumers into the store, thus making it
easier for them to buy more while saving money.
Kaa is a leading enterprise IoT platform that can enable these benefits for retail
companies and serve as an IoT backbone for numerous smart retail services and solutions. It
allows you to quickly implement necessary applications for tracking goods with RFID tags,
ensure items on-shelf availability, utilize Bluetooth beacons to provide customers with
personalized mobile shopping experience, and set up digital signage in the store to attract
visitors and help them navigate through your products, discounts, and loyalty programs. IoT
retail solutions powered by Kaa can help you ensure that your customers have thorough
information on everything they might like in your store, and thus bring them closer to a buying
decision.

Featuring enterprise-grade security mechanisms, Kaa is also a safe choice for


mobile payment solutions, mobile POS systems, and smart vending machines. Mobile payment
applications built with Kaa can be used with all modern mobile devices and easily integrated
with a retail management system in place to enable automated items inventory processing.
Agriculture:

The Internet of Things (IoT) has the capability to transform the world we live in; more-
efficient industries, connected cars, and smarter cities are all components of the IoT equation.
However, the application of technology like IoT in agriculture could have the greatest impact.
The global population is set to touch 9.6 billion by 2050. So, to feed this much
population, the farming industry must embrace IoT. Against the challenges such as extreme
weather conditions and rising climate change, and environmental impact resulting from
intensive farming practices, the demand for more food has to be met.
Smart farming based on IoT technologies will enable growers and farmers to reduce waste and
enhance productivity ranging from the quantity of fertilizer utilized to the number of journeys
the farm vehicles have made.

Applications of IoT in Agriculture

Precision Farming
Also known as precision agriculture, precision farming can be thought of as anything that makes the
farming practice more controlled and accurate when it comes to raising livestock and growing of
crops. In this approach of farm management, a key component is the use of IT and various items
like sensors, control systems, robotics, autonomous vehicles, automated hardware, variable rate
technology, and so on.
The adoption of access to high-speed internet, mobile devices, and reliable, low- cost satellites (for
imagery and positioning) by the manufacturer are few key technologies characterizing the precision
agriculture trend.
Precision agriculture is one of the most famous applications of IoT in the agricultural sector and
numerous organizations are leveraging this technique around the world. CropMetrics is a precision
agriculture organization focused on ultra-modern agronomic solutions while specializing in the
management of precision irrigation.
The products and services of CropMetrics include VRI optimization, soil moisture probes, virtual
optimizer PRO, and so on. VRI (Variable Rate Irrigation) optimization maximizes profitability on
irrigated crop fields with topography or soil variability, improve yields, and increases water use
efficiency.
The soil moisture probe technology provides complete in-season local agronomy
support, and recommendations to optimize water use efficiency. The virtual optimizer PRO
combines various technologies for water management into one central, cloud based, and
powerful location designed for consultants and growers to take advantage of the benefits in
precision irrigation via a simplified interface.

Agricultural Drones
Technology has changed over time and agricultural drones are a very good example of
this. Today, agriculture is one of the major industries to incorporate drones. Drones are being
used in agriculture in order to enhance various agricultural practices. The ways ground-based
and aerial based drones are being used in agriculture are crop health assessment, irrigation,
crop monitoring, crop spraying, planting, and soil and field analysis.
The major benefits of using drones include crop health imaging, integrated GIS
mapping, ease of use, saves time, and the potential to increase yields. With strategy and
planning based on real-time data collection and processing, the drone technology will give a
high-tech makeover to the agriculture industry.
PrecisionHawk is an organization that uses drones for gathering valuable data via a
series of sensors that are used for imaging, mapping, and surveying of agricultural land. These
drones perform in-flight monitoring and observations. The farmers enter the details of what
field to survey, and select an altitude or ground resolution.
From the drone data, we can draw insights regarding plant health indices, plant counting and
yield prediction, plant height measurement, canopy cover mapping, field water ponsing
mapping, scouting reports, stockpile measuring, chlorophyll measurement, nitrogen content in
wheat, drainage mapping, weed pressure mapping, and so on.
The drone collects multispectral, thermal, and visual imagery during the flight and then
lands in the same location it took off.

Livestock Monitoring
Large farm owners can utilize wireless IoT applications to collect data regarding the
location, well-being, and health of their cattle. This information helps them in identifying
animals that are sick so they can be separated from the herd, thereby preventing the spread of
disease. It also lowers labor costs as ranchers can locate their cattle with the help of IoT based
sensors.
JMB North America is an organization that offers cow monitoring solutions to cattle
producers. One of the solutions helps the cattle owners observe cows that are pregnant and
about to give birth. From the heifer, a sensor powered by battery is expelled when its water
breaks. This sends an information to the herd manager or the rancher. In the time that is spent
with heifers that are giving birth, the sensor enables farmers to be more focused.

You might also like