100% found this document useful (1 vote)
258 views67 pages

Industrial IoT Course Overview and Details

It is IIot notes
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
100% found this document useful (1 vote)
258 views67 pages

Industrial IoT Course Overview and Details

It is IIot notes
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd

Please read this disclaimer before proceeding:

This document is confidential and intended solely for the educational purpose of
RMK Group of Educational Institutions. If you have received this document
through email in error, please notify the system manager. This document
contains proprietary information and is intended only to the respective group /
learning community as intended. If you are not the addressee you should not
disseminate, distribute or copy through e-mail. Please notify the sender
immediately by e-mail if you have received this document by mistake and delete
this document from your system. If you are not the intended recipient you are
notified that disclosing, copying, distributing or taking any action in reliance on
the contents of this information is strictly prohibited.
Industrial Internet of
Things
Department: Electronics and Instrumentation Engineering

Batch/Year: 2020-2024 / III

Created by: Ms. Praveena B, Assistant Professor/EIE/RMKEC

Date: 18.01.2023
1. Contents

[Link].: Course Objectives


1 Contents

2 Course Objectives

3 Pre Requisites

4 Syllabus

5 Course Outcomes

6 CO- PO/PSO Mapping

7 Lecture Plan, Quiz, Links to Videos, E-Book Reference

8 Activity Based learning

9 Lecture Notes

10 Assignments

11 Part A Questions & Answers

12 Part B Questions

13 Supportive Online Certification Courses

14 Real Time Applications in day to day life and to Industry

15 Contents Beyond The Syllabus

16 Assessment Schedule

17 Prescribed Text Books & Reference Books

18 Mini Project Suggestions


2. Course Objectives

[Link].: Course Objectives

1 To understand the fundamentals of Internet of Things

2 To learn about the basics of IOT protocols

To build a small low-cost embedded system using Raspberry


3
Pi.

To apply the concept of Internet of Things in the real-world


4
scenario.

To study various case studies related to Industrial Internet of


5
Things.
3. Pre Requisites

Subject Code Subject Name

Foundation Lab on Internet of


20EC312
Things
4. Syllabus

Unit Contents
INTRODUCTION TO INDUSTRY 4.0 12

Sensing & actuation- Communication - Networking- Globalization


I and Emerging Issues, The Fourth Revolution, LEAN Production
Systems, Smart and Connected Business Perspective, Smart
Factories
IOT DATA LINK LAYER & NETWORK LAYER PROTOCOLS 12

Protocol Standardization for IoT – Efforts – PHY/MAC Layer (3GPP


II MTC, IEEE 802.11, IEEE 802.15), Wireless HART, Z-Wave, Bluetooth
Low Energy, Zigbee Smart Energy - Network Layer-IPv4, IPv6,
6LoWPAN, 6TiSCH, ND, DHCP, ICMP, RPL, CORPL, CARP.
IOT TRANSPORT, SESSION, SERVICE AND SECURITY LAYER
PROTOCOLS 12

III Transport Layer (TCP, MPTCP, UDP, DCCP, SCTP) - (TLS, DTLS) –
Session Layer-HTTP, CoAP, XMPP, AMQP, MQTT. Service Layer -
oneM2M, ETSI M2M, OMA, BBF – Security in IoT Protocols – MAC
802.15.4, 6LoWPAN, RPL, Application Layer.
INDUSTRIAL IoT 12

Industrial Sensing & Actuation- Industrial Internet Systems- IIoT-


IV Introduction, Industrial IoT: Business Model and Reference
Architecture- IIoT Sensing, IIoT Processing, IIoT communication,
IIoT Networking
APPLICATION AND CASE STUDIES 12

Application Domains: Healthcare, Power Plants, Inventory


Management & Quality Control, Plant Safety and Security (Including
V AR and VR safety applications), Facility Management, Oil, chemical
and pharmaceutical industry, Applications of UAVs in Industries,
Real case studies: Milk Processing and Packaging Industries,
Manufacturing Industries, Virtual Reality Lab, Steel Technology Lab.
5. Course Outcomes

CO
Course Outcomes
Number
Understand IoT value chain structure (device, data cloud),
C609.1 application areas and technologies involved.

Understand various protocols in Data Link and Network


C609.2 Layer

Understand various protocols in Transport, Session, Service


C609.3 and Security Layer

Learn about Internet of Things with the help of projects


C609.4 designed for Raspberry Pi.

Explore various Case Studies related to Industrial Internet of


C609.5 Things

Understand IoT sensors and technological challenges faced


C609.6 by IoT devices, with a focus on wireless, energy, power, and
sensing modules.
6. CO- PO/PSO Mapping

P P P P P P P P P P P P PS PS PS
CO O O O O O O O O O O O O O O O
1 2 3 4 5 6 7 8 9 10 11 12 1 2 3
C609.
3 2 - - - - - 2 1 2 - 3 3 1 -
1
C609.
3 3 3 2 - - - 2 2 2 - 3 3 3 2
2
C609.
3 3 3 2 - - - 2 2 2 - 3 3 3 2
3
C609.
3 2 - - - - - 2 1 2 - 3 3 2 2
4
C609.
3 2 2 - - - - 2 1 2 - 3 3 2 2
5
C609.
3 2 2 - - - - 2 1 2 - 3 3 2 2
6
7. Lecture Plan
Actual
S. No of Proposed Pertaini Taxono Mode of
Topics Lecture
No.: Period date ng CO my level Delivery
Date
PPT +
Sensing & Online
1 1 C609.1 K2
actuation White
Board
PPT +
Communication Online
2 4 C609.1 K2
Protocols: White
Board
PPT +
Networking Online
3 3 C609.1 K2
Protocols: White
Board
Globalization and PPT +
Emerging Issues, Online
4 1 C609.1 K2
The Fourth White
Revolution Board
PPT +
LEAN Production Online
5 1 C609.1 K2
Systems White
Board
Smart and PPT +
Connected Online
6 1 C609.1 K2
Business White
Perspective Board
PPT +
Online
7 Smart Factories 1 C609.1 K2
White
Board
8. Activity based learning

Activity No. 01 :Think Tank Topic


Identifying different types of Communication Protocols used in industries
and to list out their specifications.
Benefits: Students will be able to explore widely used communication
protocols in industries and they will come to know various
communication protocols and technical know-how of their applications in
real time scenario.

