Full IoT Notes
Full IoT Notes
NOTES
UNIT - I
WHAT IS IOT
The Internet of things (IoT) describes the network of physical objects—"things" or objects—that
are embedded with sensors, software, and other technologies for the purpose of connecting and
exchanging data with other devices and systems over the Internet
Things have evolved due to the convergence of multiple technologies, real-
time analytics, machine learning, commodity sensors, and embedded systems. Traditional fields
of embedded systems, wireless sensor networks, control
systems, automation (including home and building automation), and others all contribute to enabling the
Internet of things. In the consumer market, IoT technology is most synonymous with products pertaining
to the concept of the "smart home", including devices and appliances (such as lighting
fixtures, thermostats, home security systems and cameras, and other home appliances) that support one
or more common ecosystems, and can be controlled via devices associated with that ecosystem, such
as smart phones and smart speakers. IoT can also be used in healthcare systems.
Definition:
A dynamic global n/w infrastructure with self-configuring capabilities based on standard and
interoperable communication protocols where physical and virtual things have identities, physical
attributes and virtual personalities and use intelligent interfaces, and are seamlessly integrated into
information n/w, often communicate data associated with users and their environments.
Characteristics:
1. Dynamic & Self Adapting: IoT devices and systems may have the capability to dynamically adapt
with the changing contexts and take actions based on their operating conditions, users context or
sensed environment.
Eg: the surveillance system is adapting itself based on context and changing conditions.
2. Self-Configuring: allowing a large number of devices to work together to provide certain
functionality.
3. Inter Operable Communication Protocols: support a number of interoperable communication
protocols and can communicate with other devices and also with infrastructure.
4. Unique Identity: Each IoT device has a unique identity and a unique identifier(IP address).
5. Integrated into Information Network: that allow them to communicate and exchange data with
other devices and systems
ARCHITECTURAL OVERVIEW
❖ What is the Internet of Things? - The concept of connecting any device (so long as it has an on/off
switch) to the Internet and to other connected devices. The IoT is a giant network of connected
things and people – all of which collect and share data about the way they are used and about the
environment around them.
❖ How does it work? Devices and objects with built in sensors are connected to an Internet of Things
platform, which integrates data from the different devices and applies analytics to share the most
valuable information with applications built to address specific needs.
❖ These powerful IoT platforms can pinpoint exactly what information is useful and what can safely
be ignored. This information can be used to detect patterns, make recommendations, and detect
possible problems before they occur.
❖ For example, if a car manufacturing business, might want to know which optional components
(leather seats or alloy wheels, for example) are the most popular. Using Internet of Things
technology,it is possible to:
o Use sensors to detect which areas in a showroom are the most popular, and where
customers linger longest;
o Drill down into the available sales data to identify which components are selling fastest;
o Automatically align sales data with supply, so that popular items don’t go out of stock.
❖ The information picked up by connected devices enables to make smart decisions about which
components to stock up on, based on real-time information, which helps save time and money.
❖ With the insight provided by advanced analytics comes the power to make processes more
efficient. Smart objects and systems mean you can automate certain tasks, particularly when these
are repetitive, mundane, time-consuming or even dangerous.
In the near future, our everyday lives will be more and more filled with intelligent, connected
objects. They will appear in our homes, in our working environments and in the cities, we live in as well as
travel with us everywhere we go in the form of wearable, smart clothing and things we cannot even imagine
right now. This development is called the internet of things, IoT.
IoT solutions consist of multiple elements: physical devices like sensors, actuators and interactive
devices, the network connecting these devices, the data gathered from these devices and analyzed to
create a meaningful experience and last but definitely not least, the physical context in which user interacts
with the solution.
Design principles
1. Do your research
When designing IoT-enabled products, designers might make the mistake of forgetting why
customers value these products in the first place. That’s why it’s a good idea to think about the value an
IoT offering should deliver at the initial phase of your design.
When getting into IoT design, you’re not building products anymore. You’re building services and
experiences that improve people’s lives. That’s why in-depth qualitative research is the key to figuring out
how you can do that.
Assume the perspective of your customers to understand what they need and how your IoT
implementation can solve their pain points. Research your target audience deeply to see what their existing
experiences are and what they wish was different about them.
2. Concentrate on value
Early adopters are eager to try out new technologies. But the rest of your customer base might be
reluctant to put a new solution to use. They may not feel confident with it and are likely to be cautious
about using it.
If you want your IoT solution to become widely adopted, you need to focus on the actual tangible
value it’s going to deliver to your target audience.
What is the real end-user value of your solution? What might be the barriers to adopting new
technology? How can your solution address them specifically?
Note that the features the early tech adopters might find valuable might turn out to be completely
uninteresting for the majority of users. That’s why you need to carefully plan which features to include and
in what order, always concentrating on the actual value they provide.
Needed capabilities
1. Connectivity
It starts with how a device or sensor connects to the internet and a cloud platform. There are many
options to choose from Wi-Fi through a hub or gateway, 2G, or 3G cellular networks. Once you have
connectivity in place, now you can get the device or sensor talking to your cloud IoT platform. Ensure you
find a service provider that can send data through clean API’s that are easy to implement and install. This
will ensure you can get quickly setup and start capturing your data within minutes.
2. Control
The next capability necessary when evaluating an IoT data platform is control of the device. There
are a number of different scenarios for control including controlling a device through an application, device-
to-device communication, or control from the cloud (based on an event, rule or some other pre-
determined condition). For example, if you have a water leak detector, it can automatically send a
command to the device which could be an appliance or part of the core infrastructure to turn off the water
valve. Here, using two-way communication, a signal can be sent from the detector to the device via the
cloud to shut off the water. Lastly, you can program the device from an app (or website) to shut off at a
certain time or schedule based on a pre-programmed rule.
3. Device Management
Device management is also a major consideration. To keep devices and sensors up to date and
functional, a strong device management solution is a core component of an IoT cloud platform. There
are a few main capabilities a device management platform provides, including the ability for manufacturers
to send software or firmware updates OTA (over-the-air), factory provisioning, as well as an out-of-box
experience (OOBE).OOBE is part of a core experience that is often left to the last minute or completely
glossed over. It’s the first experience that an end user, be it a consumer, installer or technicianhas when
interacting with a device for the first time.
4. Actionable Data
The last capability you should consider in a IoT data platform is how you can query the data in a
manner that is clear and meaningful. It’s one thing to get all your data in place, but the value of the data is
only realized when it’s turned into information that can help solve a problem. We want organizations to
focus on their core competency, like making great appliances or services that deliver value to their
customers, rather than focusing on cloud infrastructure that makes it possible.
IOT APPLICATIONS, SENSING AND ACTUATION
IoT Applications
The IoT applications are addressing the societal needs and the advancements to enabling
technologies such as nano-electronics and cyber-physical systems continue to be challenged by a variety
of technical (i.e., scientific and engineering), institutional, and economical issues.
2) Wearable
Wearable devices are installed with sensors and software which collect data and information about
the users. This data is later pre-processed to extract essential insights about user. These devices broadly
cover fitness, health and entertainment requirements. The pre-requisite from internet of things technology
for wearable applications is to be highly energy efficient or ultra-low power and small sized.
3) Smart City
Smart cities use IoT devices such as connected sensors, lights, and meters to collect and analyze
data. The cities then use this data to improve infrastructure, public utilities and services, and more.
Smart city devices work to make everyday tasks easier and more efficient, while relieving pain
points related to public safety, traffic, and environmental issues.
4) Smart Grid
The basic idea behind the smart grids is to collect data in an automated fashion and analyze the
behavior or electricity consumers and suppliers for improving efficiency as well as economics of electricity
use. Smart Grids will also be able to detect sources of power outages more quickly and at individual
household levels like nearby solar panel, making possible distributed energy system.
5) Industrial IoT
Industrial internet of things is empowering industrial engineering with sensors, software and big
data analytics to create brilliant machines. IoT holds great potential for quality control and sustainability.
Applications for tracking goods, real time information exchange about inventory among suppliers and
retailers and automated delivery will increase the supply chain efficiency.
6) Connected Cars
A connected car is a vehicle which is able to optimise its own operation, maintenance as well as
comfort of passengers using on-board sensors and internet connectivity.
Most large auto makers as well as some brave startups are working on connected car solutions.
Major brands like Tesla, BMW, Apple, Google are working on bringing the next revolution in automobiles.
7) Connected Healthcare
It can be used for out-patient care by healthcare providers, letting them get ECG, heart rate,
respiratory rate, skin temperature, body posture, fall detection, and activity readings remotely. This can
alert doctors to potential health problems before they arise, or give them additional insights into which
treatments will be most effective for their patients, even when their patients aren’t in the office.
8) Smart Retail
Today, retail stores are constantly focusing on leveraging the emerging technologies like cloud,
mobile, RFID, beacons, etc., to provide connected retail services and better shopping experience to
customers. For example, store owners are integrating sensors in the key zones of retail stores and
connecting them to cloud through a gateway that enables real-time data analysis related to products, sales,
and customers from these sensors.
Interestingly, IoT in retail and connected technologies are taking the retail industry by storm. 96%
retailers are ready to make changes required to implement the Internet of Things in their stores.
9) Smart Transportation and Mobility
Internet of Vehicles (IoV) connected with the concept of Internet of Energy (IoE) represent future
trends for smart transportation.
IoT technology that includes vehicle monitoring and maintenance, real-time tracking of packages,
environmental sensors in shipping containers, information-gathering on employees and tools, and a
number of safety-enhancing features for vehicles and people.
Sensors and actuators have a number of similarities and dissimilarities in the functioning or
processing. Here we have listed the differences between the actuator and a sensor.
❖ The main difference between an actuator and a sensor is that the sensor converts the physical
gesture into electrical signals and do different works. Whereas, the actuator is responsible forthe
conversion of electrical signal to mechanical work.
❖ Sensors measure discrete as well as continuous process variables. On the other hand, actuators
are used to impel the parameters of both discrete and continuous processes.
❖ Sensors are widely used to original electrical signals in different electrical application. On the other
hand, actuators are very useful in the production of energy in the form of heat and motion.
❖ Sensors are used as an input device because of the reason it is placed at input dork of the machine.
However, actuator are used as output device as it is mostly placed at output port of the machinery.
❖ Sensors are the one which acts as a brain because it provides information to do work.
SENSOR ACTUATOR
It converts physical characteristics into It converts electrical signals into physical
electrical signals. characteristics.
It takes input from output conditioning unit of
It takes input from environment.
system.
It gives output to input conditioning unit of
It gives output to environment.
system.
Sensor generated electrical signals. Actuator generates heat or motion.
It is placed at input port of the system. It is placed at output port of the system.
It is used to measure the continuous and
It is used to measure the physical quantity.
discrete process parameters.
It gives information to the system about
It accepts command to perform a function.
environment.
