Introduction to Internet of
Things(IoT)
Dr. Ch. Praveen Kumar
Dept. of EECE
IoT (Internet of Things):
The Internet of things (IoT) describes the
network of physical objects or “things” that are
embedded with sensors, software, electronics,
and other technologies for the purpose of
connecting and exchanging data with other
devices and systems over the Internet.
Internet technology connecting devices,
machines, tools to the internet by means of
wireless technologies such as Wi-Fi, cellular
technologies, Bluetooth, Zigbee and different
other wireless technologies that are available
to us.
IoT (Internet of Things):
Connecting everyday things which are embedded
with electronics, software and sensors to the
internet enabling them to collect and exchange
data.
IoT refers to the interconnection via the internet of
computing devices embedded in everyday objects,
enabling them to transmit and receive data.
Today data is everything and everywhere. Hence,
IoT can also be defined as the analysis of data to
generate a meaningful action, triggered
subsequently after the interchange of data.
Contd..
IoT refers to the collection of all the devices
that have the ability to connect to the internet
and collect & share the data.
The things that are connected to the internet
are going to be projected to cross the 20
billion figure in the near future. This is what
has been predicted.
So, a large number of things, billions and in
fact, billions and trillions of things are going to
be connected to the internetwork of things.
The Ultimate Goal of IOT is to Automate
Human Life
An equation for the Internet of Things:
Internet of (every) thing
The scope of IOT is not just limited to getting the
device connected or networked, but rather it is
more about exchange of meaningful information
from one device to another to acquire purposeful
result.
Data is the king/ Queen in fact Data is everything.
If someone just gets the data from the sensors
without understanding how to use and where to
use, it is useless.
IOT is not owned by anyone engineering branch.
IOT is a reality in multiple domains come
together.
Growth of Internet:
A day in one’s life would be governed entirely by internet and IoT in the
near future.
The following is an idea how you would lead
your life connected to the Internet:
• When you wake up, the water heater would
have hot water ready.
• During your bath, the microwave would have
cooked your food that you would eat after the
bath.
• When you lock the door of your home, the car
doors shall be open for you.
• Your AC shall adjust based on your body
temperature/room temperature.
• Parking slots shall be informed while your car
is nearing your office.
• The pill box shall alert you at the time of your
tablet intake.
• While nearing home, the home lights shall be on
with appropriate brightness.
• Your workout room lights/ambience shall be set.
Heart beat/km alert shall be updated.
• Your refrigerator shall order milk/egg on need
• The bedroom AC shall be automatically switched
on for you to sleep.
An Overview
An Overview
IoT Growth
IoT Design Goals:
Efficient resource utilization: If we know the
Advantages of IoT
functionality and the way that how each device
work we definitely increase the efficient resource
utilization as well as monitor natural resources.
Minimize human effort: As the devices of IoT
interact and communicate with each other and
do lot of task for us, then they minimize the
human effort.
Save time: As it reduces the human effort then
it definitely saves out time. Time is the primary
factor which can save through IoT platform.
Improving quality of life: As IoT technology
increased comfort, convenience & better
management, hence it improves the quality of
life.
Advantages of IoT
Ability to access information from
anywhere at any time on any device:
Enhance Data Collection:
Disadvantages of IoT
Lack of Security on privacy: IoT devices first
share data over the internet, where the risk of
losing privacy increases because of hackers.
Complexity: The designing, developing, and
maintaining and enabling the large technology to
IoT system is quite complicated. Any failure or
error in the software or hardware will have serious
consequences. Power failure or no internet can
cause a lot of inconvenience.
Increasing unemployment:
Technology takes control of life:
Compatibility: Since there is no international
standard of compatibility for IoT, it is difficult for
devices from different manufactures to
communicate with each other.
Application areas of IoT:
IoT can be used to build applications for agriculture,
assets tracking, energy sector, safety and security
sector, defence, embedded applications, education,
waste manage- ment, healthcare products,
telemedicine, smart city applications, etc.