Course outcome : CO1


Programme outcome : P03, P04, P05, P06, P07

Aim: The Think Tank activity motivates the students developing a list of
advantages and disadvantages of various types of communication
protocols in industries, helping them to analyze the selection of protocol
for particular applications
.Time : 20 – 30 minutes
Size : 4 in a Group Activity
The students are divided into groups and problem statements are given
in terms of different types of industry . The group of students should
summarize the characteristics, uses and selection of communication
protocol for particular application.
9. Lecture Notes

Introduction: Sensing & Actuation

Transducer:
Converts a signal from one physical form to another physical form
Physical form: thermal, electric, mechanical, magnetic, chemical, and optical

Energy converter
Example:
Microphone : Converts sound to electrical signal
Speaker : Converts electrical signal to sound
Antenna : Converts electromagnetic energy into electricity and vice
versa
Strain gauge : Converts strain to electrical

Definition of Sensor:
The characteristic of any device or material to detect the presence of a particular
physical quantity

The output of sensor is signal, which is converted to human readable form.


Performs some function of input by sensing or feeling the physical changes in the
characteristic of a system in response to stimuli
Input: Physical parameter or stimuli
Example: Temperature, light, gas, pressure, and sound
Output: Response to stimuli
Sensor Characteristics
Static characteristics
After steady state condition, how the output of a sensor change in response to an
input change
Dynamic characteristics
The properties of the system’s transient response to an input.
Static characteristics
Accuracy
Represents the correctness of the output compared to a superior system
The different between the standard and the measured value
Range
• Gives the highest and the lowest value of the physical quantity within which the
sensor can actually sense
• Beyond this value there is no sensing or no kind of response.
Resolution
• Provides the smallest change in the input that a sensor is capable of sensing
• Resolution is an important specification towards selection of sensors.
• Higher the resolution better the precision
Errors
The difference between the standard value and the value produced by sensor
Sensitivity
• Sensitivity indicates ratio of incremental change in the response of the system
with respect to incremental change in input parameter.
• It can be found from slope of output characteristic curve of a sensor
Linearity
The deviation of sensor value curve from a particular straight line
Drift
The difference in the measurements of sensor from a specific reading when kept at
that value for a long period of time
Repeatability
The deviation between measurements in a sequence under same conditions
Dynamic characteristics
How well a sensor responds to changes in its input

Zero order system


• Output shows a response to the input signal with no delay
• Does not include energy-storing elements
• Example: Potentiometer measures linear and rotary displacements
First order system
• When the output approaches its final value gradually
• Consists of an energy storage and dissipation element
Second order system
• Complex output response
• The output response of sensor oscillates before steady state
Sensor Classification
Passive Sensor
• Cannot independently sense the input
• Example: Accelerometer, soil moisture, water-level, and temperature sensors
Active Sensor
• Independently sense the input
• Example: Radar, sounder, and laser altimeter sensors
Analog Sensor
• The response or output of the sensor is some continuous function of its input
parameter
• Example: Temperature sensor, LDR, analog pressure sensor, and Analog Hall
effect/Magnetic Sensor
• A LDR shows continuous variation in its resistance as a function of intensity of
light falling on it.
Digital Sensor
• Responses in binary nature
• Designs to overcome the disadvantages of analog sensors
• Along with the analog sensor it also comprises of extra electronics for bit
conversion
• Example: Passive infrared (PIR) sensor and digital temperature sensor (DS1620).
Scalar Sensor
• Detects the input parameter only based on its magnitude
• The response of the sensor is a function of magnitude of the input parameter
• Not affected by the direction of the input parameter
• Example: Temperature, gas, strain, color, and smoke sensors.
Vector Sensor
• The response of the sensor depends on the magnitude of the direction and
orientation of input parameter
• Example : Accelerometer, gyroscope, magnetic field, and motion detector sensors.
Actuator
• An actuator is part of the system that deals with the control action required
(mechanical action)
• Mechanical or electro-mechanical devices.
• A control signal is input to an actuator and an energy source is necessary for its
operation.
• Available in both micro and macro scales
• Example: Electric motor, solenoid, hard drive stepper motor

Classification of Actuators
Electric Linear Actuator
• Powered by electrical signal
• Mechanical device containing linear guides, motors, and drive mechanisms
• Converts electrical energy into linear displacement
• Used in automation applications including electrical bell, opening and closing
dampers, locking doors, and braking machine motions.

Electric Rotary Actuator


• Powered by electrical signal
• Converts electrical energy into rotational motion
• Applications including quarter-turn valves windows, and robotics
Fluid Power Linear Actuator
• Powered by hydraulic fluid, gas, or differential air pressure
• Mechanical devices have cylinder and piston mechanisms
• Produces linear displacement
• Primarily used in automation applications including clamping and welding
Fluid Power Rotary Actuator
• Powered by fluid, gas, or differential air pressure
• Consisting of gearing, and cylinder and piston mechanisms
• Converts hydraulic fluid, gas, or differential air pressure into rotational motion
• Primarily applications of this actuator are opening and closing dampers, doors,
and clamping.

Linear Chain Actuator


• Mechanical devices containing sprockets and sections of chain
• Provides linear motion by the free ends of the specially designed chains
• Primarily used in motion control applications
Manual Linear Actuator
• Provides linear displacement through the translation of manually rotated screws
or gears
• Consists of gearboxes, and hand operated knobs or wheels
• Primarily used for manipulating tools and workpieces
Manual Rotary Actuator
• Provides rotary output through the translation of manually rotated screws, levers,
or gears
• Consists of hand operated knobs, levers, handwheels, and gearboxes
• Primarily used for the operation of valves.