Example: Photo-voltaic cell which converts Example: Stepper motor where electrical energy
light energy into electrical energy. drives the motor.
Sensor
Sensor is a device used for the conversion of physical events or characteristics into the electrical
signals. This is a hardware device that takes the input from environment and gives to the system by
converting it.
For example, a thermometer takes the temperature as physical characteristic and then converts it
into electrical signals for the system.
Actuator
Actuator is a device that converts the electrical signals into the physical events or characteristics. It
takes the input from the system and gives output to the environment.
For example, motors and heaters are some of the commonly used actuators.
In a typical IoT system, a sensor may collect information and route to a control center. There,
previously defined logic dictates the decision. As a result, a corresponding command controls an
actuator in response to that sensed input. Thus, sensors and actuators in IoT work together from opposite
ends.
Basics of Networking
Today computer networks are everywhere. You will find them in homes, offices, factories, hospitals
leisure centers etc.
Networking Types
Networks can be wired or wireless with most networks being a mixture of both.
Advantages:
o Ethernet ports are found on almost all laptops/PCs and netbooks even on those 8 years old.
o Wired networks are faster than Wireless. Data rates were periodically increased from the
original 10 megabits per second, to 1gigabits per second. Most home networks use 10-
100Mbps.
o More secure than Wireless
Disadvantages:
o Need to Use cable which can be unsightly, difficult to run and expensive.
o Can’t be used easily between buildings (planning etc.).
o Note a new technology that uses mains cable overcomes many of these
disadvantages. powerline networking is common on home/small office networks
o Not supported on Mobile phones and tablets.
Wireless Networks – Advantages and Disadvantages
❖ Wireless networks use Wi-fi as the data link protocol. However other wireless options are being
developed for the IOT (Internet of things).
Advantages:
o Generally easier to set up.
o Can be used both on home and public networks
o No cables required.
o Can be used with mobile phones and tablets.
Disadvantages
o Generally Slower than wired networks.
o Limited by range.
o Open to eavesdropping.
o Not as secure depending on set up.
M2M
➔ Shows the end-to-end architecture of M2M systems comprises of M2M area networks,
communication networks and application domain.
1. Machine to machine (M2M) is direct communication between devices using any communications
channel, including wired and wireless.
2. Machine to machine communication can include industrial instrumentation, enabling a sensor or
meter to communicate the information it records (such as temperature, inventory level, etc.) to
application software that can use it (for example, adjusting an industrial process based on
temperature or placing orders to replenish inventory).
3. Such communication was originally accomplished by having a remote network of machines relay
information back to a central hub for analysis, which would then be rerouted into a system like
a personal computer.
4. More recent machine to machine communication has changed into a system of networks that
transmits data to personal appliances. The expansion of IP networks around the world has made
machine to machine communication quicker and easier while using less power. These networks also
allow new business opportunities for consumers and suppliers.
5. M2M is not a new technology, primarily because it doesn’t actually require any wireless
technologies or complex digital devices. A wired connection between two machines can still be
considered an M2M connection, and indeed the very first iterations of this technology used phone
lines to communicate.
6. However, in the modern world, M2M usually refers to machines that communicate using things like
WiFi or mobile networks. In this article, we’re going to take a look at what technology underpins
M2M, and how it’s applied in the real world.
7. M2M generally centers around the concept of telemetry. This is simply where sensors of varying
types will collect information, and then relay it to a central point of some description. In the past,
this central point may have been a person or a personal computer.
8. The data would be interpreted and then used. This is still often the case today. However, modern
M2M systems allow for far more complexity, allowing machines to communicate with one another
and make decisions quickly.
IoT Technology
The Internet of Things (IoT) starts with connectivity, but since IoT is a widely diverse and multifaceted
realm, you certainly cannot find a one-size-fits-all communication solution. Continuing our discussion
on mesh and star topologies, in this article we’ll walk through the six most common types of IoT wireless
technologies.
1. LPWANs
Low Power Wide Area Networks (LPWANs) are the new phenomenon in IoT. By providing long-
range communication on small, inexpensive batteries that last for years, this family of technologies
is purpose-built to support large-scale IoT networks sprawling over vast industrial and commercial
campuses.
LPWANs can literally connect all types of IoT sensors – facilitating numerous applications from
asset tracking, environmental monitoring and facility management to occupancy detection and
consumables monitoring. Nevertheless, LPWANs can only send small blocks of data at a low rate,
and therefore are better suited for use cases that don’t require high bandwidth and are not time-
sensitive.
Also, not all LPWANs are created equal. Today, there exist technologies operating in both the
licensed (NB-IoT, LTE-M) and unlicensed (e.g. MYTHINGS, LoRa, Sigfox etc.) spectrum with varying
degrees of performance in key network factors. For example, while power consumption is a major
issue for cellular-based, licensed LPWANs; Quality-of-Service and scalability are main
considerations when adopting unlicensed technologies. Standardization is another important factor
to think of if you want to ensure reliability, security, and interoperability in the long run.
2. Cellular (3G/4G/5G)
Well-established in the consumer mobile market, cellular networks offer reliable broadband
communication supporting various voice calls and video streaming applications. On the downside,
they impose very high operational costs and power requirements.
While cellular networks are not viable for the majority of IoT applications powered by battery -
operated sensor networks, they fit well in specific use cases such as connected cars or fleet
management in transportation and logistics. For example, in-car infotainment, traffic routing,
advanced driver assistance systems (ADAS) alongside fleet telematics and tracking services can
all rely on the ubiquitous and high bandwidth cellular connectivity.
Cellular next-gen 5G with high-speed mobility support and ultra-low latency is positioned tobe
the future of autonomous vehicles and augmented reality. 5G is also expected to enable real-time
video surveillance for public safety, real-time mobile delivery of medical data sets for connected
health, and several time-sensitive industrial automation applications in the future.
Also recommended for you: IoT Connectivity - 4 Latest Standards That Will Shape 2020 and beyond.
5. Wi-Fi
There is virtually no need to explain Wi-Fi, given its critical role in providing high-throughput data
transfer for both enterprise and home environments. However, in the IoT space, its major
limitations in coverage, scalability and power consumption make the technology much less
prevalent.
Imposing high energy requirements, Wi-Fi is often not a feasible solution for large networks of
battery-operated IoT sensors, especially in industrial IoT and smart building scenarios. Instead, it
more pertains to connecting devices that can be conveniently connected to a power outlet like
smart home gadgets and appliances, digital signages or security cameras.
6. RFID
Radio Frequency Identification (RFID) uses radio waves to transmit small amounts of data from an
RFID tag to a reader within a very short distance. Till now, the technology has facilitated a major
revolution in retail and logistics.
By attaching an RFID tag to all sorts of products and equipment, businesses can track their inventory
and assets in real-time – allowing for better stock and production planning as well as optimized
supply chain management. Alongside increasing IoT adoption, RFID continues to be entrenched in
the retail sector, enabling new IoT applications like smart shelves, self-checkout, andsmart mirrors.
While the idea of IoT has been in existence for a long time, a collection of recent advances in a number of
different technologies has made it practical.
Access to low-cost, low-power sensor technology. Affordable and reliable sensors are making IoT
technology possible for more manufacturers.
Connectivity. A host of network protocols for the internet has made it easy to connect sensors to
the cloud and to other “things” for efficient data transfer.
Cloud computing platforms. The increase in the availability of cloud platforms enables both
businesses and consumers to access the infrastructure they need to scale up without actually having
to manage it all.
Machine learning and analytics. With advances in machine learning and analytics, along with access
to varied and vast amounts of data stored in the cloud, businesses can gather insights fasterand
more easily. The emergence of these allied technologies continues to push the boundaries of IoT
and the data produced by IoT also feeds these technologies.
Conversational artificial intelligence (AI). Advances in neural networks have brought natural-
language processing (NLP) to IoT devices (such as digital personal assistants Alexa, Cortana, and Siri)
and made them appealing, affordable, and viable for home use.
Differences between IoT and M2M
1) Communication Protocols:
o Commonly uses M2M protocols include ZigBee, Bluetooth, ModBus, M-Bus, Wireless M-
Bustec.
o In IoT uses HTTP, CoAP, WebSocket,MQTT, XMPP, DDS, AMQP etc.,
2) Machines in M2M Vs Things inIoT:
o Machines in M2M will be homogenous whereas Things in IoT will beheterogeneous.
3) Hardware Vs SoftwareEmphasis:
o the emphasis of M2M is more on hardware with embedded modules, the emphasis of IoT is
more on software.
4) Data Collection &Analysis
o M2M data is collected in point solutions and often in on-premises storage infrastructure.
o The data in IoT is collected in the cloud (can be public, private or hybridcloud).
5) Applications
o M2M data is collected in point solutions and can be accessed by on-premises applications
such as diagnosis applications, service management applications, and on- premisis
enterpriseapplications.
o IoT data is collected in the cloud and can be accessed by cloud applications suchas analytics
applications, enterprise applications, remote diagnosis and management applications,etc.
Devices
The sensing/actuating stage covers everything from legacy industrial devices to robotic camera
systems, water level detectors, air quality sensors, accelerometers, and heart rate monitors. And the scope
of the IoT is expanding rapidly, thanks in part to low-power wireless sensor network technologies and
Power over Ethernet, which enable devices on a wired LAN to operate without the need for an A/C power
source.
Physical devices and controllers that might control multiple devices. These are the thingsin the IoT,
and they include a wide range of endpoint devices that send and receive information. Today, the list of
devices is already extensive. It will become almost unlimited as more equipment is added to the IoT over
time. Devices are diverse, and there are no rules about size, location, form factor, or origin. Some devices
will be the size of a silicon chip. Some will be as large as vehicles. The IoT must support the entire range.
Dozens or hundreds of equipment manufacturers will produce IoT devices.
Gateways
Simply put, an IoT gateway is a physical device or virtual platform that connects sensors, IoT
modules, and smart devices to the cloud.
Gateways serve as a wireless access portal to give IoT devices access to the internet.
On the surface, it may sound like a simple router, enabling communication between different
protocols and devices.
But IoT Gateways are sophisticated technology that does so much more, like edge-computing in
particular.
An IoT Gateway collects massive data from many connected devices and sensors in any given IoT
ecosystem.
The gateway pre-processes the data before passing it along to cloud platforms, where the heavy
lifting of transforming data into meaningful intelligence is accomplished.
IoT gateways also receive information from the cloud, sent back to devices to allow autonomous
management of devices in the field.
“This means that all the information moving through an IoT ecosystem – from an IoT device to the
cloud, or vice versa – goes through a connected IoT gateway.”