IoT application sectors:
Smart Homes: Home automation systems are designed to make
everyday routine tasks convenient, such as regulating lights,
controlling appliances, adjusting thermostats, etc.
It works with the help of Embedded systems, Home
Automation Systems, Energy Management and Climate
adaptation.
Health and wellbeing (Internet of Medical Things):
IoT for Patients - Wearable devices such as fitness bands and
other wirelessly connected devices track and monitor health
parameters such as heartbeats and oxygen saturation in
individual patients.
IoT for doctors - Data collected from IoT devices can help
physicians identify the best treatment process for patients by
using wearables and other home monitoring equipment's, etc.
IoT for Hospitals - IoT devices tagged with sensors can be used
for tracking real time location of medical equipment like
Smart industry: IoT can boost productivity by enabling
industrial automation by real-time data analytics and
seamless operations with high-quality output.
The automation of industrial processes or Industrial
IoT is integral to Industry 4.0.
Smart Energy: IoT-enabled smart grid empowers
consumers and governments to make better
decisions regarding energy usage.
It allows cities to save electricity through
sophisticated, seamless connectivity and
communications.
Smart agriculture: IoT enables precision farming
through data analysis to optimize agricultural
operations.
It monitors key parameters such as soil moisture,
nutrients, etc. and helps the farmer community make
better informed decisions.
It uses various technologies such as GPS, GIS,
sensors, aerial devices, field mapping, etc. to
streamline crop management processes, increase
production levels, and improve profitability.
Example: Israel based start-up Fielding employs IoT
to manage pests by using pesticides more efficiently
and safely.
Smart Environment: IoT allows environmental
sensors to connect with devices such as smartphones
IoT in Disaster Management: IoT can be helpful in
quick hazard mapping, Earthquake Early Warning
Systems, etc.
For example, the National Advance Seismic
System of the United States delivers real-time
information, providing situational awareness for
emergency response.
Smart Water Monitoring: Ministry of Jal
Shakti, India, has decided to employ “sensor-based
IoT devices” in every village under the National Jal
jeevan mission to monitor the quality of water.
Smart Cities: Smart cities leverage IoT to
facilitate smart infrastructure to improve the quality
of life for their city residents, optimize resource usage,
and increase operational efficiency.
Street lighting offers energy-efficient solutions
through adaptive lighting facilitated by embedded
systems on the network.
Waste Management Systems optimize collection
routes and schedule the fill levels of waste containers
by collecting and analyzing sensor data.
IoT in Defense: The Internet of Military Things
(IoMT) is a class of connected devices employed for
warfare.
It has wide applications in advanced combat
operations and intelligence-oriented warfare.
It allows real-time connectivity among devices, such
as between unmanned vehicles and a central
command station.
Major Components of
Internet of Things
Things or devices: These are the IoT devices or sensors
(e.g., temperature sensors, smart appliances, or wearables)
that collect data from their environment or perform specific
tasks.
Gateway: The gateway connects IoT devices to the cloud
using a wireless network. It serves as an intermediary,
ensuring data from the devices is securely transmitted to
the cloud.
Cloud: The cloud is a centralized infrastructure where data is
stored, processed, and managed. It provides scalability for
handling large amounts of data and computing resources for
analysis.
Analytics: Analytics processes the data collected from IoT
devices in the cloud, transforming it into meaningful insights
or visualizations.
This could involve predictive analysis, anomaly detection, or
trend identification.
User interface: The user interface allows end-users to
interact with the IoT system. This could include web
applications, mobile apps, or dashboards where users can
view analytics, control devices, or receive alerts.
Characteristics of IoT
The characteristics of IoT are as follows
Connectivity
Intelligence
Identity
Scalability
Dynamic and Self-Adapting (Complexity)
Architecture
Safety (Security)
Network
Data
1. Connectivity
Connectivity is an essential feature of IoT.