COMMUNICATION PROTOCOLS
The following communication protocols are important for IoT:
1. IEEE 802.15.4
2. Zigbee
3. 6LoWPAN
4. Wireless HART
5. Z-Wave
6. ISA 100
7. Bluetooth
8. NFC
9. RFID
IEEE 802.15.4
• This standard provides a framework meant for lower layers (MAC and PHY) for a
wireless personal area network (WPAN).
• PHY defines frequency band, transmission power, and modulation scheme of the
link.
• MAC defines issues such as medium access and flow control (frames).
• This standard is used for low power, low cost (manufacturing and operation), and
low speed communication between neighboring devices (< ~75m).
Features of IEEE 802.15.4
• This standard utilizes DSSS (direct sequence spread spectrum) coding scheme to
transmit information.
• DSSS uses phase shift keying modulation to encode information.
a) BPSK - 868/915 MHz, data transmission rate 20/40 kbps respectively.
b) OQPSK - 2.4 GHz, data transmission rate 250 kbps.
• DSSS scheme makes the standard highly tolerant to noise and interference and
thereby improving link reliability.
• The preferable nature of transmission is line of sight (LOS).
• The standard range of transmission - 10 to 75m.
• The transmission of data uses CSMA-CA (carrier sense multiple access with
collision avoidance) scheme.
• Transmissions occur in infrequent short packets for duty cycle (<1 %), thus
reducing consumption of power.
• Star network topology and peer-to-peer network topology is included.
Zigbee
• Provides a framework for medium-range communication in IoT connectivity.
• Defines PHY (Physical) and MAC (Media Access Control) layers enabling
interoperability between multiple devices at low-data rates.
• Operates at 3 frequencies –
a) 868 MHz (1 channel using data transmission rate up to 20 kbps)
b) 902-928MHz (10 channels using data transmission rate of 40 kbps)
c) 2.4 GHz (16 channels using data transmission rate of 250 kbps).
Features of Zigbee
• The lower frequency bands use BPSK.
• For the 2.4 GHz band, OQPSK is used.
• The data transfer takes place in 128 bytes packet size.
• The maximum allowed payload is 104 bytes.
• The nature of transmission is line of sight (LOS).
• Standard range of transmission – upto 70m.
• Relaying of packets allow transmission over greater distances.
• Provides low power consumption (around 1mW per Zigbee module) and better
efficiency due to
a) adaptable duty cycle
b) low data rates (20 - 250 kbit/s)
c) low coverage radio (10 -100 m)
• Networking topologies include star, peer-to-peer, or cluster- tree (hybrid), mesh
being the popular.
• The Zigbee protocol defines three types of nodes:
a) Coordinators - Initializing, maintaining and controlling the network. There is one
and only one per network.
b) Routers - Connected to the coordinator or other routers. Have zero or more
children nodes. Contribute in multi hop routing.
c) End devices - Do not contribute in routing.
• Star topology has no router, one coordinator, and zero or more end devices.
• In mesh and tree topologies, one coordinator maintains several routers and end
devices.
• Each cluster in a cluster-tree network involves a coordinator through several leaf
nodes.
• Coordinators are linked to parent coordinator that initiates the entire network.
• ZigBee standard comes in two variants:
a) ZigBee
b) ZigBee Pro - offers scalability, security, and improved performance utilizing many-
to-one routing scheme.
6LoWPAN
• 6LoWPAN is IPv6 over Low-Power Wireless Personal Area Networks.
• It optimizes IPv6 packet transmission in low power and lossy network (LLN) such
as IEEE 802.15.4.
• Operates at 2 frequencies:
a) 2400–2483.5 MHz (worldwide)
b) 902–929 MHz (North America)
• It uses 802.15.4 standard in unslotted CSMA/CA mode.
Features of 6LoWPAN
• 6LowPAN converts the data format to be fit with the IEEE 802.15.4 lower layer
system.
• IPv6 involves MTU (maximum transmission unit) of 1280 bytes in length, while
the IEEE 802.15.4 packet size is 127 bytes.
• Hence a supplementary adaptation layer is introduced between MAC and network
layer that provides:
a) Packet fragmentation & packet reassembly
b) Compression of header
c) Routing of data link layer.
• Fragmentation is required to fit the intact IPv6 packet into a distinct IEEE
802.15.4 frame (> ~106 bytes).
• The fragmentation header allows 2048 bytes packet size with fragmentation.
• Using fragmentation and reassembly, 128-byte IPv6 frames are transmitted over
IEEE 802.15.4 radio channel into several smaller segments.
• Every fragment includes a header..
• Header compression reduces the transmission overhead and allows efficient
transmission of payload.
• IPv6 addresses are compressed in 6LoWPAN:
a) 8-byte UDP header
b) 40-byte IPv6 header
• Stateless auto configuration allows any device to create the IPv6 address
automatically devoid of external dealing using a DHCP server.
• Data link layer routing is classified into two schemes:
a) mesh-under - utilizes link layer address to forward data packets.
b) route-over - utilizes network layer IP address.
• Provides link layer security (AES-128) from IEEE 802.15.4 such as authentication
of link and encryption.

Wireless HART
• Wireless HART is based on HART (Highway Addressable Remote Transducer).
• It is the first international industrial wireless standard (IEC 62591), based upon
the standard IEEE 802.15.4.
• Functions in the 2.4GHz ISM band using data rate of up to 250 kb/s.
• 11 to 26 channels are supported, with a gap of 5MHz between two adjacent
channels.
• The same channel can’t be used consecutively.
Features of Wireless HART
• Exploits IEEE 802.15.4 accustomed DSSS coding scheme.
• A Wireless HART node follows channel hopping every time it sends a packet.
• Modulation technique used is offset quadrature phase shift keying (OQPSK).
• Transmission Power is around 10dBm (adjustable in discrete steps).
• Maximum payload allowed is 127 bytes.
• It employs TDMA (time division multiple access) that allots distinct time slot of
10ms for each transmission.
• TDMA technology is used to provide collision free and deterministic
communications.
• A sequence of 100 consecutive time slots per second is grouped into a super
frame.
• Slot sizes and the super frame length are fixed.
• The devices support multiple super frames with differing numbers of timeslots.
• At least one super frame is always enabled while additional super frames are
enabled and disabled according to the demand of bandwidth.
• For any message, communication occurs in the allotted timeslot and frequency
channel.
• Supports both star and mesh topologies.

Z-Wave
• Z-wave is a low power radio communication technology primarily used for home
automation and security systems.
• It was designed as a simpler and cheaper alternative to Zigbee for small to
medium range connectivity.
• It operates on the unlicensed part of the industrial, scientific and medical (ISM)
band: 908.42 MHz in the US & 868.42 MHz in Europe, avoiding any interference
with the 2.4Ghz band(Wi-Fi, Bluetooth and others).
• Z-wave uses a Mesh Network Topology to communicate among the devices,
supporting up to 232 nodes in a network.
Features of Z-Wave
• A Z-wave network has 2 device categories: Controller and Slave
• The Controller is a central entity which sets up the Z-wave network and manages
other slave devices in the network.
• Each logical Z-wave network has 1 Home (Network) ID and multiple unique Node
IDs for the devices in the network.
• The Network ID is of length 4 Bytes and Node ID is of length 1 Byte.
• The nodes can communicate only within their home network
• It offers a data rate of up to 100kbps and an average communication range of 30
meters.
• It uses source routed network mesh topology using 1 primary controller.
• Z-wave considers only static devices in the network due to its source routed
network topology.
• The devices communicate with one another only when they are in range.
• Messages are routed through different nodes in case of any obstruction due to
interior layout and other household appliances.
• These obstructions are called radio dead-spots and can be bypassed using a
process called Healing.
Applications:
• Primarily used in Home/Office Automation
• Systems for Smart Energy Management
• System for Smart Security and Surveillance
• Appliances automation and control