Data Management
Traditional data management systems handle the storage, retrieval, and update of elementary data
items, records and files. In the context of IoT, data management systems must summarize data online while
providing storage, logging, and auditing facilities for offline analysis. This expands the concept of data
management from offline storage, query processing, and transaction management operations into online-
offline communication/storage dual operations. We first define the data lifecycle within the context of IoT
and then outline the energy consumption profile for each of the phases in order to have a better
understanding of IoT data management.
❖ Data: As consumers use more and more devices that record data, there are opportunities for
businesses to use this data for marketing and product development purposes, but only if the
processes are in place to measure, analyze and report on this data. Business process management
can automate this processand ensure that it remains effective and agile enough to keep pace with
technological changes.
❖ New ways of buying: The IoT gives consumers the chance to buy directly from their devices,
whether it’s an Amazon Echo or a smartphone or even that legendary refrigerator ordering fresh
milk. Technology is making everything faster and more easily, so they will also be expecting faster
deliveriesand better service. BPM needs to be used to manage the processes that will allow this kind
of development to meet the demand. IoT software and tools can help with this though, with
inventories able to be tracked automatically.
❖ Innovation: Whether it’s new product development or upgrading existing products or services, the
IoToffers the opportunities for businesses to deliver exciting new benefits for their customers.
❖ Customer service: Another area where processes need to be managed carefully because of the
changesthat the IoT have brought in is customer service. Products that utilize the internet should
really be able to be fixed over the internet when something goes wrong. Consumers expect it and
businesses shouldbe able to deliver it, so BPM is needed to ensure that customer service processes
are effective, efficientand easy to cope.
❖ Centralized BPM: Business process management isn’t simply something that is needed to make the
IoT run more smoothly, the benefits can flow back in the opposite direction too. Integrating BPM
softwareinto devices means that the data can be analyzed from a central location and any changes
can be fed back out again.
EVERYTHING AS A SERVICE (XAAS)
XaaS is a general, collective term that refers to the delivery of anything as a service. It recognizes the
vast number of products, tools and technologies that vendors now deliver to users as a service over a
network -- typically the internet -- rather than provide locally or on-site within an enterprise.
Most major companies now offer some form of XaaS, including Microsoft Azure, the various
AmazonWeb Services (AWS), and even Google Apps. In fact, if there are any types of IT services or
computer- based functionality you require, then there is a high probability you can obtain it as XaaS.
Some of the most common types of XaaS include:
Types of XaaS
1. Hardware-as-a-Service (HaaS)
2. Communication-as-a-Service (CaaS)
3. Monitoring as a Service (MaaS)
4. Security-as-a-Service (SECaaS)
5. Software-as-a-Service (SaaS)
6. Infrastructure as a service (IaaS)
7. Desktop-as-a-Service (DaaS)
8. Database-as-a-Service (DBaaS)
9. Network-as-a-service (NaaS)
10. Storage-as-a-Service (STaaS)
11. Platform-as-a service (PaaS)
12. Disaster recovery-as-a-service (DRaaS)
1. Hardware-as-a-Service (HaaS): Managed service providers (MSP) own some hardware and install it
on
customers’ sites on demand. Customers utilize the hardware in accordance with service level
agreements. This pay-as-you-go model is similar to leasing and can be compared to IaaS when
computing resources are located at MSP’s site and provided to users as virtual equivalents of
physical hardware.
2. Communication-as-a-Service (CaaS): This model includes different communication solutions such
as VoIP (voice over IP or Internet telephony), IM (instant messaging), video conference applications
that are hosted in the vendor’s cloud. A company can selectively deploy communication apps that
best suittheir current needs for a certain period and pay for this usage period only.
3. Monitoring-as-a-Service (MaaS) is a security service that provides security to IT assets of any
business24/7. It plays a vital role in securing an enterprise or government clients from any possible
cyber threats. MaaS is a monitoring service that can be outsourced in a flexible and consumption-
based subscription model.
4. Security-as-a-Service (SECaaS): This is the model of outsourced security management. A provider
integrates their security services into your company’s infrastructure and, as a rule, delivers them
over the Internet. Such services may include anti-virus software, encryption, authentication,
intrusion detection solutions and more.
5. Software-as-a-Service (SaaS): It is a cloud-based method of providing software to users. SaaS users
subscribe to an application rather than purchasing it once and installing it. Users can log into and use
aSaaS application from any compatible device over the Internet. The actual application
runsin cloud servers that may be far removed from a user's location.
6. Infrastructure-as-a-Service(IaaS) is an instant computing infrastructure, provisioned and managed
over the internet. A cloud computing service provider, such as Azure, manages the infrastructure,
while you purchase, install, configure and manage your own software—operating systems,
middleware and applications.
7. Desktop-as-a-Service (DaaS): Desktops are delivered as virtual services along with the apps needed
foruse. Thus, a client can work on a personal computer, using the computing capacities of third-
party servers (which can be much more powerful than those of a PC).
8. Database-as-a-Service (DBaaS) is a cloud computing service model that provides users with some
formof access to a database without the need for setting up physical hardware, installing software
or configuring for performance. All of the administrative tasks and maintenance are taken care of
by the service provider so that all the user or application owner needs to do is use the database. Of
course, ifthe customer opts for more control over the database, this option is available and may vary
dependingon the provider.
9. Network-as-a-Service-(NaaS) brings Software Defined Networking (SDN), programmable
networking and API-based operation to WAN services, transport, hybrid cloud, multi-cloud, Private
Network Interconnect, and Internet Exchanges. Historic definitions focused on fundamental
concepts of NaaS including: NaaS describes services for network transport connectivity. NaaS
involves the optimization ofresource allocations by considering network and computing resources
as a unified whole.
10. Storage-as-a-Service (SaaS) is a cloud business model in which a company leases or rents
its storage infrastructure to another company or individuals to store data. The client transfers the
datameant for storage to the service provider on a set schedule over the SaaS provider's wide area
networkor over the Internet.
11. Platform-as-a-Service (PaaS ) as the name suggests, provides you computing platforms which
typically includes operating system, programming language execution environment, database, web
serveretc. Examples: AWS Elastic Beanstalk, Windows Azure, Heroku, Force.com, Google App Engine,
ApacheStratos.
12. Disaster recovery-as-a-Service (DRaaS) is a cloud computing service model that allows an
organizationto back up its data and IT infrastructure in a third-party cloud computing environment
and provide all the DR orchestration, all through a SaaS solution, to regain access and functionality
to IT infrastructure after a disaster. The as-a-service model means that the organization itself
doesn’t have to own all the resources or handle all the management for disaster recovery, instead
relying on the service provider.
➔ The Cloud is a centralized system that helps to deliver and transport data and various files across the
Internet to data centers. The different data and programs can be accessed easily from the
centralized Cloud system. Cloud Computing is an economic solution, as it does not require on-site
infrastructure for storage, processing and analytics. The scalability of Cloud Computing means that
as your business grows, your technological and analytical capabilities can too.
➔ There are different types of Cloud services available, including Microsoft Azure Cloud development,
and more information on each of these varying types of Cloud solutions can be found in our previous
guide.
➔ it is essential that both cloud and IoT form cloud-based IoT applications in a bid to make the most
out of their combination. This alliance has led to the success of IoT. In addition to this, here are a few
morepointers as to why the cloud is important from the point of view of IoT’s success that are-
Internet of Things
The Internet of Things (IoT) is a scenario in which objects, animals or people are provided with
single identifiers and the capability to automatically transfer and the capability to automatically
transfer data more to a network without requiring human-to-human or human-to-computer
communication.
Arduino Board:
➢ An Arduino is actually a microcontroller-based kit.
➢ It is basically used in communications and in controlling or operating many devices.
➢ Arduino UNO board is the most popular board in the Arduino board family.
➢ In addition, it is the best board to get started with electronics and coding.
➢ Some boards look a bit different from the one given below, but most Arduino’s
havemajority of these components in common.
➢ It consists of two memories- Program memory and the data memory.
➢ The code is stored in the flash program memory, whereas the data is stored in the data
memory.
➢ Arduino Uno consists of 14 digital input/output pins (of which 6 can be used as PWM
outputs), 6 analog inputs, a 16 MHz crystal oscillator, a USB connection, a power jack, an
ICSP header, and a reset button
16.AREF
17.Arduino Reset 15.Digital I/O
14.TX and RX
LEDs
1.Power
USB 13.Power
LED
indicator
4.Crystal Oscillator
12.ICSP pin
3.Voltage
Regulator
11.Main
microcontroller
2.Power
(Barrel Jack)
5.Arduino Reset
10.Analog pins
6,7,8,9.Pins (3.3,
5, GND, Vin)
1. Power USB
Arduino board can be powered by using the USB cable from your computer. All you need
to do is connect the USB cable to the USB connection (1).
2. Power (Barrel Jack)
Arduino boards can be powered directly from the AC mains power supply by connecting
it to the Barrel Jack (2).
3. Voltage Regulator
The function of the voltage regulator is to control the voltage given to the Arduino board
and stabilize the DC voltages used by the processor and other elements.
4. Crystal Oscillator
The crystal oscillator helps Arduino in dealing with time issues. How does Arduino
calculate time? The answer is, by using the crystal oscillator. The number printed on top of the
Arduino crystal is 16.000H9H. It tells us that the frequency is 16,000,000 Hertz or 16 MHz.
5. Arduino Reset
You can reset your Arduino board, i.e., start your program from the beginning. You can
reset the UNO board in two ways. First, by using the reset button (17) on the board. Second, you
can connect an external reset button to the Arduino pin labelled RESET (5).
6,7,8,9.Pins (3.3, 5, GND, Vin)
• 3.3V (6) − Supply 3.3 output volt
• 5V (7) − Supply 5 output volt
• Most of the components used with Arduino board works fine with 3.3 volt and 5 volt.
• GND (8)(Ground) − There are several GND pins on the Arduino, any of which can be
used to ground your circuit.
• Vin (9) − This pin also can be used to power the Arduino board from an external power
source, like AC mains power supply.
10. Analog pins
The Arduino UNO board has six analog input pins A0 through A5. These pins can read the
signal from an analog sensor like the humidity sensor or temperature sensor and convert it
into a digital value that can be read by the microprocessor.
This LED should light up when you plug your Arduino into a power source to indicate that
your board is powered up correctly. If this light does not turn on, then there is something
wrong with the connection.
On your board, you will find two labels: TX (transmit) and RX (receive). They appear in
two places on the Arduino UNO board. First, at the digital pins 0 and 1, to indicate the pins
responsible for serial communication. Second, the TX and RX led (13). The TX led flashes
with different speed while sending the serial data. The speed of flashing depends on the
baud rate used by the board. RX flashes during the receiving process.
• The Arduino UNO board has 14 digital I/O pins (15) (of which 6 provide PWM (Pulse
Width Modulation) output. These pins can be configured to work as input digital pins to
read logic values (0 or 1) or as digital output pins to drive different modules like LEDs,
relays, etc. The pins labeled “~” can be used to generate PWM.