IoT lets you connect cell phones, laptops, and other internet devices. Any
person can get information about anything at any time and place.
IoT can connect through several wireless devices, like sensors, cell phones,
trackers, etc. This way, the person will not have to wait for an internet
connection to operate a device.
2. Identity of Things
The collaboration of name and number gives an identity to an internet
device. Giving an identity to the device is an essential aspect of loT.
Identity helps to differentiate between various internet devices and select
the device we want to send the command.
Every device needs a different controlling power based on the type of data
provided.
It is essential to give a unique identity to every device so that we can set
up passwords or other security means.
For example, fingerprints, face recognition IP addresses, and Face lock
systems are several means of security given to the different identified
devices to protect them.
3. Intelligence
IoT incorporates data analytics and artificial intelligence (AI) to enable
decision-making, automation, and predictions.
4. Dynamic
We need to create IoT devices in a way that they can adapt to the
environment.
For example, an AC should have a sensor that can send a signal to the cloud
and adjust it to the premises of the place.
Similarly, the camera can easily click photographs by adjusting to light
situations, like day and night.
5. Scalability
IoT systems can scale to include millions of devices, ensuring
smooth operation across large and diverse networks.
Scalability means the amount of data one can handle efficiently.
The IoT has created a setup to handle enormous data and generate
useful analysis.
6. Self Upgradation
As we saw above, updating the software regularly is important.
But who has the time to remember to do that? Thus, with its
artificial intelligence, IoT upgrades itself without human help.
It also allows the set up of a network for the addition of any new
IoT devices. Thus, the technology can quickly start working without
delay if the setup has already been done.
7. Architecture
The architecture of IoT is designed in a way that it can support
various devices, technologies, and protocols.
Its main work is to confirm whether each connected device
does not interfere with the other. This way, the safety and
security of each device's data are maintained.
8. Security
With the increasing number of IoT devices, issues regarding the
security of personal data have arisen.
There might be a chance of data leakage as a large amount of
data is collected, exchanged, and generated. There is a chance
of personal data being transferred without approval, which is a
matter of concern.
To overcome this challenge, IoT has created networks, systems,
and devices wherein privacy is well maintained.
Maintaining safety and security is a big dare for IoT. However, it
still handles it without any disruption.
9. Network
With the increasing number of IoT devices in a network, it becomes
difficult to maintain communication for proper functioning.
However, cloud service and gateway are a few methods that can solve
such problems.
Often, one device can use the connectivity of another device to establish
network connectivity even if the second device is not connected to a
network.
Because IoT devices can communicate with one another, it is more
effective and adaptable than other current technologies.
10. Data
The data gathered from IoT devices are analyzed for future prediction.
For example, a calorie meter. It helps to regulate the number of calories
each day.
We also have fitness data, thermostats, and various devices that monitor
our health.
11. Integration with AI and ML
IoT integrates with other technologies like cloud computing, edge
computing, AI, and big data to enhance functionality and performance.
Physical Design of IoT: Things
• Things in IoT refers to IoT devices.
• Things have unique identities.
• Things can perform sensing, actuation, and monitoring.
• Some of the examples of things in internet of things are
shown below.
Some of the examples of IoT devices are:
Home appliances: smart TV, smart refrigerator,
smart AC, etc.
Smart phones and computers
Wearables: smart watch, smart sensors, etc.
Automobiles like self-driving cars
Energy systems
Retail : smart payment
Printers
Industrial machines
Healthcare: smart watch, smart healthcare,
etc.
Surveillance: smart cameras, smart trackers,
etc.
Things can exchange data with other connected devices and
applications, collect data from other devices, and process
the data either locally or send it to centralized servers or
cloud.
IoT devices can have several interfaces like:
• I/O interfaces for sensors
• Interface for Internet connectivity
• Memory and storage connectivity interfaces
• Audio/video interfaces
An IoT thing or device is made up of different components.
The generic block diagram of an IoT thing or device is given
below:
An IoT device provides connectivity interfaces like USB, RJ45,
etc.