ISA 100.11a
• ISA 100.11a is a Standard for wireless network technology developed by the
International Society of Automation(ISA).
• The primary focus of the technology is the implementation of automation in the
industrial environment.
• The protocol stack of ISA 100.11a is in compliance with IoT.
• It is based on the IEEE 802.15.4 protocol along with other wireless networks.
Features of ISA 100.11a
• It supports multiple devices working on different protocols to interact in a single
network, simultaneously.
• It is an open standard which enables interoperability and communication between
different devices.
• It uses the IPv6 based technology and adds the associated benefits such as
increased address space and security.
• 128 bits AES encryption security.
• Hence, it offers essential scalability and reliability for industrial network.
• It supports 2 network topologies for operation: 1)Star and 2)Mesh.
• Uses TDMA/CSMA schemes for resource sharing, collision avoidance.
Applications
• It is primarily used for automation in large scale complex [Link] Wireless
monitoring of the industrial network and devices.
• Process monitoring and control automation in the industrial environment with
large and complex setups.
Bluetooth
• A short range wireless communication technology.
• Its is aimed at replacing the cables with wireless medium to communicate
between portable devices.
• It is based on Ad-hoc technology, also known as Ad-hoc Piconets.
• Network can be established between 2 to 8 Bluetooth devices.
Features of Bluetooth:
• It is a low cost wireless communication technology.
• Low power consumption.
• Bluetooth technology uses the unlicensed industrial, scientific and medical (ISM)
band at 2.4 to 2.485 GHZ.
• Supports 1Mbps and 3Mbps data rate for version 1.2 and 2.0, respectively.
• The operating range: 1 meter for Class 3 radios, 10 meters for Class 2 radios,
and 100 meters for Class 1 radios.
Applications:
• Bluetooth is suitable for a network of devices with smaller radius.
• Connectivity with desktop and laptop peripherals
• Wireless connectivity between mobile phones and other portable devices.
• Multimedia transfer between devices
• Automobiles use Bluetooth for connecting with multimedia and navigation
devices.
• GPS devices are connected with the end user.

RFID
• RFID stands for “radio-frequency identification” .
• An RFID system consists of RFID tag, RFID reader and RFID software
• RFID tag stores digitally encoded data, which is read by a RFID reader
• RFID tag data can be read outside the line-of-sight, as compared to traditional
barcodes and QR codes.
Features of RFID
• RFID tag consists of an integrated circuit and an antenna, covered with a
protective material.
• Tags can be classified as passive or active.
• Active tags use their own power supply for operation and data transfer.
• Passive tags have to be powered by a reader inductively in order
to transmit data.
Application:
• Store product tracking.
• Asset and baggage tracking.
• Supply chain management.
• Livestock tracking and management.
• Automobile tracking.
• Authentication and access control

NFC
• Near field communication, or NFC, has been derived from radio-frequency
identification (RFID).
• NFC works within close proximity without any physical contact between the
devices unlike RFID which has a longer range of communication.
• A NFC device can be any of the two types: 1) Active and 2) Passive.
• An Active type of device can both read and transmit data.
• A Passive device can only transmit data but cannot read from other NFC devices.
Features of NFC
• NFC operates at 13.56 MHz frequency.
• The communication range of NFC devices is less then 10 centimeters.
• Data rate supported are 106, 212 or 424 Kbps (kilobits per second).
• Two communication modes are supported between two devices: Active-Active or
Active-Passive mode.
Applications:
• Banking and payments using NFC enabled smartphones, transaction cards.
• Tracking goods.
• Data Communication between smart phones.
• Security and authentication using NFC enabled ID cards.
• Low-power home automation systems
IOT NETWORKING
Characteristics of IoT devices
• Low processing power
• Small in size
• Energy constraints
Networks of IoT devices
• Low throughput
• High packet loss
• Tiny (useful) payload size
• Frequent topology change

Enabling Classical Internet for IoT Devices


• Proprietary non-IP based solution
a) Vendor specific gateways
b) Vendor specific APIs
• Internet Engineering Task Force (IETF) IP based solution
Three work groups
a) IPv6 over Low power Wireless Personal Area Networks (6LoWPAN)
b) Routing Over Low power and Lossy networks (ROLL)
c) Constrained RESTful Environments (CoRE)
Proprietary non-IP based solution
Drawbacks
• Limited flexibility to end users: vendor specific APIs
• Interoperability: vendor specific sensors and gateways
• Limited last-mile connectivity

IETF IP based solution


Three work groups
• IPv6 over Low power Wireless Personal Area Networks (6LoWPAN).
✓ By header compression and encapsulation it allows IPv6 packets to transmit and
receive over IEEE 802.15.4 based networks.
• Routing Over Low power and Lossy networks (ROLL)
✓ New routing protocol optimized for saving storage and energy.
• Constrained RESTful Environments (CoRE)
✓ Extend the Integration of the IoT devices from network to service level.
Constrained RESTful Environments (CoRE)
• Provides a platform for applications meant for constrained IoT devices.
• This framework views sensor and actuator resources as web resources.
• The framework is limited to applications which
a) Monitor basic sensors
b) Supervise actuators
• CoAP includes a mechanism for service discovery.
• IoT devices (act as mini web servers) register their resources to Resource
Directory (RD) using Registration Interface (RI).
• RD, a logical network node, stores the information about a specific set of IoT
devices.
• RI supports Representational State Transfer (REST) based protocol such as
HTTP (and CoAP- optimized for IoT).
• IoT client uses Lookup interface for discovery of IoT devices.

IoT Network QoS


• Quality-of-service (QoS) of IoT network is the ability to guarantee intended
service to IoT applications through controlling the heterogeneous traffic
generated by IoT devices.
• QoS policies for IoT Network includes
a) Resource utilization
b) Data timeliness
c) Data availability
d) Data delivery

Resource utilization
• Requires control on the storage and bandwidth for data reception and
transmission.
• QoS policies for resource utilization:
Resource limit policy
• Controls the amount of message buffering
• Useful for memory constrained IoT devices
Time filter policy
• Controls the data sampling rate (interarrival time) to avoid buffer overflow
• Controls network bandwidth, memory, and processing power
Data timeliness
• Measure of the freshness of particular information at the receiver end
• Important in case of healthcare, industrial and military applications
• Data timeliness policies for IoT network include
Deadline policy
• Provides maximum interarrival time of data
• Drops the stale data; notify the missed deadline to the application end
Latency budget policy
• Latency budget is the maximum time difference between the data transmission
and reception from source end to the receiver end.
• Provides priority to applications having higher urgency.

Data Availability
• Measure of the amount of valid data provided by the sender/producer to
receiver/consumer
• QoS policies for data availability in IoT network include
Durability policy
• Controls the degree of data persistence transmitted by the sender
• Data persistence
Lifespan policy
• Controls the duration for which transmitted data is valid
History policy
• Controls the number of previous data instances available for the receiver.