16. AREF
• AREF stands for Analog Reference. It is sometimes, used to set an external
referencevoltage (between 0 and 5 Volts) as the upper limit for the analog input pins.
Program an Arduino
➢ The most important advantage with Arduino is the programs can be directly loaded to
thedevice without requiring any hardware programmer to burn the program.
➢ This is done because of the presence of the 0.5KB of Bootloader which allows
theprogram to be burned into the circuit.
➢ All we have to do is to download the Arduino software and writing the code.
➢ The Arduino tool window consists of the toolbar with the buttons like verify, upload,
new, open, save, serial monitor.
➢ It also consists of a text editor to write the code, a message area which displays the
feedback like showing the errors, the text console which displays the output and a series
of menus like the File, Edit, Tools menu.
1. Declaration of Variables.
2. Initialization: It is written in the setup () function.
3. Control code: It is written in the loop () function.
➢ The sketch is saved with .ino extension. Any operations like verifying, opening a sketch,
saving a sketch can be done using the buttons on the toolbar or using the tool menu.
➢ Chose the proper board from the tools menu and the serial port numbers.
➢ Click on the upload button or chose upload from the tools menu. Thus the code is
uploaded by the bootloader onto the microcontroller.
• The IC socket and the power jack are mounted on the board.
• Mount the female headers onto the board and connect them to the
respectivepins on the chip.
1. It is inexpensive
2. It comes with an open source hardware feature which enables users to develop their own
kit using already available one as a reference source.
3. The Arduino software is compatible with all types of operating systems like Windows,
Linux, and Macintosh etc.
4. It also comes with open source software feature which enables experienced software
developers to use the Arduino code to merge with the existing programming language
libraries and can be extended and modified.
5. It is easy to use for beginners.
6. We can develop an Arduino based project which can be completely stand alone
orprojects which involve direct communication with the software loaded in the
computer.
7. It comes with an easy provision of connecting with the CPU of the computer using
serialcommunication over USB as it contains built in power and reset circuitry.
Raspberry Pi
➢ The Raspberry Pi is a very cheap computer that runs Linux, but it also provides a set of
GPIO (general purpose input/output) pins that allow you to control electronic
components for physical computing and explore the Internet of Things (IoT).
➢ Raspberry Pi was basically introduced in 2006.
➢ It is particularly designed for educational use and intended for Python.
➢ A Raspberry Pi is of small size i.e., of a credit card sized single board computer, which is
developed in the United Kingdom (U.K) by a foundation called Raspberry Pi.
➢ There have been three generations of Raspberry Pis: Pi 1, Pi 2, and Pi 3
➢ The first generation of Raspberry (Pi 1) was released in the year 2012, that has two
typesof models namely model A and model B.
➢ Raspberry Pi can be plugged into a TV, computer monitor, and it uses a standard
keyboard and mouse.
➢ It is user friendly as can be handled by all the age groups.
➢ It does everything you would expect a desktop computer to do like word-
processing,browsing the internet spreadsheets, playing games to playing high definition
videos.
➢ All models feature on a broadcom system on a chip (SOC), which includes chip graphics
processing unit GPU(a Video Core IV), an ARM compatible and CPU.
➢ The CPU speed ranges from 700 MHz to 1.2 GHz for the Pi 3 and on board memory
range from 256 MB to 1 GB RAM.
➢ An operating system is stored in the secured digital SD cards and program memory
ineither the MicroSDHC or SDHC sizes.
➢ Most boards have one to four USB slots, composite video output, HDMI and a 3.5
mmphone jack for audio. Some models have WiFi and Bluetooth.
➢ Several generations of Raspberry Pis have been released.
➢ All models feature a Broadcom system on a chip (SoC) with an integrated ARM-
compatible central processing unit (CPU) and on-chip graphics processing unit (GPU).
➢ Processor speed ranges from 700 MHz to 1.4 GHz for the Pi 3 Model B+ or 1.5 GHz for the
Pi 4; on-board memory ranges from 256 MB to 1 GB with up to 4 GB available onthe Pi
4 random-access memory (RAM).
➢ Secure Digital (SD) cards in MicroSDHC form factor (SDHC on early models) are used to
store the operating system and program memory.
➢ The boards have one to five USB ports. For video output, HDMI and composite video are
supported, with a standard 3.5 mm tip-ring-sleeve jack for audio output.
➢ Lower-level output is provided by a number of GPIO pins, which support common
protocols like I²C. The B-models have an 8P8C Ethernet port and the Pi 3 and Pi Zero W
have on-board Wi-Fi and Bluetooth.
Components and Peripherals
➢ Voltages: Two 5V pins and two 3V3 pins are present on the board, as well as a number
of ground pins (0V). The remaining pins are all general purpose 3V3 pins
➢ A GPIO pin designated as an output pin can be set to high (3V3) or low (0V). A GPIO pin
designated as an input pin can be read as high (3V3) or low (0V).
➢ Processor & RAM: Raspberry based on ARM11 processor. Latest version supports
700MHz processor and 512MB SDRAM. The Central processing unit is the brain of the
raspberry pi board and that is responsible for carrying out the instructions of the
computerthrough logical and mathematical operations.
➢ Ethernet: The Ethernet port of the raspberry pi is the main gateway for communicating
with additional devices. The raspberry pi Ethernet port is used to plug your home router
to access the internet.
➢ USB Ports: It has 2 USB ports. USB port provide current upto 100mA. For
connecting devices that draw current more than 100mA, an external USB
powered hub is required.
➢ Ethernet Port: It has standard RJ45 Ethernet port. Connect Ethernet cable or
USB wifi adapter to provide internet connectivity.
➢ HDMI Output: It supports both audio and video output. Connect raspberry Pi
to monitorusing HDMI cable.
➢ Composite video Output: Raspberry comes with a composite video output
with an RCAjack that supports both PAL and NTSC video output.
➢ Audio Output: It has 3.5mm audio output jack. This audio jack is used for
providing audio output to old television along with RCA jack for video.
➢ GPIO Pins: It has a number of general purpose input/output pins. These pins
are used to connect other electronic components. For example, you can
connect it to the temperature sensor to transmit digital data.
➢ Display Serial Interface (DSI): DSI interface are used to connect an LCD panel
to Raspberry PI.
➢ Cameral Serial Interface(CSI): CSI interface are used to connect a camera
module to Raspberry PI.
➢ SD Card slot: Raspberry does not have built in OS and storage. Plug in an SD
card loaded with Linux to SD card slot.
➢ Power Input: Raspberry has a micro USP connector for power input.
➢ Memory: The raspberry pi model A board is designed with 256MB of SDRAM
and model B is designed with 51MB.Raspberry pi is a small size PC compare
with other PCs.The normal PCs RAM memory is available in gigabytes. But in
raspberry pi board, the RAM memory is available more than 256MB or
512MB
➢ Status LEDs: Raspberry has 5 status LEDs.
Status LED Function
ACT SD card Access
PWR 3.3V power is present
FDX Full duplex LAN Connected
LNK Link/Network Activity
100 100 Mbit LAN connected
Raspberry PI Interfaces:
➢ It supports SPI, serial and I2C interfaces for data transfer.
➢ Serial : Serial Interface on Raspberry has receive(Rx) and Transmit(Tx) pins for
communication with serial peripherals.
➢ SPI: Serial Peripheral Interface (SPI) is a synchronous serial data protocol used for
communicating with one or more peripheral devices. In an SPI connection, there
is one master device and one or more peripheral devices. There are 5 pins
Raspberry for SPI interface.
o MISO(Master In Slave Out): Master line for sending data to the peripherals.
o MOSI(Master Out Slave In): Slave Line for sending data to the master.
o SCK(Serial Clock): Clock generated by master to synchronize data
transmission
o CE0(Chip Enable 0): To enable or disable devices.
o CE1(Chip Enable 1): To enable or disable devices.
➢ I2C: I2C Interface pins are used to connect hardware modules. I2C
interface allowssynchronous data transfer with two pins: SDA(data line)
and SCL (Clock Line)
2. RASPBERRY PI 3 has wireless LAN and Bluetooth facility by which you can setup
WIFI HOTSPOT for internet connectivity.
3. RASPBERRY PI had dedicated port for connecting touch LCD display which is a
feature that completely omits the need of monitor.
4. RASPBERRY PI also has dedicated camera port so one can connect camera without
any hassle to the PI board.
6. It supports HD steaming
Applications
✓ Hobby projects.
✓ Low cost PC/tablet/laptop
✓ IoT applications
✓ Media center
✓ Robotics
✓ Industrial/Home automation
✓ Server/cloud server
✓ Print server
✓ Security monitoring
✓ Web camera
✓ Gaming
✓ Wireless access point
• Publish-Subscribe:
This model involves publishers, brokers and consumers. Publishers are the
sources of data. Publishers send the data to the topic which are managed by the
broker. Publishers are not aware of the consumers.
Consumers subscribe to the topics which are managed by the broker. When
broker receives the data from the Publisher, it sends to all the consumers.
• Push-Pull:
In this model the producers push the data in queues and the consumers pull the data
from the queues. Producers do not need to be aware of the consumers. Queues help
in decoupling the messaging between the producer and consumers. Queues also act
as buffer which helps in situation when there is mismatch between the rate at which
the producers push the data and consumers pull the data.
Sensors
Sensor is a device that when exposed to a physical phenomenon (temperature,
displacement, force, etc.) produces a proportional output signal (electrical, mechanical,
magnetic, etc.). The term transducer is often used synonymously with sensors.
However, ideally, a sensor is a device that responds to a change in the physical
phenomenon. On the other hand, a transducer is a device that converts one form of
energy into another form of energy. Sensors are transducers when they sense one form
of energy input and output in a different form of energy. For example, a thermocouple
responds to a temperature change (thermal energy) and outputs a proportional change
in electromotive force (electrical energy). Therefore, a thermocouple can be called a
sensor and or transducer.
Types of Sensors:
1. Linear Sensors:
Among many linear displacement sensors, strain gage
provides high resolution at low noise level and is least
expensive. A typical resistance strain gage consists of
resistive foil arranged. Strain gage 1 is bonded to the
loading member whereas strain gage 2 is bonded to a
second member made of same material, but not loaded.
This arrangement compensates for any temperature
effect.
2. Acceleration Sensors
Flow sensing is relatively a difficult task. The fluid medium can be liquid, gas, or a
mixture of the two. Furthermore, the flow could be laminar or turbulent and can be a
time-varying phenomenon. The venture meter and orifice plate restrict the flow and use
the pressure difference to determine the flow rate. The pitot tube pressure probe is
another popular method of measuring flow rate. When positioned againstthe flow,
they measure the total and static pressures. The flow velocity and in turn the flow rate
can then be determined. The rotameter and the turbine meters when placed in the flow
path, rotate at a speed proportional to the flow rate. The electromagnetic flow meters
use noncontact method. Magnetic field is applied in the transversedirection of the flow
and the fluid acts as the conductor to induce voltage proportionalto the flow rate.