It contains a microcontroller or processor for computation
tasks.
It provides audio/video interfaces like HDMI, RCA, 3.5mm
audio channel.
It contains memory interfaces like DDR.
It might support graphics by providing a separate Graphical
Processing Unit (GPU), it provides storage interfaces like
MMC, SDIO.
Finally, it might provide different I/O interfaces for connecting
sensors and actuators like UART, SPI, I2C and CAN.
Physical Design of IoT: IoT Protocols
A protocol is a set of rules that governs the communication
between two or more devices. A protocol defines the rules,
syntax, semantics and synchronization of communication and
possible error recovery methods.
An overview of different protocols used in IoT with respect to
TCP/IP protocol stack is given below:
IoT Protocols
IoT protocols are structured across various
layers:
1. Link Layer: Physical data transmission.
2. Network Layer: Addressing and routing
data.
3. Transport Layer: Reliable data delivery.
4. Application Layer: Interaction with IoT
applications.
These protocols ensure efficient and reliable
communication in IoT systems.
Application Layer Protocols
- Interfaces IoT applications with lower network
layers.
-The application layer is where the users of an IoT
application interact with the IoT
application/system.
-The application layer allows the users to interact
with the IoT sensors and access other services
provided by the communication network.
-The application layer provides services like
authentication, naming, message formatting,
email, etc, to the users.
Communication Protocols in IoT
There are several communication protocols in IoT, each designed for specific use cases
and applications.
MQTT (Message Queuing Telemetry Transport)
MQTT is a lightweight publish-subscribe protocol designed for IoT devices with limited
resources such as low bandwidth, memory, and processing power.
It works on top of the TCP/IP protocol and uses a simple and efficient messaging model
to enable bi-directional communication between devices.
MQTT is widely used in IoT applications such as smart homes, industrial automation,
and asset tracking.
Advantages:
Low overhead and efficient use of network bandwidth
Can handle unreliable and intermittent network connections
Supports QoS (Quality of Service) levels for message delivery assurance
Scalable and easy to implement
Disadvantages:
Limited security features, which may require additional encryption and authentication
mechanisms
May not be suitable for applications that require real-time communication
CoAP (Constrained Application Protocol)
CoAP is a lightweight protocol designed for IoT devices with limited
resources and low-power networks such as 6LoWPAN and Zigbee.
It’s like HTTP in terms of its request/response model, but it’s optimized
for constrained devices and networks.
CoAP is widely used in IoT applications such as smart homes,
healthcare monitoring, and industrial automation.
Advantages:
Low overhead and efficient use of network bandwidth
Can handle unreliable and intermittent network connections
Supports resource discovery and manipulation
Scalable and easy to implement
Disadvantages:
Limited security features, which may require additional encryption and
authentication mechanisms
May not be suitable for applications that require real-time
communication
DDS (Data Distribution Service)
DDS is a protocol designed for real-time data distribution and messaging
in mission-critical systems such as industrial automation, aerospace,
and defense.
It provides a publish-subscribe model with support for Quality of Service
(QoS) levels and data-centric middleware.
DDS is suitable for applications that require high-speed data transfer
and real-time communication.
Advantages:
High scalability and support for real-time data distribution
Reliable and secure communication with built-in authentication and
encryption
Supports Quality of Service (QoS) levels for message delivery assurance
Disadvantages:
May not be suitable for resource-constrained devices due to its
complexity and overhead
Requires specialized expertise for implementation and maintenance
Zigbee
Zigbee is a wireless communication protocol designed for low-power and
low-data-rate IoT applications such as smart homes, smart lighting, and
home automation.
It operates on the IEEE 802.15.4 standard and provides a mesh
networking topology for reliable communication in a decentralized
network.