Data Delivery
• Measure of successful reception of reliable data from sender to receiver
• QoS policies for data delivery include
Reliability policy
• Controls the reliability level associated with the data distribution
Transport priority
• Allows transmission of data according to its priority level
MQTT
• Message Queue Telemetry Transport
• Introduced by IBM and standardized by Organization for the Advancement of
Structured Information Standards (OASIS) in 2013
• Works on Publish/Subscribe framework on top of TCP/IP architecture
Advantages
• Reliable, Lightweight, and cost-effective protocol

MQTT QoS
• QoS of MQTT protocol is maintained for two transactions
a) First transaction: Publishing client MQTT Server
b) Second transaction: MQTT Server Subscribing Client
• Client on each transaction sets the QoS level
a) For the first transaction, publishing client sets the QoS level
b) For second transaction, client subscriber sets the QoS level
Supports 3-level of QoS
QoS 0:
• Also known as “at most once” delivery
• Best effort and unacknowledged data service
• Publisher transmits the message one time to server and server transmits it once
to subscriber
• No retry is performed
QoS 1:
• Also known as “at least once” delivery
• Message delivery between the publisher, server and then between server and
subscribers occurs at least once.
• Retry is performed until acknowledgement of message is received
QoS 2:
• Also known as “exactly once” delivery
• This QoS level is used when neither packet loss or duplication of message is
allowed
• Retry is performed until the message is delivered exactly once

CoAP
• Constrained Application Protocol
• CoAP was designed by IETF Constrained RESTful Environment (CoRE) working
group to enable application with lightweight RESTful (HTTP) interface
• Works on Request/Response framework based on the UDP architecture, including
Datagram Transport Layer Security (DTLS) secure transport protocol.
• CoAP defines four types of messages
a) CON: Conformable
b) NON: Non-conformable
c) RST: Reset
d) ACK: Acknowledgement
• For conformable type message, the recipient must explicitly either acknowledge
or reject the message.
• In case of non-conformable type message, the recipient sends reset message if it
can’t process the message.
• Utilizes GET, PUT, OBSERVE, PUSH, and DELETE messages requests to retrieve,
create, initiate, update, and delete subscription respectively.
• Supports caching capabilities to improve the response time and reduce bandwidth
consumption.
• Uses IP multicast to support data requests sent to a group of devices.
• Specialized for machine-to-machine (M2M) communication.
XMPP
• Extensible Messaging and Presence Protocol
• Supports Publish/Subscribe messaging framework on top of TCP protocol
• The communication protocol is based on Extensive Markup Language (XML).
• Uses Datagram Transport Layer Security (DTLS) secure transport protocol
• XMPP model is decentralized, no central server is required.
Advantages of XMPP
• Interoperability: Supports interoperability between heterogeneous networks
• Extensibility: Supports privacy lists, multi-user chat, and publish/subscribe chat
status notifications
• Flexibility: Supports customized markup language defined by different
organizations according to their needs.

AMQP
• Advance Message Queuing Protocol
• Optimized for financial applications
• Binary message-oriented protocol on top of TCP
• Supports Publish/Subscribe framework for both
a) Point-to-point (P2P)
b) Multipoint communication
• Uses token-based mechanism for flow control
✓ Ensures no buffer overflow at the receiving end
• Message delivery guarantee services:
✓ At least once: Guarantees message delivery but may do so multiple times
✓ At most once: Each message is delivered once or never
✓ Exactly once: No message drop and delivered once one
IEEE 1888
• Energy-efficient network control protocol
• Defines a generalized data exchange protocol between network components over
the IPv4/v6-based network.
• Universal Resource Identifiers (URIs) based data identification
• Applications: Environmental monitoring, energy saving, and central management
systems.

DDS RTPS
• Distributed Data Service Real Time Publish and Subscribe
• Supports Publish/Subscribe framework and on top of UDP transport layer
protocol.
• Data-centric and binary protocol
• Data is termed as “topics”.
• The users/listeners may subscribe to their particular topic of interest
• A single topic may have multiple speakers of different priorities
• Supports enlisted QoS for data distribution
a) Data persistence
b) Delivery deadline
c) Reliability
d) Data freshness
• Applications: Military, Industrial, and healthcare monitoring

THE FOURTH REVOLUTION


• Revolution: instantaneous and complete shift
• First Shift: from foraging to farming (10,000 years ago)
a) Results: production, transportation, communication
b) Growth in food production, prodding of population growth
• Industrial Revolution
a) Developments of new technologies and new approaches
b) Prompts shifts in economic models and social architecture
Industry 4.0 has been defined as “a name for the current trend of automation and
data exchange in manufacturing technologies, including cyber-physical systems, the
Internet of things, cloud computing and cognitive computing and creating the smart
factory”. Industry 4.0 refers to the rapid pace of digitization in manufacturing today.
For generations, manufacturing processes and techniques have evolved and helped
businesses improve their production, performance and output.

First Industrial Revolution

• The First Industrial Revolution was marked by a transition from hand production

• methods to machines through the use of steam power and water power.

• The implementation of new technologies took a long time, so the period which
this

• refers to it is between 1760 and 1820, or 1840 in Europe and the United States.

• Its effects had consequences on textile manufacturing, which was first to adopt
such changes, as well as iron industry, agriculture, and mining although it also
had societal effects with an ever stronger middle class.