6. Temperature Sensors
A variety of devices are available to measure temperature, the most common of which
are thermocouples, thermisters, resistance temperature detectors (RTD), and infrared
types. Thermocouples are the most versatile, inexpensive, and have a wide range (up to
1200∞C typical). A thermocouple simply consists of two dissimilar metal
wires joined at the ends to create the sensing junction. When used in conjunctionwith a
reference junction, the temperature difference between the reference junction and the actual
temperature shows up as a voltage potential. Thermisters are semiconductor devices whose
resistance changes as the temperature changes. They are good for very high sensitivity
measurements in a limited range of up to 100
∞ C. The relationship between the temperature and the resistance is nonlinear. The RTD s use
the phenomenon that the resistance of a metal changes withtemperature. They are, however,
linear over a wide range and most stable.
7. Proximity Sensors
They are used to sense the proximity of an object relative to another object. They usually provide
a on or off signal indicating the presence or absence of an object. Inductance, capacitance,
photoelectric, and hall effect types are widely used as proximity sensors. Inductance proximity
sensors consist of a coil wound around asoft iron core. The inductance of the sensor changes
when a ferrous object is in its proximity. This change is converted to a voltage-triggered switch.
Capacitance types are similar to inductance except the proximity of an object changes the gap
and affects the capacitance. Photoelectric sensors are normally aligned with an infrared light
source. The proximity of a moving object interrupts the light beam causing the voltage level to
change. Hall effect voltage is produced when a current-carrying conductor is exposed to a
transverse magnetic field. The voltage is proportional to transverse distance between the hall
effect sensor and an object in its proximity.
8. Light Sensors
Light intensity and full field vision are two important measurements used in many control
applications. Phototransistors,photoresistors, and photodiodes aresome of the more common type
of light intensity sensors. A commonphotoresistor is made of cadmium sulphide whose resistance
is maximum
when the sensor is in dark. When the photoresistor is exposed to light, its resistance drops in
proportion to the intensity of light. When interfaced with a circuit and balanced, the change in
light intensity will show up as change in voltage. These sensors are simple, reliable, and cheap,
used widely for measuring light intensity.
Actuators
Actuators are basically the muscle behind a mechatronics system that accepts a control
command (mostly in the form of an electrical signal) and producesa change in the physical system by
generating force, motion, heat, flow, etc. Normally, the actuators are used in conjunction with the
power supply and a couplingmechanism. The power unit provides either AC or DC power at the rated
voltage and current. The coupling mechanism acts as the interface between the actuator and the
physical system. Typical mechanisms include rack and pinion, gear drive, belt drive, lead screw and
nut, piston, and linkages.
Types of Actuators
1. Electrical Actuators
Electrical switches are the choice of actuators for most of the on-off typecontrol action. Switching
devices such as diodes, transistors, triacs, MOSFET,and relays accept a low energy level command signal
from the controller and switch on or off electrical devices such as motors, valves, and heating elements.
For example, a MOSFET switch. The gate terminal receives the low energy control signal from the
controller that makes or breaks the connection between the power supply and the actuator load.
When switches are used, the designer must make sure that switch bounce problem is eliminated either
by hardware or software.
2. Electromechanical Actuators
The most common electromechanical actuator is a motor that converts
electrical energy to mechanical motion. Motors are the principal means of
converting electrical energy into mechanical energy in industry. Broadly
they can be classified as DC motors, AC motors, and stepper motors. The
stepper motor is a discrete (incremental) positioning device that moves
one step at a time for each pulse command input. Since they accept direct
digital commands and produce a mechanical motion, the stepper motors
are used widely in industrial control applications. They are mostly used
in fractional horsepower applications. With the rapid progress in low cost
and high frequency solid-state drives, they are finding increased
applications.
Figure shows a simplified unipolar stepper motor. The winding-1 is between the top and bottom
stator pole, and the winding-2 is between the left and right motor poles. The rotor is a permanent
magnet with six poles resulting in a single step angle of 30∞. With appropriate excitation of winding-
1, the top stator pole becomes a north pole and the bottom stator pole becomes a south pole. This
attracts the rotor into the position as shown. Now if the winding-1 is de-energized and winding-2 is
energized, the rotor will turn 30∞.
3. Electromagnetic Actuators
The solenoid is the most common electromagnetic actuator. A DC solenoid actuator consists of a soft
iron core enclosed within a current carrying coil. When the coil is energized, a magnetic field is
established that provides the force to push or pull the iron core. AC solenoid devices are also
encountered, such as AC excitation relay. A solenoid operated directional control valve is shown in
Fig. 2.10. Normally, due to the spring force, the soft iron core is pushed to the extreme left position
as shown. When the solenoid is excited, the soft iron core will move to the right extreme position thus
providing the electromagnetic actuation. Another important type is the electromagnet. The
electromagnets are used extensively inapplications that require large forces.
4. Smart Material Actuators
Unlike the conventional actuators, the smart material actuators
typically become part of the load bearing structures. This is achieved
by embedding the actuators in a distributed manner and integrating
into the load bearing structure that could be used to suppress
vibration, cancel the noise, and change shape. Of the many smart
material actuators, shape memory alloys, piezoelectric (PZT),
magnetostrictive,
, logical fluids, and ion exchange polymers are most common.
The PZT actuators are essentially piezocrystals with top and bottom conducting filmsas shown in Fig.
When an electric voltage is applied across the two conducting films, the crystal expands in the
transverse direction as shown by the dotted lines. When the voltage polarity is reversed, the crystal
contracts thereby providing bidirectional actuation.
I/O interfaces
The Input Output Interface (IOI) is a technique for exchanging data between internal and
external storage and I/O devices.
The Input-Output Interface (I/O) is a means for moving data between internal storage devices,
such as memory, and external peripheral devices. A peripheral device, often known as an
input-output device, is a device that provides input and output for a computer. Consider the
following scenario: Input devices, such as a keyboard and mouse, offer input to the computer,
and output devices, such as a monitor and printer, provide output to the computer. In addition
to external hard drives, several peripheral devices that can provide both input and output are
also available.
For peripherals connected to a computer to communicate with the central processing unit,
special communication cables are required.
The communication link's aim is to reconcile the disparities between the central computer and
each peripheral.
The Arduino Rest API is a way for Arduino and other external systems to communicate data.
It is possible to operate Arduino from afar using the Arduino Rest API framework. The
confluence of APIs and IoT creates new integration possibilities. The creation of an API
ecosystem is a fascinating topic, and the way we use APIs to access IoT services exposed
by remote IoT boards is a difficult component.
In greater detail, a client application uses the Arduino Rest API to read or transmit data to
the Arduino board. An external system or application that retrieves sensor values is a
common use case for HTTP Rest API.
When different systems and boards are connected and share information, the Arduino Rest
API framework can be used in IoT projects. The Arduino Rest API is used by IoT cloud
companies as well. This type of method is used when an external application (client) submits
a request to Arduino, and Arduino responds with data.
Because the Arduino Rest API uses the HTTP protocol, these queries are synchronous. Other
protocols, like as MQTT, can be utilized in IoT applications. When Arduino is acting as a
server in a client-server scenario, the Arduino API over HTTP plays a critical role. MQTT,
for example, employs a structure known as publish-subscribe.
Arduino implementations
Now that we've covered the fundamentals of Arduino and how to utilize it to connect it to an
external system, we'll go through how to put it into reality. We'll use Rest API requests to
control an LED strip in this example. Because we need to concentrate on the Arduino Rest
API, the sketch is straightforward. The LED strip is a Neopixels RGB Stick Board, and it is
able to select a single RGB led color using the Adafruit library.
The following sketch demonstrates how to connect it to an Arduino UNO.
Fig : Arduino UNO
The Neopixel components in this image are different, but the connections are the
same.
We want to change the color of the led strip using a Rest JSON API call. The color
is supplied as a HEX parameter to the sketch function. This sample exemplifies the
library's versatility. The Arduino code is straightforward:
// Create aREST
instance AREST rest =
aREST();
// NeoPixel Init
Adafruit_NeoPixel pixels = Adafruit_NeoPixel(NUMPIXELS, PIN, NEO_GRB +
NEO_KHZ800);
Void setup() {
Serial.begin(115200);
Pixels.begin();
Serial.println("Setup
complete.\n");
}
Void loop() {
// listen for incoming clients
EthernetClient client =
server.available(); Rest.handle(client);
Wdt_reset();
}
Int setPixelColor(String hexColor) {
HexColor="0x" + hexColor;
Serial.println("Hex color " +
hexColor); Long n = strtol(
&hexColor[0], NULL, 16);
Serial.println("N :" + String(n));
Long r = n << 16;
Long g = n << 8 &&
0xFF; Long b = n &&
0xFF;
// set single pixel color
Return 1;
}
SetColor is the Arduino function that we'd like to make available via an Arduino HTTP
Rest API. As a result, the sketch registers it as rgb at line 36.
Protocols-MQTT
MQTT (Message Queuing Telemetry Transport) is an IBM-developed lightweight
messaging protocol that was initially introduced in 1999. It interprets communications
between devices, servers, and applications using the pub/sub pattern.
The MQTT protocol was established with the goal of connecting sensors on oil
pipelines to communications satellites with the least amount of battery loss and
bandwidth use possible.
MQTT has been evolving since its creation, with version 5.0 being released in May
2018. Version 3.1.1 was accepted as an ISO standard after being submitted to the
OASIS consortium in 2013.
Advantages
The following are some of the advantages of MQTT:
● Lightweight code footprint - The MQTT protocol requires only a few lines of
code to get up and running on devices.
● Minimized data packets - MQTT is a low-energy protocol. If a device is
battery- powered or has a low CPU, this is ideal.
● Speed - Outside of QoS, MQTT functions in real time with no delays.
MQTT architecture
In the MQTT protocol, connected devices are known as "clients," and they
communicate with a server known as the "broker." Data communication between
clients is handled by the broker.
When a customer (known as a "publisher") wants to disseminate information, it publishes
to a specific topic, which the broker then distributes to any clients who have subscribed
to that topic (known as "subscribers").
The publisher does not require information on the number of subscribers or their
locations. As a result, subscribers do not require any information about the publisher.
Any client can be both a publisher and a subscriber. The clients are usually unaware of
each other and are only aware of the broker who acts as an intermediary. The “pub/sub
model” is a popular term for this structure.
MQTT messages
A “publish” occurs when a customer wishes to submit data to the broker. A client will
"subscribe" to a subject or topics if they desire to get data from the broker. When a
client subscribes to a topic, it will get all future messages that are published on that
subject.