Advantages:
Low-power consumption for extended battery life
Reliable communication with mesh networking topology
Secure communication with built-in encryption and authentication
Suitable for low-data-rate applications
Disadvantages:
Limited range compared to other wireless protocols such as Wi-Fi and
Bluetooth
Limited bandwidth and data rate
Requires a gateway for internet connectivity
LoRaWAN (Long Range Wide Area Network)
LoRaWAN is a low-power, long-range wireless communication protocol
designed for IoT applications such as smart cities, asset tracking, and
agriculture.
It operates on the unlicensed radio spectrum and provides a wide area
network (WAN) for communication over long distances.
Advantages:
Long-range communication up to several kilometers
Low-power consumption for extended battery life
Secure communication with built-in encryption and authentication
Suitable for low-data-rate applications
Disadvantages:
Limited bandwidth and data rate
Requires a gateway for internet connectivity
Limited network coverage in some regions
HTTP (Hypertext Transfer Protocol)
HTTP is a widely used protocol for web communication and is also used
in IoT applications such as smart homes and smart cities.
It uses a request/response model and supports various data formats
such as JSON and XML.
HTTP is suitable for IoT applications that require real-time
communication and high-speed data transfer.
Advantages:
Widely used and supported
Supports various data formats
Suitable for real-time communication and high-speed data transfer
Robust security features
Disadvantages:
High overhead and inefficient use of network bandwidth
Not suitable for low-power and resource-constrained devices
Requires a reliable and stable network connection
MQ Telemetry Transport (MQTT)
What Telemetry is? According to the Oxford dictionary says" The process
of recording and transmitting the readings of an instrument’.
MQTT is a lightweight protocol which makes it exceptionally useful.
What do you mean by lightweight? By being lightweight means that it
demands minimal resources for its functioning and does not require
additional resources from its working environment.
IoT vouches for this kind of lightweight protocols due to resource
constraints.
MQTT follows the publish/subscribe pattern. In such case can we call
it client/server model?
The answer is, No.
The protocol was designed by Andy Stanford Clark and Arlen Nipper
for IBM in 1999
Earlier the protocol was proprietary. However, by 2014, the protocol
was made free and open.
So how does it work? As stated before, MQTT uses
publish/subscribe model.
A component called central broker plays the key role
in the entire schema.
The message broker is like the heart of the system
and it helps to dispatch the messages to the nodes
that have subscribed for the same.
The publisher (node) sends the message to the
broker and the broker takes the responsibility of
dispatching the messages to the destinations which
have already subscribed.
MQTT scheme: Publish and subscribe
MQTT scheme: publish and subscribe.
From the above figure, one can see that a node
(publisher) can send the data (message) to the MQTT
broker.
Based on the subscriptions from the nodes connected,
broker shall send the messages appropriately.
In this scheme, only subscribers 1 and 3 have subscribed
for the humidity data; hence, the data is captured by the
nodes which have expressed the interest through
subscription.
Thus, the data (message) reaches the node which really
wants it and not to all the nodes present in the network.
There is another important aspect to this theory.
The messages are published as topics and the
publisher publishes the messages with a topic.
From the figure, one can see that the topic of the
published message is Humidity.
Clients subscribe to the topics and they get the
messages based on their subscriptions
Here, in this approach, clients do not have any
address. When there is no address available, the
messages cannot be routed appropriately. In a
typical networking schema, it is a well-known that
addressing connects the source and destination.
And so, "topics" are used.
Messages are sent as a topic and brokers filter
the messages based on the topics subscribed,
which will then be circulated to the respective
subscribers. To make it more precise, topics are
used to connect the publisher to the subscriber.
The way the topic are named is not of much
importance and it can be a usual string, just as it
named as Humidity
One can relate MQTT to the
TV/Radio broadcast. The only
difference is that the subscriber can
also become a publisher in the MQTT,
which is not possible with the
TV/Radio broadcast.
MQTT Scheme: Client and broker:
WebSocket
•Linked to the HTTP
protocol, the WebSocket
technology establishes a
TCP connection between a
browser and a server, and
then both exchange
information until the
connection is closed.
