IOT Mod1
IOT Mod1
Textbooks
1. David Hanes, Gonzalo Salgueiro, Patrick Grossetete, Robert Barton,
Jerome Henry, “IoT Fundamentals: Networking Technologies,
Protocols, and Use Cases for the Internet of Things”, 1st Edition, Pearson
Education (Cisco Press Indian Reprint). (ISBN: 978-9386873743).
2. Srinivasa K G, “Internet of Things”,CENGAGE Leaning India, 2017
1
Internet of Things 18CS81
1) Connectivity Phase
• The first phase, Connectivity, began in the mid-1990s. Earlier, the world was not
always connected as it is today. In the beginning, email and getting on the Internet
were luxuries for universities and corporations. Getting the average person online
involved dial-up modems, and even basic connectivity often seemed like a small
miracle.
• Even though connectivity and its speed continued to improve, a saturation point was
reached where connectivity was no longer the major challenge. The focus was now on
leveraging connectivity for efficiency and profit. This inflection point marked the
beginning of the second phase of the Internet evolution, called the Networked
Economy.
2) Networked economy
• Products and services are created and value is added through social networks
operating on large or global scales.With the Networked Economy, e-commerce and
digitally connected supply chains became the rage, and this caused one of the major
2
Internet of Things 18CS81
disruptions of the past 100 years. The economy itself became more digitally
intertwined as suppliers, vendors, and consumers all became more directly connected.
3) Immersive Experiences
• This phase gave rise to emergence of social media, collaboration, and widespread
mobility on a variety of devices through texting, voice and video. The outcome has
transformed person-to-person interactions into digitized interaction.
3
Internet of Things 18CS81
• Nest is just one example of digitization and IoT increasing the relevancy and value of
networked, intelligent connections and making a positive impact on our lives.
• The Nest app is IoT automation services that assist you to have a focus on devices and
keep correlated to your Nest devices anywhere with the help of internet connection in
the home place.
• The Nest Application uses the sensors and algorithms connected in the system of
devices to send notification, and this sensors used to transfer data from one device to
another, which helps to communicate for any further changes to save energy and to
notify for a further emergency for users phone devices by flashing alarm
automatically.
a) Connected roadways
• There was a demand for self-driving car, or autonomous vehicle, in literature and film
for decades. That fantasy is now becoming a reality with well-known projects like
Google’s self-driving car with the involvement of IoT.
4
Internet of Things 18CS81
• Connected roadways is the term associated with both the driver and driverless cars
fully integrating with the surrounding transportation infrastructure.
• Basic sensors reside in cars already. They monitor oil pressure, tyre pressure,
temperature, and other operating conditions, and provide data around the core car
functions. From behind the steering wheel, the driver can access this data while also
controlling the car using equipment such as a steering wheel, pedals, and so on.
• The need for all this sensory information and control is obvious. The driver must be
able to understand, handle, and make critical decisions while concentrating on driving
safely. In addition, new sensors and communication technologies are being developed
to allow vehicles to “talk” to other vehicles, traffic signals, school zones, and other
elements of the transportation infrastructure.
b) Connected factory
The main challenges facing manufacturing in a factory environment today include the
following:
Accelerating new product and service introductions to meet customer and market
opportunities.
Increasing plant production, quality, and uptime while decreasing cost.
Improving worker productivity and safety.
For example, executive management is looking for new ways to manufacture in a more cost-
effective manner while balancing the rising energy and material costs. Product development
has time to market as the top priority.
5
Internet of Things 18CS81
6
Internet of Things 18CS81
The lighting system uses central to digital ceiling technology. As you are probably
aware, the lighting market is currently going through a major shift toward light-
7
Internet of Things 18CS81
emitting diodes (LEDs). Lower energy consumption and far longer life are the
advantages of using LEDs.
The lower power requirements of LED fixtures allow them to run on Power over
Ethernet (PoE), permitting them to be connected to standard network switches.
In a digital ceiling environment, every lighting fixture is directly network-attached,
providing control and power over the same infrastructure. This means that LEDs can
be managed by the IT network, supporting voice, video, and other data applications.
8
Internet of Things 18CS81
The rise of IoT and standards-based protocols, such as IPv6, the IT and OT worlds are
converging or, more accurately, OT is beginning to adopt the network protocols,
technology, transport, and methods of the IT organization, and the IT organization is
beginning to support the operational requirements used by OT.