The publisher additionally sends a QoS (Quality of Service) level along with the
message. This level specifies the message's delivery guarantee. The following are the
levels of QoS:
● At most once - The broker will only get the message "at most once" after it is
published. This level should not be utilized for mission-critical information since it
increases the danger of the message not being received by the intended recipients.
● At least once - The publisher will continue to resend the message until it obtains a
response from the broker on the specific message. In other words, ensuring that the
message is received is more critical than ensuring that it is only received once. This is
most likely the most used QoS level.
● Exactly once - The publisher and the broker collaborate to ensure that the broker
receives and acts on messages only once. This necessitates some more effort in the
form of a four-part handshake. This is the safest QoS level, but it's also the slowest,
therefore it's only used when absolutely required.
ZigBee
Zigbee is a standards-based wireless technology that enables low-cost, low-power wireless
M2M and internet of things (IoT) networks.
Zigbee is an open standard for low-data-rate, low-power applications. This allows for the
mixing of implementations from different manufacturers in theory, but in practice, vendors
have expanded and personalized Zigbee devices, resulting in interoperability concerns.
Unlike Wi-Fi networks, which employ a mesh networking protocol to avoid hub devices
and establish a self-healing design, Zigbee networks support significantly lower data rates
and utilize a mesh networking protocol to avoid hub devices and build a self-healing
architecture.
Furthermore, these mesh networks self-configure when devices are added or withdrawn,
and their interconnection allows for a greater coverage range than competitors like
Bluetooth Low Energy.
Despite this, Zigbee remains a low-range communication standard, with a coverage
range of up to 100 meters. As a result, it's an excellent solution for personal spaces such
as smart homes or in-building operations.
A coordinator, a router, and a device make up a Zigbee network. The coordinator
serves as the network's hub, connecting all of its components and managing data
transfer and storage.
The routers in the network support Zigbee coordinators. These are data-transfer devices
that send and receive data from a variety of devices, including televisions, doors,
cameras, and thermostats.
Zigbee is known for its secure connections, which is why it's often the chosen choice
for personal area networks, particularly in corporate networks with sensitive data.
Because of its low power consumption, Zigbee is a better choice for IoT connectivity than
Wifi. It's utilized for a variety of tasks, such as smart building automation, temperature
management, and more.
Zigbee is an ideal partner for any business where little amounts of data are exchanged
rarely, such as remote monitoring or in-building applications.
The properties of ZigBee set it unique from other conceivable IoT protocols, allowing
it to carve out its own niche in the market. Because of its mesh topography, it can handle
longer distances than Bluetooth Low Energy, and its extremely low energy consumption
makes it more IoT-friendly than Wi-Fi.
According to Gigaom, after the chips are extensively utilized in houses, the next stage
will be to include a ZigBee chip in cellphones. Because the homeowner's primary method
of communicating with sensors in the home is through their smartphone or tablet, having
such a chip built inside would put it in the hands of millions of smartphone owners who
could turn it on at the touch of a button.
ZigBee radios are currently installed in homes via a hub, router, or set-top box, making
their adoption by homeowners reliant on service providers and early adopters of
products such as the Almond Router, SmartThings hub, or Revolv hub.
However, ZigBee already has a considerable presence in the market. In fact, if you
have a Nest thermostat, Comcast's new router, or a Hue lighting, you already have
ZigBee chips.
Unfortunately, the specification has had several difficulties in recent years, with
interoperability issues highlighting much of its content. The issue is that the standard is
more than simply a wireless transport method; it also includes a layer of software that
can build profiles that conflict with other ZigBee profiles. So, unlike Wi-Fi, it's possible
that two ZigBee-enabled devices won't be able to communicate with one another.
Another obstacle that ZigBee must overcome is Z-Wave, its closest competitor. According
to Gigaom, nine out of ten sensors use the proprietary Z-wave protocol instead of ZigBee,
and more startups are releasing Bluetooth Low Energy devices that can talk with
smartphones.
Bluetooth
Bluetooth was created by Ericsson in 1994 to provide wireless headsets. Bluetooth has
since evolved into a wide range of products, including Bluetooth headsets, speakers,
printers, game controllers, and much more.
Bluetooth is particularly vital for the Internet of Things, which includes smart homes
and industrial applications, which is quickly developing. It's a low-power, low-range,
high-bandwidth solution for connectivity. When Bluetooth devices (for example, your
phone and your wireless speaker) connect, the parent-child paradigm is used, with one
device acting as the parent and the others as the children. The parent communicates with
the child, and the youngster listens for the parent to communicate with him or her.
Because a Bluetooth parent can have up to seven children, your computer can
connect to several devices through Bluetooth at the same time. A “piconet” is a
Bluetooth connection between two or more devices.
A device can be a parent in one piconet and a kid in another at the same time, and the
parent-child relationship can also change. When you put your Bluetooth device in pairing
mode to connect it, it becomes the parent for a short time in order to establish a connection
before connecting as the child.
Bluetooth, unlike WiFi, which we discussed in the previous chapter, was designed for
portable devices and related applications, so it excels when you need to connect two
devices with minimal configuration. Furthermore, because Bluetooth uses weak signals,
there is less interference, and devices may interact even in noisy surroundings.
Machines sending short bursts of data in excessively loud surroundings are common in
the Industrial Internet of Things. WiFi is too difficult to set up when there are hundreds
of sensors and devices sending data.
The lesser bandwidth of Bluetooth is a disadvantage, although for many industrial
applications, this isn't an issue.
Bluetooth can also be used in a smart home. Many smart home gadgets don't require high
bandwidth connections, and setting up Bluetooth is significantly easier.
Furthermore, recent Bluetooth versions may build a self-healing mesh network, which
implies that individual devices can still interact even if one is removed or loses power.
If your door locks, HVAC system, washer, dryer, fridge, and lights are all connected,
you don't want them to all fail at the same time.
Bluetooth Strengths and Weaknesses
Bluetooth's main strength is communication between Bluetooth-enabled devices such
as smartphones and tablets and specialized Bluetooth-enabled equipment. Bluetooth
requires a gateway for access since, unlike cellular or satellite communications, it does
not connect directly to the Internet. Bluetooth now has a range of roughly 328 feet (100
meters), making it ideal for use in the home and small business. Multiple gateways can
be set up throughout a facility to receive Bluetooth communications forlarger spaces.
Bluetooth 5 was announced by the Bluetooth SIG in March 2016, and it will double the
existing range of the technology, perhaps making Bluetooth more appealing for IoT
applications than Wi-Fi because it uses less power. Despite the improved range,
Bluetooth IoT requires device-to-device communications to take place within a specific
radius, and after the devices have communicated, their data must still reach a gateway
for Internet access. When compared to satellite or wireless cellular networks,which can
monitor object data regardless of location and interact with the internet
instantaneously, satellite or wireless cellular networks are superior. Cellular connectivity
will continue to be a better choice in remote locations, such as when used to track oil
and construction equipment.
CoAP
In the Internet of Things, the Confined Application Protocol (CoAP) is a customized
web transfer protocol for usage with constrained nodes and constrained networks.
CoAP is a protocol that allows basic, restricted devices to connect to the Internet of
Things, even across constrained networks with poor bandwidth and availability.
Machine-to-machine (M2M) applications such as smart energy and building
automation are common uses.
The main features of CoAP protocols are:
● Web protocol used in M2M with constrained requirements
● Asynchronous message exchange
● Low overhead and very simple to parse
● URI and content-type support
● Proxy and caching capabilities
Architecture
CoAP is a document transport protocol, similar to HTTP. Unlike HTTP, CoAP is created
with restricted devices in mind.
HTTP TCP transfers are substantially larger than CoAP packets. To save space, bitfieldsand
mappings from strings to integers are frequently utilized. Packets are simple to create
and can be parsed in place on restricted devices without spending additional RAM.
CoAP uses UDP rather than TCP. Connectionless datagrams are used to communicate
between clients and servers. In the application stack, retries and reordering are
implemented. By eliminating the need for TCP, compact microcontrollers may be able
to provide complete IP networking. CoAP enables the usage of UDP broadcast and
multicast for addressing.
The client/server model is used in CoAP. Clients send requests to servers, and servers
respond. Clients have access to resources that they can GET, PUT, POST, and DELETE.
Through simple proxies, CoAP is meant to work with HTTP and the RESTful web in
general.
CoAP can be used on top of SMS and other packet-based communications protocols
because it is datagram-based.
CoAP can be represented as follows from the abstraction protocol layer:
Fig: CoAP
The CoAp protocol is made up of two layers: messages and request/response. The
Messages layer is responsible for UDP and asynchronous messages. Based on
request/response messages, the Request/Response layer manages request/response
interaction.
Four different message types are supported by CoAP:
● Confirmable
● Non-confirmable
● Acknowledgment
● Reset
UDP
User Datagram Protocol (UDP) is less widespread in IoT (and data transmission in
general) than TCP. However, IoT manufacturers favor UDP since it requires fewer
network resources to transmit and does not require a continual connection between the
two endpoints. To put it another way, it uses less data and utilizes less energy.
Resource constrained devices
Low-power, lossy networks are frequently used by IoT devices (LLNs). Because LLNs
are optimized for power efficiency, they have a limited number of resources. The
Constrained Application Protocol (CoAP) was created expressly to assist these devices
in communicating, and it works on UDP-capable devices.
Low downlink transmissions
UDP does not acknowledge that a communication has been received. Although the sender
has no way of knowing whether the data packets have reached, the exchange requires less
downlink budget. UDP can be a useful communication protocol for communications with
limited downlink allowances.
Low power applications
Because IoT devices send data on a regular basis, losing a single datapoint is rarely a
problem. Every time a datapoint is lost or contains an error, attempting to resend the data
uses an additional battery. Because UDP does not provide an acknowledgement, the device
can shut down faster after sending or receiving data. This makes UDP appealing to
developers who want to get the most out of their resources.
UDP Security
While UDP is simple to set up and has a lower overhead, it makes your devices more
exposed to cyber threats.
It's more difficult to deliver a packet to a specific application using TCP because it
establishes a direct connection and provides a sequence number. Intercepting, altering,
and replicating data packets to attack a device, application, or network is easy with UDP.
Botnets (large networks of compromised computers, including IoT devices) can also
deliver false packets to a computer using UDP. Bots frequently transmit spam to non-
existent ports, forcing the computer to respond by stating that the port is inaccessible. This
swiftly diverts network resources away from legitimate data transmissions, potentially
causing the network to go down.
You must be vigilant about IoT security with UDP and be certain that your hardware
and network-level security can secure your customers' data and keep your devices from
becoming liabilities.
UDP datagrams
UDP traffic is carried in datagram packets, each of which is made up of a single message
unit. The first eight bytes hold the header information, but the remaining bytes hold the
actual message. The header of a UDP datagram is broken into four pieces, each of which
is two bytes long. These are the components:
● Source port - This 16-bit (2-byte) information is used to identify the data-sending
sender port. The range of permitted UDP port numbers is 0 to 65535.