Figure 3 shows a high-
level comparison between
HTTP and WebSocket.
•Although this protocol
can be seen as an
improvement of the HTTP
connection, the
WebSocket is still very
overloaded and heavy for
IoT application.
Advanced Message Queue Protocol (AMQP)
In the beginning, AMQP was not initially created for IoT applications, but
for banking environments.
AMQP accepts publish/subscribe architectures, as well as
request/response types.
It is TCP-based, so delivery is guaranteed, as well as acknowledgment,
which makes this protocol reliable, with the consequent overhead
message reliability.
Compared to MQTT, AMQP offers two Quality of Service levels:
At most once: the sender does not wait until having an acknowledgment
from the receiver to delete a message.
At least once: for each message, the sender will receive an
acknowledgment from the receiver before deleting the message. In a
case where the acknowledgment is lost, the message is re-sent.
Exactly once: the messages are sent only once. It requires special
coordination between the sender and the receiver.
Extensible Messaging and Presence Protocol (XMPP)
It is based on Extensible Markup Language (XML) and in the
past, it was known as Jabber.
It is an open-source, decentralized, secure protocol to
exchange XML messages.
A characteristic factor of XMPP is its addressing method and
how nodes are identified.
It uses a Jabber ID with the format
[email protected],
which allows two nodes to interchange information
regardless of the distance between them.
OPC Unified Architecture (OPC UA)
It is a standard made for industrial communication, strongly
oriented to guarantee interoperability between
manufacturers, operating systems, and programming
languages.
The OPC foundation reported that many industrial vendors
are currently (as of 2022)
adopting the OPC UA as the open standard.
All in all, the OPC UA is a transport-agnostic protocol, so it
supports both previously used architectures:
request/response (such as WebSocket or HTTP), as well as
the publish/subscribe (such as the MQTT).
Transport Layer Protocols
- Ensures reliable and efficient end-to-end data
transfer.
- Key Protocols:
• TCP: Connection-oriented, reliable delivery,
error detection.
• UDP: Connectionless, lightweight, suitable for
real-time applications.
- Functions:
• Error control
• Flow control
• Segmentation and retransmission.
Network Layer Protocols
- Responsible for addressing and routing data across networks.
-The network layer is also responsible for logical addressing (like
IP address) and for congestion control which prevents the
network from being overloaded with traffic.
- Key Protocols:
• IPv4: 32-bit addressing; widely used but limited scalability.
• IPv6: 128-bit addressing; supports massive IoT deployment.
• 6LoWPAN: IPv6 over low-power networks; ideal for
constrained devices.
- Enables host identification, routing, and data packet delivery.
Link Layer Protocols
- Focuses on physical data transmission over various media.
-The link layer also handles error detection, retransmission,
flow control and access of the link.
- Key Protocols:
• 802.3 Ethernet: Wired communication; data rates up to
40 Gbps.
• 802.11 Wi-Fi: Wireless LAN; operates in 2.4 GHz and 5
GHz.
• 802.16 WiMAX: Wireless broadband; speeds up to 1 Gbps.
• 802.15.4 LR-WPAN: Low-rate wireless personal area
networks.
- Applications: Local connectivity, sensor networks.
Comparative Insights of Protocols
- Link Layer:
• Focus: Physical data transmission.
• Examples: Ethernet, Wi-Fi.
- Network Layer:
• Focus: Addressing and routing.
• Examples: IPv4, IPv6, 6LoWPAN.
- Transport Layer:
• Focus: Reliable data transfer.
• Examples: TCP, UDP.
- Application Layer:
• Focus: Interaction with IoT systems.
• Examples: HTTP, MQTT, CoAP, WebSocket.
IoT Functional Blocks
IoT systems are composed of several building blocks,
including sensors/actuators, connectivity, security,
services, etc.
An IoT system comprises of a number of functional
blocks that provide the system the capabilities for
identification , sensing, actuation ,communication and
Management.