Driver: invention of steam engine and construction of railway stimulated the


revolution

Results: utilization of machines in production


Second Industrial Revolution
• During the transition from 19th century to 20th century
• Driver: electricity and assembly line trigged the revolution
• Results: mass production
Third Industrial Revolution
• Prompted in 1960s
• Computer or Digital Revolution
• Driver: production of semiconductor trigged the revolution
• Results: mainframe, personal computer, and internet
Fourth Industrial Revolution
• Stimulated in 21st century
• Proposed to uplift German economy*
• Digital Revolution triggered the revolution
• Extensive use of ubiquitous and mobile internet
• During the revolution, sensors become cheaper, reduced in size, powerful
• Extensive use of Artificial Intelligence, Machine Learning, Cyber Physical System
(CPS).
• Computers have become more sophisticated and integrated
• Results: radical transformation of societies and global economies
• Fourth Industrial Revolution is coined as “The second Machine Age”* by Prof. Erik
Brynjolfsson, MIT and Andrew McAfee, MIT
• Industry 4.0, another synonym of Fourth Industrial Revolution, is coined by
Hannover Fair in 2011.
Scope of Fourth Revolution:
• Smart Connected Machines
• Smart Factories
• Gene Sequencing
• Nanotechnology
• Renewables
• Quantum Computing
Profound and Systematic Change
• The scale and scope of innovation of Fourth Industrial Revolution defines today’s
acute disruption and innovation
• Airbnb, Uber, Alibaba, etc., disruptors of today, are relatively new
• Ubiquitous iPhone launched in 2007 Billions of smart phones are being mass
produced currently
• Google announced fully autonomous car in 2010 AI-based self navigating cars are
on the way.
• Not only the speed of profound change, but scale of profound change is equally
staggering
Example:
i. In 1990, industry giants in Detroit had a combined market of $36 billion
capitalization, $250 billion revenues, 1.2 million employee
ii. In 2014, industry giants in Silicon Valley had a combined market of $1.09 trillion
capitalization, $247 billion revenues, 1,37,000 employee
• With marginal costs, digital business creates unit of today’s wealth with fewer
workers
• Business, providing information goods, has virtually zero transportation and
replication cost
• In the context of Industry 4.0, Instagram, WhatsApp, etc. do not require much
capital to begin with, but it changes the role of capital and scaling business
In the context of Fourth Industrial Revolution
• Digital fabrication technologies are able to communicate with biological world
• Designers and architects are, now, combining
a) Computational design
b) Additive manufacturing
c) Material engineering
d) Synthetic biology
• Results: producing objects that are mutable and adaptable
• Use of AI
a) Self driving car
b) Virtual assessment
c) Transitional software
d) Discover new drugs
e) Prediction of cultural Interest
• Application of Siri in Apple is one of the examples of strength
of AI (Voice Search) – Also, Cortana for Windows.
Drivers
Various aspects that drive the fourth industrial revolution
• Scientific Breakthroughs
• New Technologies

Megatrends
• All recent technologies and development that leverage the pervasive potential of
digitization and information technologies

Autonomous Vehicle
Driver-less vehicles
• Trucks
• Drones
• Aircrafts
• Boats
3D Printers
• Manifesting physical objects based on digital specifications
• Application
a) Wind Turbines
b) Medical Implants

Advanced Robotics
• Conventional application of robots: automotive
• Recently, robotics are used from precision agriculture to nursing

New Materials
• Lighter, stronger, recyclable and adaptive
• Example: Thermoset plastics, Graphene

Digital
• Internet of Things (IoT)
• Application of IoT in Industry
a) RFID
b) Tracking of package delivery
c) Complex supply chain
d) Monitoring systems
• Bitcoin (digital currency) and Blockchain (securing bank/government transactions)
• Uber model for transportation (car pooling etc.)

Biological
• Genetic sequencing
• DNA writing
• Recommender system (IBM Watson)
• Cell Modification
• Genetic Engineering (CRISPER)
Tipping Points
• Tipping points represent the radical changes in that are required in near future
• Probable tipping points in 2025
a) Clothes connected to the internet
b) Unlimited and free storage
c) 1 trillion sensors connected to the internet
d) Robotic pharmacist, etc.

Lean Production System


Finishing good inventories through eliminating wastes from processes
✓ Developed by Toyota motor corporation
✓ It is mainly focusses on customer’s need

Lean Production system established on


7 Types of wastes
• Transportation – Excessive movements of people for materials or information
• Waiting – Period of inactivity of people for material or information
• Motion – Non value-added movement of people
• Inventory – Cost of inventory such as raw materials, work in process, finished goods
• Over-processing – Doing more work in product than customer values
• Defects – Defects can be in products or paper works
• Overproduction – Producing more product sooner than the customers ready for
Value streams in Lean
• Value streams - All the actions required for a product from order to delivery.
• It can be done by simply walking through the lifecycle of the product

5 steps of walk in value streams


• Focus on single value stream
• Build a leadership team
• Schedule date and time
• Walk it – Discuss value, walk together, list and prioritize ideas
• Schedule follow up
Lean production in Industry 4.0
Impacts of Lean production system
• Through the elimination of waste in processes, it provides best quality, lowest cost,
shortest lead time

Implementation of Lean implies


• Implementation of lean -> implementation of full manufacturing system
• It does not only focus on lean tools
• In addition it focuses on four main areas such as business requirements, operation
improvement, people management, performance governance
1) Business Requirements
• Set right objectives
• Clear about strategy
• Clear about contributions
2) Performance Management
• Refers to people management
• Should have clear KPI (Key Performance Indicator) structure
• Top-down management
• Key topics to be covered- Productivity, Quality, Costs, Delivery, Safety
3) Operation Improvement
• Company should have clear knowledge about all tools of toolbox
• Should not have massive toolbox with unnecessary tools
4) People Engagement
• Develop Right capabilities
• Should follow Learn, Do, Teach Learn – Clear knowledge about tools Do –
Perform all tools
• Teach – Move into role of teacher to teach about tools

Why company should decide to implement lean?


Company should implement lean motivated by three drivers; Cost, Time, Quality

Smart and Connected Business Perspective


• Connecting the physical objects.
• Sharing the data between physical objects.
• Increasing the resource efficiency.
• Increasing the productivity.
Benefits of smart and connected products
• Faster.
• Cheaper.
• Better usage of product.
• Improved recall process of product.
• Decreased environmental impact.
• Smart supply chain.
Medium of getting smart and connected
• Embedded Systems.
• Cloud computing.
• Internet of things (IOT).
• Sensors.
Fundamental building blocks
• Customer values.
• Blueprint of profits.
• Key resources.
• Key processes.
Categorization

Monitor Control
Resource: Resource:
• Sensors. • Custom software.
• External data sources. Effects:
Effects : • Controlling the products.
• Health monitoring of products.
• Personalization .
• Generating alerts.
• Taking action against the odds.

Optimization Control
Resource: Resource:
• Optimization algorithms. • Monitor, control, and optimization
capabilities.
Effects:
• Software algorithms.
• Enhances the performance.
Effect:
• Enables remote services.
• Autonomous performance of
• Assists in repairing the product.
products.
Why smart business model?
• Make the current process less costly.
• Make the process efficient.
• Meet the expected revenue.
Key attributes of smart business model
• Value proposition.
• Revenue streams.
• Technologies.
Value creation in smart business model

Novelty Centric Efficiency Centric


• New market. • Faster.
• New services. • Simple.
• Innovation. • Transparent.
• Eliminating the errors.

Lock-in centric business model Complementary business model


• Prevents the customer migration. • Product and services.
• Switching cost. • On-line and off-line assets.
• Building trust. • Technologies.
• Activities.
Architecture

Physical Layer:
• Responsible for collecting and acquiring data from object or environment.
• Equipped with micro-controllers and sensors.