● Destination port - This 16-bit data is used to identify the port on which the data
will be received by the receiver. The range of permitted UDP port numbers is 0 to
65535. This parameter is mandatory and identifies the receiver's port.
● Length - The length field gives the UDP packet's total length (UDP header and UDP
data). This specific field is a 16-bit field. In the absence of UDP data, the Length field
must be at least 8 bytes long.
● Checksum - The checksum value computed by the sender before delivering the data
to the recipient is stored in this field. UDP checksums keep message data from being
tampered with. The checksum value is an encoding of the datagram data that is calculated
by the sender first and then by the receiver. In UDP, checksums are optional, whereas in
TCP, checksums are required.
UDP Features
The User Datagram Protocol offers properties that make it useful for applications that can
suffer data loss. Consider the following scenario:
● It permits packets to be lost and received in a different order than when they
were sent, making it ideal for real-time applications where latency is an issue.
● It's suitable for transaction-based protocols like DNS and Network Time Protocol
(NTP).
● Gaming, audio or video conferencing, and streaming media are examples of
applications where a large number of customers are connected and real-time mistake
correction isn't required.
Advantages of UDP
The UDP/IP stack has the following benefits over the TCP/IP stack:
1) It is superior to TCP for applications that require continual data flow, large amounts of
data, and a higher level of speed than reliability.
2) Because it provides point-to-multipoint transmission, UDP is the best choice for
multicast and broadcast applications. In contrast to TCP/IP, where the sender is
responsible for each packet, the sender does not need to keep track of data
retransmission for many receivers.
3) UDP has a tiny packet header overhead (only 8 bytes), but TCP has a header of 20
bytes.
TCP
TCP is used in conjunction with the Internet Protocol (IP), which specifies how
computers exchange data packets. TCP and IP are the fundamental rules that govern the
Internet. The Internet Engineering Task Force (IETF) defines TCP in RFC 793, a
Request for Comment (RFC) standards document. TCP is a connection-oriented
protocol, which means it establishes and maintains a connection until both ends'
application programs have done exchanging messages.
TCP (Transmission Control Protocol) is a connection-oriented transport-layer protocol
that provides end-to-end reliable and ordered data transfer between applications
operating on Internet hosts. It was created four decades ago. TCP has remained the
dominant transport-layer protocol on the Internet ever since, with many key applications
(such as the WWW, e-mail, file transfer, instant messaging, and so on) relying on it.
However, as the Internet has grown beyond its core qualities, TCP has faced and
overcome enormous hurdles.
TCP has been effectively employed on mobile networks, despite the fundamental premise
of TCP congestion control that the Internet is a wired network and the challenges that
arise in wireless environments. TCP's extensive presence in mobile phones today is due
to optimization approaches.
The Internet of Things is a new challenge for TCP (IoT). Tens of billions of affordable
devices (e.g., sensors, actuators, etc.) attached to everyday things will be connected to
the Internet to enable smart scenarios in this big networking trend. IoT devices, on the
other hand, are frequently constrained (in terms of memory, computation, and energy),
employ low-speed and error-prone connectivity, and have multi-hop networks.
TCP has been heavily chastised as a transport-layer protocol for the Internet of Things due
to these challenging networking settings. As a result, many early IP-based IoT
implementations had to rely on UDP for application-layer dependability. The Constrained
Application Protocol (CoAP), a lightweight RESTful application-layer protocol designed
at the IETF for the Internet of Things, took the same approach.
Similarly, the IPv6 over Low Power Wireless Personal Area Networks project produced
enhancements for UDP header compression while neglecting TCP.
Unit – IV
DATA ACQUIRING AND STORAGE:
Following subsections describe devices data, and steps in acquiring and storing data for an
application, service or business process.
Data Generation:
⦿ Data generates at devices that later on, transfers to the Internet through a gateway.
Data generates as follows:
⦿ ● Passive devices data: Data generate at the device or system, following the result of
interactions. A passive device does not have its own power source. An external sourcehelps
such a device to generate and send data. Examples are an RFID (Example 2.2) or an ATM
debit card (Example 2.3). The device may or may not have an associated microcontroller,
memory and transceiver. A contactless card is an example of the former and a label or
barcode is the example of the latter.
⦿ Active devices data: Data generates at the device or system or following the result of
interactions. An active device has its own power source. Examples are active RFID,
streetlight sensor (Example 1.2) or wireless sensor node. An active device also has an
associated microcontroller, memory and transceiver.
⦿ Event data: A device can generate data on an event only once. For example, on detection of
the traffic or on dark ambient conditions, which signals the event. The event on darkness
communicates a need for lighting up a group of streetlights (Example 1.2). A system
consisting of security cameras can generate data on an event of security breach or on
detection of an intrusion. A waste container with associate circuit can generate data in the
event of getting it filled up 90% or above. The components and devices in an automobile
generate data of their performance and functioning. For example, on wearing out of a brake
lining, a play in steering wheel and reduced air- conditioning is felt. The data communicates
to the Internet. The communication takes place as and when the automobile reaches near a
Wi-Fi access point.
⦿ Device real-time data: An ATM generates data and communicates it to the server
instantaneously through the Internet. This initiates and enables Online Transactions
Processing (OLTP) in real time.
⦿ Event-driven device data: A device data can generate on an event only once. Examples are:
(i) a device receives command from Controller or Monitor, and then performs action(s)
using an actuator. When the action completes, then the device sends an acknowledgement;
(ii) When an application seeks the status of a device, then the devicecommunicates the status.
Data Acquisition:
Data acquisition means acquiring data from IoT or M2M devices. The data communicates
after the interactions with a data acquisition system (application). The application interacts and
communicates with a number of devices for acquiring the needed data. The devices send data on
demand or at programmed intervals. Data of devices communicate using the network, transport
and security layers (Figure 2.1). An application can configure the devices for the data when devices
have configuration capability. For example, the system can configure devices to send data at
defined periodic intervals.
Each device configuration controls the frequency of data generation. For example, system can
configure an umbrella device to acquire weather data from the Internet weather service, once each
working day in a week (Example 1.1). An ACVM can be configured to communicate the sales data
of machine and other information, every hour. The ACVM system can be configured to
communicate instantaneously in event of fault or in case requirement of a specific chocolate flavour
needs the Fill service
⦿ Application can configure sending of data after filtering or enriching at the gateway at the
data- adaptation layer. The gateway in-between application and the devices can provision
for one or more of the following functions—transcoding, data management and device
management. Data management may be provisioning of the privacy and security, and data
integration, compaction and fusion (Section 2.3).
⦿ Device-management software provisions for device ID or address, activation, configuring
(managing device parameters and settings), registering, deregistering, attaching, and
detaching (Section 2.3.2). Example 5.2 gives the process of acquiring data from the
embedded component devices in the automobiles for Automotive Components and
Predictive Automotive Maintenance System (ACPAMS) application.
Data Validation:
⦿ Data acquired from the devices does not mean that data are correct, meaningful or consistent.
Data consistency means within expected range data or as per pattern or data not corrupted
during transmission. Therefore, data needs validation checks. Data validation software do the
validation checks on the acquired data. Validation software applies logic, rules and semantic
annotations. The applications or services depend on valid data. Then only the analytics,
predictions, prescriptions, diagnosis and decisions can be acceptable
⦿ Large magnitude of data is acquired from a large number of devices, especially, from
machines in industrial plants or embedded components data from large number of
automobiles or health devices in ICUs or wireless sensor networks, and so on. Validation
software, therefore, consumes significant resources. An appropriate strategy needs to be
adopted. For example, the adopted strategy may be filtering out the invalid data at the
gateway or at device itself or controlling the frequency of acquiring or cyclically
scheduling the set of devices in industrial systems. Data enriches, aggregates, fuses or
compacts at the adaptation layer.
Data Store:
⦿ A data store is a data repository of a set of objects which integrate into the store. Features of
data store are: ● Objects in a data-store are modeled using Classes which are defined by the
database schemas. ● A data store is a general concept. It includes data repositories such as
database, relational database, flat file, spreadsheet, mail server, web server, directory
services and VMware ● A data store may be distributed over multiple nodes. Apache
Cassandra is an example of distributed data store.
⦿ A data store may consist of multiple schemas or may consist of data in only one scheme.
Example of only one scheme data store is a relational database. Repository in English means a
group, which can be related upon to look for required things, for special information or
knowledge
⦿ For example, a repository of paintings of artists. A database is a repository of data which can
be relied upon for reporting, analytics, process, knowledge discovery and intelligence.
⦿ A flat file is another repository. Flat file means a file in which the records have no structural
interrelationship (Section 5.3). Section 5.5.1 explains the spreadsheet concept. VMware uses
data store to refer to a file that stores a virtual machine
Server Management:
⦿ Server management means managing services, setup and maintenance of systems of all types
associated with the server.
⦿ A server needs to serve around the clock. Server management includes managing the following:
⦿ Short reaction times when the system or network is down
⦿ High security standards by routinely performing system maintenance and updation
⦿ Periodic system updates for state-of-the art setups ● Optimised performance
⦿ Monitoring of all critical services, with SMS and email notifications
⦿ Security of systems and protection
⦿ Maintaining confidentiality and privacy of data
⦿ High degree of security and integrity and effective protection of data, files and databases at the
organisation
⦿ Protection of customer data or enterprise internal documents by attackers which includes spam
mails, unauthorised use of the access to the server, viruses, malwares and worms
⦿ Strict documentation and audit of all activities
Spatial Storage:
⦿ Consider goods with RFID tags. When goods move from one place to another, the IDs of goods
as well as locations are needed in tracking or inventory control applications. Spatial storage is
storage as spatial database which is optimised to store and later on receives queries from the
applications. Suppose a digital map is required for parking slots in a city. Spatial data refers to
data which represents objects defined in a geometric space. Points, lines and polygons are
common geometric objects which can be represented in spatial databases. Spatial database can
also represent database for 3D objects, topological coverage, linear networks, triangular
irregular networks and other complex structures.
Additional functionality in spatial databases enables efficient processing
⦿ Internet communication by RFIDs, ATMs, vehicles, ambulances, traffic lights, streetlights, waste
containers are examples of where spatial database are used.
⦿ Spatial database functions optimally for spatial queries. A spatial database can perform typical
SQL queries, such as select statements and performs a wide variety of spatial operations.