These functional blocks are made up of devices that
handle interactions between a web server and the client,
enable controls and monitoring functions, manage data
transfer, secure the IoT system through authentication
and various purposes, and offer an interface for
monitoring and managing various concepts.
Sensor/Actuator block
The sensor/actuator block serves as the data
entry point in an IoT system. Sensors collect
data from their surroundings, whereas
actuators drive physical processes.
Sensors gather data on temperature,
humidity, light, motion, and other variables,
whereas actuators turn on lights, open doors,
and control machines.
These gadgets work together to collect data
and operate in the physical world.
Connectivity Block
Once the sensor/actuator block has collected
data, it must be sent to the remainder of the
system.
This is when the connection block enters the
picture. The connectivity block is in charge of
creating and managing communication
channels amongst IoT system devices.
This can be accomplished with the use of
several technologies such as Wi-Fi, Bluetooth,
ZigBee, and cellular networks.
Data Processing Block
The obtained data is examined and processed
in the data processing block.
This block is in charge of filtering out noise
and irrelevant data, converting the data into
an easily studied format, and recognizing
patterns and anomalies in the data.
This block can also execute real-time analysis,
enabling speedy data-driven decisions.
Services Block
IoT system uses various types of IoT services
such as services for device monitoring, device
control services, data publishing services, and
services for device discovery.
Application Block
IoT applications serve as the user interface for
interacting with the IoT system.
This block is in charge of utilizing the
processed data to provide a specified function
or service. A
n application block, for example, could be
used to provide insights into energy usage in
a building or to adjust the temperature in a
greenhouse.
Security Block
It is responsible for safeguarding the IoT system
from potential threats and unauthorized access.
The security block is in charge of assuring the IoT
system's security and protection against illegal
access.
This block is in charge of authentication and
authorization, as well as data encryption during
transmission and storage.
It also handles intrusion detection and response,
assisting in the prevention and mitigation of
threats.
Management Block
The management block is in charge of
overseeing the overall operation of the IoT
system.
This block is capable of handling device
configuration, firmware updates, and system
monitoring. It can also give analytics and
reporting, allowing system administrators to
understand how the system is operating and
find areas for improvement.
Sensing
Sensing is the ability of IoT devices to detect
physical, chemical, or biological parameters
and translate them into measurable signals
(electrical, optical, etc.).
Sensors serve as the “eyes and ears” of IoT,
providing the raw data necessary for
automation and intelligent decision-making.
Sensors operate based on the principle of detecting
a specific change in the environment and producing
a corresponding output. The process typically
involves:
1.Sensing Element: Detects the physical stimulus
(e.g., temperature, motion).
2.Transducer: Converts the stimulus into an
electrical signal.
3.Signal Conditioning: Amplifies, filters, or
processes the signal for accurate interpretation.
4.Data Transmission: Sends the processed data to
IoT systems for further action.
Actuation
An actuator is a hardware device or module that
receives a control signal and performs a
corresponding physical action. These actions
include moving, rotating, opening, closing,
turning on/off, or any other mechanical response.
For example:
• A smart thermostat uses an actuator to control
the heating or cooling system based on
temperature readings.
• A robotic arm in a factory uses actuators to
move and assemble components.
The actuation process in IoT typically
involves:
1.Control Signal Input: A control signal is
sent from the IoT system (e.g., a
microcontroller, cloud platform, or edge
device).
2.Power Conversion: The actuator converts
the control signal into physical motion or
action by using electrical, hydraulic,
pneumatic, or mechanical energy.
3.Action Execution: The actuator performs
Basics of Networking
A computer network is a collection of
interconnected devices that share resources
and data.
• Purpose: Facilitates communication, resource
sharing, and data transfer.
Components of a Computer Network
• Nodes: Devices like computers, servers, and
printers.
• Links: Wired (Ethernet, fiber optic) and
wireless (Wi-Fi, Bluetooth) connections.