Connectivity Layer:
• Connects smart devices, servers.
• Equipped with different communication technology including IP networks, ZigBee,
NFC, Bluetooth etc.

Digital Layer:
• Stores the data.
• Analyzes the data.
• Processes the data

Examples of Smart and Connected Business Model


Smart Factories
According to Deloitte University Press –
• “The smart factory is a flexible system that can self-optimize performance across a
broader network, self-adapt to and learn from new conditions in real or near-real
time, and autonomously run entire production processes. ”
Why do we need smart factories?
• Evolution of technologies.
• High competitive market.
• High amount of production within minimum timeline.
• Reduce risk of failure
Advantages of running smart factories
• Reducing cost.
• Increasing efficiency.
• Improving quality.
• Improving predictability.
• Improving safety.

Components of smart factory

Smart machines
• Communicate with other machines.
• Communicate with other smart devices.
• Communicate with humans.
Smart devices
Connected with smart devices including
• Field devices.
• Mobile devices.
• Operating devices.
Smart Manufacturing Process
• Dynamic.
• Automation.
• Real-time.
• Efficient.
Smart Engineering
• Smart design of product.
• Smart development of product.
• Smart planning.
Information Technology
• Smart software application.
• Monitoring.
• Control.
• Smart management process.

Characteristics of Smart Factories


• Connection.
• Optimization.
• Transparent.
• Proactivity.
• Agility.
Connection:
• Connected smart devices.
• Connected smart machines.
• Connected with data.
• Connected processes.
Optimization
• Optimizing the task scheduling.
• Optimizing the use of energy.
• Optimizing the cost of production.
• Optimizing the tracking.
• Optimizing the throughput.
• Optimizing the reliability.
Transparent
• Real-time monitoring.
• Taking required action on time.
• Generating alert messages.
• Real-time tracking.
Proactivity
• Predicting the quality issues.
• Improving safety.
• Forecasting the future outcomes.
• Predicting the future challenges.
Agility
• Flexibility.
• Adaptation.
• Self-configuration.
Supporting technologies for smart factories
• Big Data.
• Cloud computing.
• Smart grid.
Use of Cloud computing in smart factories
• Provides the capability of high-performance computing.
• Easy access for product designing software and tools.
• Easy access for present and past data for analyzing.
• Scalability provides freedom in terms of computing and data storage.
Use of Big Data Analytics in smart factories
• Generating knowledge.
• Improving value streams.
• Future prediction.
• Key Performance Indicator (KPI).
Use of smart grid in smart factories
• Persistence in energy consumption.
• Load balancing.
• Reduction of energy consumption cost.
• Increase the life cycle of electronic equipment.
Use of augmented reality in smart factories
• Operate instruments from remote.
• Providing precision.
• Providing safety especially for radio active zones.

Automation pyramid of a smart factory


Link to Video Lectures:
1. [Link]
10. Assignments

• Explain in detail about the Globalization and Emerging


Issues
• Minimum 5 issues is to be discussed and do explain how
to overcome those issues.
11. Part A

Course
Q. K
Questions Outcom
No.: Level
es

What is a Transducer?

Converts a signal from one physical form to another


physical form

Physical form: thermal, electric, mechanical, magnetic,


chemical, and optical
1 K2 CO1
Energy converter

Example:

Microphone : Converts sound to electrical signal

Speaker : Converts electrical signal to sound


Define Resolution

• Provides the smallest change in the input that a


sensor is capable of sensing
2 K2 CO1
• Resolution is an important specification towards
selection of sensors.

• Higher the resolution better the precision


Define Sensitivity

• Sensitivity indicates ratio of incremental change in the


response of the system with respect to incremental
3 change in input parameter. K2 CO1

• It can be found from slope of output characteristic


curve of a sensor

What is Digital Sensor

• Responses in binary nature

• Designs to overcome the disadvantages of analog


sensors
4 K2 CO1
• Along with the analog sensor it also comprises of
extra electronics for bit conversion

• Example: Passive infrared (PIR) sensor and digital


temperature sensor (DS1620).
Course
Q. K
Questions Outcom
No.: Level
es
Write in detail about the Features of IEEE
802.15.4

• This standard utilizes DSSS (direct sequence spread


spectrum) coding scheme to transmit information.

• DSSS uses phase shift keying modulation to encode


information.

• BPSK - 868/915 MHz, data transmission rate 20/40


5 kbps respectively. K2 CO1
• OQPSK - 2.4 GHz, data transmission rate 250 kbps.

• DSSS scheme makes the standard highly tolerant to


noise and interference and thereby improving link
reliability.

• The preferable nature of transmission is line of sight


(LOS).

• The standard range of transmission - 10 to 75m.


What are the operating frequencies of Zigbee?

• 868 MHz (1 channel using data transmission rate up to


20 kbps)
6 • 902-928MHz (10 channels using data transmission K2 CO1
rate of 40 kbps)

• 2.4 GHz (16 channels using data transmission rate of


250 kbps).
What are the Features of Zigbee
• The lower frequency bands use BPSK.
• For the 2.4 GHz band, OQPSK is used.
7 K2 CO1
• The data transfer takes place in 128 bytes packet size.
• The maximum allowed payload is 104 bytes.
• The nature of transmission is line of sight (LOS).
Course
Q. K
Questions Outcom
No.: Level
es
What are the Features of 6LoWPAN

• 6LowPAN converts the data format to be fit with the


IEEE 802.15.4 lower layer system.

• IPv6 involves MTU (maximum transmission unit) of


1280 bytes in length, while the IEEE 802.15.4 packet
size is 127 bytes.
8 K2 CO1
• Hence a supplementary adaptation layer is introduced
between MAC and network layer that provides:

• Packet fragmentation & packet reassembly

• Compression of header

• Routing of data link layer.


What are the Features of Wireless HART?

• Exploits IEEE 802.15.4 accustomed DSSS coding


scheme.

• A Wireless HART node follows channel hopping every


time it sends a packet.
9 K2 CO1
• Modulation technique used is offset quadrature phase
shift keying (OQPSK).

• Transmission Power is around 10dBm (adjustable in


discrete steps).

• Maximum payload allowed is 127 bytes.