Spatial database has the following features:
⦿ Can perform geometry constructors. For example, creating new geometries
⦿ Can define a shape using the vertices (points or nodes)
⦿ Can perform observer functions using queries which replies specific spatial information such as
location of the centre of a geometric object Can perform spatial measurements which mean
computing distance between geometries, lengths of lines, areas of polygons and other
parameters
⦿ Can change the existing features to new ones using spatial functions and can predicate spatial
relationships between geometries using true or false type queries
⦿ Can perform spatial measurements which mean computing distance between geometries, lengths
of lines, areas of polygons and other parameters
⦿● Can change the existing features to new ones using spatial functions and can predicate
spatial relationships between geometries using true or false type queries
installs the OS image, data store and application and controls them at the infrastructure. IaaS is
a service model where the applications develop or use the infrastructure which is
made available through the Internet on demand on rent (pay as per use in multi-tenancy model)
by a developer or user. IaaS computing systems, network and security are the responsibilities of
the cloud service provider. DaaS means Data as a Service
⦿ Data at a data centre is made available to a user or developer of application on demand.
DaaS is a service model where the data store or data warehouses is made available through
the Internet on demand on rent (pay as per use in multi tenancy model) to an enterprise. The
data centre management, 24×7 power, control, network, maintenance, scale up, data
replicating and mirror nodes and systems as well as physical security are the responsibilities
of the data centre service provider.
⦿ Data at a data centre is made available to a user or developer of application on demand.
DaaS is a service model where the data store or data warehouse is made available through
the Internet on demand on rent (pay as per use in multi tenancy model) to an enterprise. The
data centre management, 24×7 power, control, network, maintenance, scale up, data
replicating and mirror nodes and systems as well as physical security are the responsibilities
of the data centre service provider.
Unit – V
APPLICATION OF IOT
Home Automation:
Home automation has received a lot of attention of late in the IoT/M2M context. Basic
applications of the automated home include remote media control, heating control, lighting
control (including low power landscape lighting control), and appliance control. Sensed homes,
as examples of smart space, are seen as “next-step/nextgeneration” applications. Smart meters
and energy efficiency (making use o potential of SG), discussed above, also fit this category.
Telehealth (e.g., assisted living and in-home m- health services) also can be captured under this
set of applications; security and emergency services also can be included here instrumentation
of elements supporting daily living (e.g., appliances), comfort, health, security, and energy
efficiency can improve the quality of life and the quality of experience. Home control
applications include but are not limited to:
• _ Lighting control
• _ Thermostat/HVAC
• _ White goods/
• _ Appliance control
• _ In-home displays
Home security applications include but are not limited to:
• _ Door access phone
• _ Window locks
• _ Motion detector
• _ Smoke/fire alert
• _ Baby monitors
• _ Medical pendant
See Figure :for an illustrative example.
Energy efficiency at home is a key application of interest because of the possibility of
monetary saving for the consumer. Occupancy sensors can be used to establish whether there
is somebody in a room or not and when the room becomes unoccupied the lights are
automatically switched off; other types of sensors can be used to control te energy
consumption from different equipments (e.g., temperature, TVs, and so on). The sensors and
actuators can be autonomous (as in the case of light sensors), or can be connected to
anM2Mgateway control node (wirelessly or using wires, e.g., via PLC). By integrating the data
from a plethora of sensors (e.g., outside temperature, multizone heating status), the gateway
can dispatch the appropriate commands to the relevant actuators (e.g., to switch off the heater
in a room or zone, or in the entire house). The M2M system allows reducing energy
consumption by automatically adapting the use of the house equipment to various short-term
situations (people moving in and out of rooms, people going to work and retuning later) or
long- term situations (people taking vacations or long weekends or managing a second/vacation
home)
Smart Cities:
Cities around the world are getting “smarter” everyday through the implementation of
Internet of Things (IoT) devices. “What exactly does it mean for a city to get smarter?” you ask.
According to Kate Meis of Green Biz, “Smart cities are communities that are building
infrastructure to continuously improve the collection, aggregation and use of data to improve
the lives of their residents by harnessing the growing data revolution, low-cost sensors and
research collaborations, and doing so securely to protect public safety and individual privacy.”
Energy-efficient buildings
IoT technology is making it easier for buildings with legacy infrastructure to save
energy and improve their sustainability. Smart building energy management systems, for
instance, use IoT devices to connect disparate, nonstandard heating, cooling, lighting, and fire-
safety systems to a central management application. The energy management application then
highlights areas of high use and energy drifts so staff can correct them.
Research shows that commercial buildings waste up to 30 percent of the energy they
use, so savings with a smart building energy management system can be significant. As more
smart city buildings use energy management systems, the city will become more sustainable as
a whole.
Improved public safety
Smart cities and their CSP partners often implement video monitoring systems to tackle
the safety concerns that come up in every growing city. Some cities now have hundreds of
cameras monitoring traffic for accidents and public streets for safety concerns. Video analytics
softwarehelps process the thousands of hours of video footage each camera produces, whittling
it down to only important events. Systems using IoT technology turn every camera attached to
the system into a sensor, with edge computing and analytics starting right from the source.
Artificial intelligence technology like machine learning will then complete the analysis and
send video footage to humans who can react quickly to solve problems and keep residents safe.
Cities are also improving public safety with smart lighting initiatives that replace
traditional streelights with connected LED infrastructure. Not only do the LED lights last longer
and conserve energy, they also provide information on outages in real time. City workers can
use that information to ensure important areas are well lit to deter crimes and make the public
feel safer.
Energy:
The general goal is to monitor and control the consumption of utilities-supplied
consumable assets, such as electricity, gas, and water. Utility companies deploy intelligent
metering services by incorporating M2M communication modules into metering devices (“the
thing”); these intelligent meters are able to send information automatically (or on demand) to
a server application that can directly bill or control the metered resource. The ultimate objective
is to improve energy distribution performance and efficiency by utilizing accurate real-time
information on endpoint consumption. A variation of this application for metering of gas,
electricity, and water is a pre-payment arrangement: here a consumer can purchase a specific
volume of gas, electricity, water, and so on by pre-payment; the information about the
purchased volume is securely transmitted to the metering device and then securely stored on
the M2M modules. During use, the actual information about the consumed volume is
transmitted to theM2Mmodule, and when the purchased volume has been consumed, the supply
can be stopped (via a secure actuation capability) (5, 37). See Figure 3.2 for an example of a
smart flowmeter for a water utility application; similar concepts apply to natural gas or electric
power.
Retail Management:
Retailers are adopting IoT solutions across a number of applications that are improving
store operations, reducing theft, increasing purchases through cross selling, enabling precise
inventory management, and most importantly enhancing the consumer’s shopping experience.
The IoT is enabling physical retailers to compete more strongly against the online challengers,
to regain lost market share and continually attract consumers into the store, thus making it
easier for them to buy more while saving money.
Kaa is a leading enterprise IoT platform that can enable these benefits for retail
companies and serve as an IoT backbone for numerous smart retail services and solutions. It
allows you to quickly implement necessary applications for tracking goods with RFID tags,
ensure items on-shelf availability, utilize Bluetooth beacons to provide customers with
personalized mobile shopping experience, and set up digital signage in the store to attract
visitors and help them navigate through your products, discounts, and loyalty programs. IoT
retail solutions powered by Kaa can help you ensure that your customers have thorough
information on everything they might like in your store, and thus bring them closer to a buying
decision.
The Internet of Things (IoT) has the capability to transform the world we live in; more-
efficient industries, connected cars, and smarter cities are all components of the IoT equation.
However, the application of technology like IoT in agriculture could have the greatest impact.
The global population is set to touch 9.6 billion by 2050. So, to feed this much
population, the farming industry must embrace IoT. Against the challenges such as extreme
weather conditions and rising climate change, and environmental impact resulting from
intensive farming practices, the demand for more food has to be met.
Smart farming based on IoT technologies will enable growers and farmers to reduce waste and
enhance productivity ranging from the quantity of fertilizer utilized to the number of journeys
the farm vehicles have made.
Precision Farming
Also known as precision agriculture, precision farming can be thought of as anything that makes the
farming practice more controlled and accurate when it comes to raising livestock and growing of
crops. In this approach of farm management, a key component is the use of IT and various items
like sensors, control systems, robotics, autonomous vehicles, automated hardware, variable rate
technology, and so on.
The adoption of access to high-speed internet, mobile devices, and reliable, low- cost satellites (for
imagery and positioning) by the manufacturer are few key technologies characterizing the precision
agriculture trend.
Precision agriculture is one of the most famous applications of IoT in the agricultural sector and
numerous organizations are leveraging this technique around the world. CropMetrics is a precision
agriculture organization focused on ultra-modern agronomic solutions while specializing in the
management of precision irrigation.
The products and services of CropMetrics include VRI optimization, soil moisture probes, virtual
optimizer PRO, and so on. VRI (Variable Rate Irrigation) optimization maximizes profitability on
irrigated crop fields with topography or soil variability, improve yields, and increases water use
efficiency.
The soil moisture probe technology provides complete in-season local agronomy
support, and recommendations to optimize water use efficiency. The virtual optimizer PRO
combines various technologies for water management into one central, cloud based, and
powerful location designed for consultants and growers to take advantage of the benefits in
precision irrigation via a simplified interface.
Agricultural Drones
Technology has changed over time and agricultural drones are a very good example of
this. Today, agriculture is one of the major industries to incorporate drones. Drones are being
used in agriculture in order to enhance various agricultural practices. The ways ground-based
and aerial based drones are being used in agriculture are crop health assessment, irrigation,
crop monitoring, crop spraying, planting, and soil and field analysis.
The major benefits of using drones include crop health imaging, integrated GIS
mapping, ease of use, saves time, and the potential to increase yields. With strategy and
planning based on real-time data collection and processing, the drone technology will give a
high-tech makeover to the agriculture industry.
PrecisionHawk is an organization that uses drones for gathering valuable data via a
series of sensors that are used for imaging, mapping, and surveying of agricultural land. These
drones perform in-flight monitoring and observations. The farmers enter the details of what
field to survey, and select an altitude or ground resolution.
From the drone data, we can draw insights regarding plant health indices, plant counting and
yield prediction, plant height measurement, canopy cover mapping, field water ponsing
mapping, scouting reports, stockpile measuring, chlorophyll measurement, nitrogen content in
wheat, drainage mapping, weed pressure mapping, and so on.
The drone collects multispectral, thermal, and visual imagery during the flight and then
lands in the same location it took off.
Livestock Monitoring
Large farm owners can utilize wireless IoT applications to collect data regarding the
location, well-being, and health of their cattle. This information helps them in identifying
animals that are sick so they can be separated from the herd, thereby preventing the spread of
disease. It also lowers labor costs as ranchers can locate their cattle with the help of IoT based
sensors.
JMB North America is an organization that offers cow monitoring solutions to cattle
producers. One of the solutions helps the cattle owners observe cows that are pregnant and
about to give birth. From the heifer, a sensor powered by battery is expelled when its water
breaks. This sends an information to the herd manager or the rancher. In the time that is spent
with heifers that are giving birth, the sensor enables farmers to be more focused.