• Protocols: Set of rules (TCP/IP, HTTP, FTP,
Types of Computer Networks
• LAN (Local Area Network): Covers a small
geographic area.
• MAN (Metropolitan Area Network): Spans a
city.
• WAN (Wide Area Network): Covers large
distances.
• PAN (Personal Area Network): Short-range,
personal devices.
Network Types : Local Area Network(LAN)
🞂 LAN is a group of computers, that are connected in a small area
such as building, home, etc.
🞂 Through this type of network, users can easily communicate
with each other by sending and receiving messages.
🞂 LAN is generally used for connecting two or more personal
computers through some medium such as twisted pair, coaxial
cable etc.
🞂 Through the number of computers connected in a LAN is
limited, the data is transferred at an extremely faster rate.
Metropolitan Area Network (MAN)
🞂 MAN is a network of computers that covers a large area like city.
🞂 The size of the MAN generally lies between LAN and WAN,
typically covering a distance of 5 km to 50 km.
🞂 The geographical area covered by MAN is comparatively larger
than LAN but smaller than WAN.
🞂 MAN is generally owned by private organizations.
🞂 MAN is generally connected with the help of optical fibres,
copper wires etc.
Wide Area Network
🞂 WAN is a group of computers that are connected in a large area such
as continent, country, etc.
🞂 WAN is generally used for connecting two or more LANs through
some medium such as leased telephone lines, microwaves, etc.
🞂 In WAN, data is transferred at slow rate.
🞂 WAN can cover larger geographical area. It can cover cities,
countries and even continents.
🞂 Normally, WAN is
created & run by communication companies (Ex: BSNL, Airtel)
leased by an organization that uses it.
Network Topologies
• Bus: Single backbone cable, simple but prone
to failure.
• Star: Central hub, easy to troubleshoot.
• Ring: Data circulates in a loop, efficient but
costly.
• Mesh: Every node connects to every other,
highly reliable.
Network Devices
• Router: Connects different networks.
• Switch: Directs data within a network.
• Modem: Converts digital data to analog for
transmission.
• Hub: Broadcasts data to all devices.
Advantages of Computer Networks
• Resource Sharing: Printers, files, and
software.
• Communication: Email, VoIP, video
conferencing.
• Data Management: Centralized storage and
backup.
Network Security
• Firewalls: Protect against unauthorized
access.
• Encryption: Secures data transmission.
• Computer networks enhance connectivity and
efficiency.
• Understanding networking basics helps in
troubleshooting and management.
• Continuous advancements improve security
and performance.
Wireless Sensor Network
Wireless sensor network (wsn) comprise of
distributed devices with the sensor which are used to
monitor the environmental and physical conditions.
A WSN consists of a number of end nodes and
routers and a coordinator. End nodes have several
sensors attached to them. End node can also act as a
routers.
Routers are responsible for routing the data packet
from end nodes to the coordinator.
The coordinator node collect the data from all the
notes coordinator also act as a Gateway that connects
the WSN to the internet.
WSN Architecture
Examples of WSNs
Weather monitoring system using WSNs in which the nodes collect
temperature, humidity and other data which is aggregated and analyzed.
Indoor air quality monitoring system using WSN to collect data on the
indoor air quality and connections of various gases.
Soil moisture monitoring system using WSN to monitor soil moisture at
various location.
Surveillance systems use WSN for collecting surveillance data(motion
detection data)
Smart grid use wireless sensor network for monitoring the grid at various
point.
Structural health monitoring systems use WSN to monitor the health of
structure by writing vibration data from sensor nodes deployed at various
points in the structure.
Characteristics of WSNs
Wireless protocols(Zigbee, Bluetooth, Wi-Fi
etc.,)
Range 10m to 100m.
Speed 100 kbps to Few mbps.
Operating frequency (ISM bands, 2.4Ghz in
majority of devices).
Low power operating modes.
WSNs are self-organizing networks.
Robust structure. (Even if some nodes are
failing, it does auto reconfigure the nodes)
Thank you