When IT and OT begin using the same networks, protocols, and processes, there are
clear economies of scale. With this convergence, networks become easier to operate,
and the flexibility of open standards allows faster growth and adaptability to new
technologies.
Several challenges are posed by the convergence of IT and OT to a single
consolidated network.
Example: When IT schedules a weekend shutdown to update software without regard
to production requirements, the OT organization is baffled. On the other hand, the IT
9
Internet of Things 18CS81
group does not understand the prevalence of proprietary or specialized systems and
solutions deployed by OT.
The overall benefit of IT and OT working together is a more efficient and profitable
business due to reduced downtime, lower costs through economy of scale, reduced
inventory, and improved delivery times.
10
Internet of Things 18CS81
11
Internet of Things 18CS81
The following factors expand on the requirements driving specific architectural changes for
IoT.
1) Scale
Several thousand devices indicates the scale of a typical IT network. Example: printers,
mobile wireless devices, laptops, servers, etc. The IT network design is incapable of handling
a growing infrastructure. IoT introduces a model where an average-sized utility, factory,
transportation system, or city could easily be asked to support a network of this scale.
2) Security
As per the saying if World War III breaks out, it will be fought in cyberspace. The evidence
of targeted malicious attacks using vulnerabilities in networked machines, such as the
outbreak of the Stuxnet worm, which specifically affected Siemens programmable logic
controller (PLC) systems has been observed. The main functions of the IT department are to
protect corporate data from intrusion and theft. To provide optimum security IoT system
should be capable to authenticate and identify all entities involved in the IoT service.
12
Internet of Things 18CS81
The IoT functions are categorized by oneM2M architecture into three major domains: the
application layer, the services layer, and the network layer.
1) Applications layer: The oneM2M architecture focuses on establishing the connectivity
among devices and associated applications. This domain attempts to standardize northbound
API definitions for interaction with business intelligence (BI) systems and also includes
application-layer protocol.
2) Services layer: This layer is indicated by the horizontal framework across the vertical
industry applications. At this layer, horizontal modules include the physical network that the
IoT applications run on, the underlying management protocols, and the hardware.
3) Network layer: This layer acts as communication domain for IoT devices and endpoints.
Standard wireless and wired components are included in this layer.
13
Internet of Things 18CS81
A set of levels is defined by the IoT Reference Model which indicates the control flowing
from the center to the edge. Example: The data transfer between data center and sensors.
Generally the data which is originated from the edge is transferred through the stack upwards
and reaches the center. IoT reference model helps in dividing the IoT problem into smaller
modules, finding the relation between technologies used in each layer, providing
interoperability through interfaces.
The seven layers of the IoT Reference Model are discussed below:
14
Internet of Things 18CS81
15
Internet of Things 18CS81
The core layers of this model is depicted in the figure 11. The presented framework
divides the core IoT and data management into parallel and aligned stacks to create
better visibility into functions of each layer. The network communications layer of the
IoT stack itself involves a significant amount of detail and incorporates a vast array of
technologies.
To accommodate the heterogeneity of IoT sensors and the many different ways that
exist to connect them to a network, the network communications layer needs to
consolidate all the devices together.
The network between the gateway and the data center is composed mostly of
traditional technologies including tunneling and VPN technologies, IP-based quality
of service (QoS), conventional Layer 3 routing protocols such as BGP and IP-PIM,
and security capabilities such as encryption, access control lists (ACLs), and firewalls.
16
Internet of Things 18CS81
The model presented below aligns data management with each of the three layers of
the Core IoT Functional Stack.
The three data management layers are the edge layer (data management within the
sensors themselves), the fog layer (data management in the gateways and transit
network), and the cloud layer (data management in the cloud or central data center).
As shown in the above figure the communications layer is broken down into four separate
sublayers: the access network, gateways and backhaul, IP transport, and operations and
management sublayers. IoT often involves a strong big data analytics component instead of
simply using business applications which makes it to stay different from a typical enterprise
network.
17
Internet of Things 18CS81
18
Internet of Things 18CS81
e) Report range: This classification is based on the distance at which the gateway is located.
Example: To make fitness band to communicate with your phone, it needs to be located a few
meters away at most.