What are the Features of Z-Wave
• A Z-wave network has 2 device categories: Controller
and Slave
• The Controller is a central entity which sets up the Z-
wave network and manages other slave devices in the
network.
10 K2 CO1
• Each logical Z-wave network has 1 Home (Network)
ID and multiple unique Node IDs for the devices .
• The Network ID is of length 4 Bytes and Node ID is of
length 1 Byte.
• It offers a data rate of up to 100kbps and an average
communication range of 30 meters.
12. Part B

Course
Q. K
Questions Outcom
No.: Level
es

1 Discuss about various sensors and actuators. K2 CO1

2 Compare various communication protocols K2 CO1

3 Discuss in detail about various networking protocols. K2 CO1

4 Discuss about the evolution of Industrial Revolution. K2 CO1

5 Write in detail about the LEAN Production Systems K2 CO1

Explain in detail about the Smart and Connected


6 K2 CO1
Business Perspective

7 Discuss in detail about Smart Factories. K2 CO1


[Link] Online Certification Courses

Online Source: NPTEL


Course Name: Introduction to Industry 4.0 and
Industrial Internet of Things
Instructor: Prof. Sudip Misra
Duration: 12 Weeks
Link:
[Link]
14. Real Time Applications in day to day life and
to Industry
Smart Traffic Control Signal System.
Smart Elevator Control System.
Fire Detection and Alarm System.
Automatic Machine Handling System.
Automatic Vehicle Washer System
Automated Guided Vehicle System.
In the Roller Coasters Machine.
Automation System for Well Drainage System.
Luggage Handling System. For example, at the Airport.
Pressure Controller in Multi-Motor Pump Applications.
.
15. Contents Beyond The Syllabus

LTE—Long Term Evolution

Long Term Evolution enhanced Machine-Type Communication (LTE


eMTC) standards-based technologies support CAT-0 and CAT-M
modes. While LPWAN LTE CAT-0 is commonly used to implement
M2M/IoT, CAT-M reduces complexity keeping the coverage aspect
using existing mobile cellular network infrastructure . LTE eMTC counts
on the same mobile technology benefits as security, privacy, data
reliability and device identification.

With the applications involving the communication information


generated by the human-to- human (H2H) services, the transmission
data rate in the cellular networks increased considerably in the last
decade. However, the traffic generated by M2M communication has
different characteristics from those generated by H2H services in
actual mobile technologies. M2M devices send more traffic than
receive traffic when compared to H2H devices. For example, (H2H)
service traffic has specific concentration characteristics at certain
times of the day, while M2M traffic may present a uniform
characteristic. In applications, such as measuring, M2M traffic tends to
be periodic and mobility is short when compared to (H2H)
communication devices. Thus, service quality requirements between
M2M and H2M may be very different.
3GPP offered the appropriateness of LTE to permit MAC connection
and PHY links through LTE networks and to optimize the technologies
and mechanisms related to radio access. It provides LTE networks
updates do deal with MTC and IoT requirements as follows:

CAT-0, version 12 (R12): Since Category 1 (CAT-1) has low


transmission capacity, a new category has become necessary to
support the new challenges of MTC and IoT. The Category 0, or CAT-0
of R12 have lower hardware complexity when compared to CAT-1

CAT-M, version 13 (R13): With the objective of new complexity


reduction techniques, CAT-M was proposed in R13

CAT-N, version 13 (R13): As major IoT devices, or MTCs, typically deal


with long distance coverage to transmit few data bytes, CAT-N has
been incorporated into the LTE specifications to support the required
functionality. The main objectives of CAT-N is to improve distance
coverage reducing its complexity and, as a consequence, a greater
battery life cycle

In order to fulfill the prerequisites necessary for LTE networks to be


able to attend MTC services, 3GPP worked on the R12 to minimize
power consumption and cost with new data traffic profile, hardware
simplification and spectrum adjustments.
LTE OFDMA modulation and SC-FDMA coding is maintained. 3GPP LTE
Release 13 is being studied for IoT applications due to the fact that it
uses a lower transmission bandwidth than the LTE terminals of
previous releases. Release 13 works with freedom of spectrum
occupancy within the LTE carrier using only 1.4 MHz of the 20 MHz
available LTE carriers. A 15 dB link budget enhancement can
guarantee longer distance coverage and better obstacle penetration
factor. LTE eMTC technology presents the same layers observed in the
LTE protocol stack, shown in Figure. Briefly, the layers can be
described as follows:

Non-Access Stratum (NAS): Works between Device and Network Core


and is used for control, authentication and mobility management
purposes.

Radio Resource Control (RRC): In an eNodeB base station, this layer


takes handover decisions, sends broadcast messages containing
system information and controls the measurements of the device (UE)
parameters.

Packet Data Control Protocol (PDCP): Responsible for the compression


and decompression of the user IP packet headers. It also performs
data encryption, both on the user data plane and on the control plane
data plane.

Radio Link Control (RLC): Used to format and transport data between
the Device and eNodeB base station, transfer upper layer Protocol
Data Units (PDUs), error correction, concatenation, segmentation,
and reassembly of Service Data Unit (SDUs).
16. Assessment Schedule
17. Prescribed Text Books & Reference Books

TEXT BOOKS:
1. Arshdeep Bahga, Vijay Madisetti, ―Internet of Things – A hands-on
approach‖, Universities Press, 2015
2. Dieter Uckelmann, Mark Harrison, Michahelles, Florian (Eds),
―Architecting the Internet of Things‖, Springer, 2011.
3. Olivier Hersent, David Boswarthick, Omar Elloumi, ―The Internet of
Things – Key applications and Protocols‖, Wiley, 2012
REFERENCES:
1. Honbo Zhou, ―The Internet of Things in the Cloud: A Middleware
Perspective‖, CRC Press, 2012.
2. Jan Ho¨ ller, Vlasios Tsiatsis , Catherine Mulligan, Stamatis ,
Karnouskos, Stefan Avesand. David Boyle, "From Machine-to-
Machine to the Internet of Things - Introduction to a New Age of
Intelligence", Elsevier, 2014.
3. “Industry 4.0: The Industrial Internet of Things”, by Alasdair
Gilchrist (Apress)
4. “Industrial Internet of Things: Cyber manufacturing Systems” by
Sabina Jeschke, Christian Brecher, Houbing Song, Danda B. Rawat
(Springer)
5. Peter Waher, “Learning Internet of Things”, PACKT publishing,
BIRMINGHAM – MUMBAI.
6. NPTEL Video Lecture Notes on “Introduction to Industry 4.0 and
Industrial Internet of Things” by Prof. Sudip Misra, IIT Kharagpur.
[Link]
18. Mini Project Suggestions

[Link]
Thank you

Disclaimer:

This document is confidential and intended solely for the educational purpose of RMK Group of
Educational Institutions. If you have received this document through email in error, please notify the
system manager. This document contains proprietary information and is intended only to the
respective group / learning community as intended. If you are not the addressee you should not
disseminate, distribute or copy through e-mail. Please notify the sender immediately by e-mail if you
have received this document by mistake and delete this document from your system. If you are not
the intended recipient you are notified that disclosing, copying, distributing or taking any action in
reliance on the contents of this information is strictly prohibited.

You might also like