19
Internet of Things 18CS81
Range estimates are grouped by category names that illustrate the environment where data
collection over the range is expected.
1) PAN (Personal Area Network)
2) HAN (Home Area Network)
3) NAN (Neighbourhood Area Network)
4) FAN (Field Area Network)
5) LAN (Local Area Network)
Layer 3: Applications and Analytics Layer
The smart objects exchange information with other systems once connected to the network.
Analytics versus Control Applications
Multiple applications can help to increase the efficiency of an IoT network. Each
application collects data and provides a range of functions based on analyzing the
collected data.
Analytics application: This type of application collects data from multiple smart objects,
processes the collected data, and displays information resulting from the data that was
processed. The display can be about any aspect of the IoT network, from historical
reports, statistics, or trends to individual system states. The application processes the data
to convey a view of the network that cannot be obtained from solely looking at the
information displayed by a single smart object.
Control application: This type of application controls the behavior of the smart object or
the behavior of an object related to the smart object. For example, a pressure sensor may
be connected to a pump. A control application increases the pump speed when the
connected sensor detects a drop in pressure.
Data versus Network Analytics
Analytics is a general term that describes processing information to make sense of
collected data. In the world of IoT, a possible classification of the analytics function is as
follows:
Data analytics: This type of analytics processes the data collected by smart objects and
combines it to provide an intelligent view related to the IoT system. In a more complex
case, temperature, pressure, wind, humidity, and light levels collected from thousands of
sensors may be combined and then processed to determine the likelihood of a storm and
its possible path. In this case, data processing can be very complex and may combine
multiple changing values over complex algorithms.
20
Internet of Things 18CS81
Network analytics: Most IoT systems are built around smart objects connected to the
network. A loss or degradation in connectivity is likely to affect the efficiency of the
system. Such a loss can have dramatic effects. Example: Open mines use wireless
networks to automatically pilot dump trucks. A lasting loss of connectivity may result in
an accident or degradation of operations efficiency.
21
Internet of Things 18CS81
2) Conserving network bandwidth: Offshore oil rigs generate 500 GB of data weekly.
Commercial jets generate 10 TB for every 30 minutes of flight. It is not practical to transport
vast amounts of data from thousands or hundreds of thousands of edge devices to the cloud.
Nor is it necessary because many critical analyses do not require cloud-scale processing and
storage.
3) Increasing local efficiency: Collecting and securing data across a wide geographic area
with different environmental conditions may not be useful. The environmental conditions in
one area will trigger a local response independent from the conditions of another site
hundreds of miles away. Analyzing both areas in the same cloud system may not be
necessary for immediate efficiency.
The traditional IT cloud computing model is shown in the below figure. Data management in
this model is very simple.
The endpoints communicate over an IP core network to servers in the data center or cloud. Data
is generally stored in the data center, and the physical links from access to core are typically high
bandwidth, meaning access to IT data is quick.
Fog Computing
The solution to the challenges mentioned in the previous section is to distribute data
management throughout the IoT system, as close to the edge of the IP network as possible.
The best-known embodiment of edge services in IoT is fog computing. Any device with
22
Internet of Things 18CS81
computing, storage, and network connectivity can be a fog node. Examples include industrial
controllers, switches, routers, embedded servers, and IoT gateways. Analyzing IoT data close to
where it is collected minimizes latency, offloads gigabytes of network traffic from the core
network, and keeps sensitive data inside the local network.
The defining characteristic of fog computing are as follows:
1) Contextual location awareness and low latency: The fog node sits as close to the IoT
endpoint as possible to deliver distributed computing.
2) Geographic distribution: In sharp contrast to the more centralized cloud, the services and
applications targeted by the fog nodes demand widely distributed deployments.
3) Deployment near IoT endpoints: Fog nodes are typically deployed in the presence of a
large number of IoT endpoints. For example, typical metering deployments often see 3000 to
4000 nodes per gateway router, which also functions as the fog computing node.
4) Wireless communication between the fog and the IoT endpoint: Although it is possible
to connect wired nodes, the advantages of fog are greatest when dealing with a large number
of endpoints, and wireless access is the easiest way to achieve such scale.
Acknowledgement
The diagrams and tables are taken from the textbooks specified in the references section.
Prepared by:
Mr. Rakshith M D
Mr. Prasad S R
Department of CS&E
SDMIT, Ujire
23