Unit 2 FIOT
Unit 2 FIOT
. M2M stands for Machine to Machine which acts as a means of communication among same ty~e of physical objectg ot
devic~s. Every machine in M2M system contains a smart device that can track the data status of machme aD<l perform van0u_,
functions. Here, the com~nmication can be wired or wireless. ·
V~io~s conu:nunication protocols are XMPP, LwM 2M, 6Lo WPAN and MQTT. A 48~bit 1Pv6 address is assigned to every
commumcation devtce.
MlM to loT
loT t~hn~logy offers physical machinery, M2M communication and binds networks of sensors toget ber._ It makes use of
kno~ledge discovery, software machine learning and analytics. The M2M is similar to IoT when t~e smart devices get _the data
th at is sent to other devices or remote machines without internet. M2M,.needs to establish connection between the dev1ces and
prov~d~ _communication, control and coordination among them without Internet. In contrast, the IoT u_se~ internet se1:~ or cloud
apphca~ons, server, internet protocol and processes or services. The applications of M2M, include log1st1cs, smart gnd, mdustrial
automation, defence, smart cities, health, telemetric applications and industrial internet of things.
M2M Architecture
The architecture ofM2M contains three domains
'
1. M2M_Device Domain: It contains entities such as communication interface, physical devices and gateway. The commu.
nication int~rface refers to a port or subsystem that extracts input from one end and sends the data to another.
2. MlM Network Domain: It contains device identity management, device management, M2M server and data analytics.
3. MlM Application Domain: It contains application of services, analysis, monitoring and device networks control.
M2M Network.Domain
(Data Accumulation, Data Analysis, M2?\1, Server, Device Network Manage-
ment, Device Identity Management, Data Abstraction, Unicast, Multicast Message
Delivery and Other Core Functionalities for Monitoring) ,.
!
Connectivity Interface (Communication and Processing Units) and
Edge Computing (Data Element Analys!s and Transfq,nnation)
~
' ' ' ~ :~ '~ ~ ~ -~ -~
WARNING: Xerox/Photocopying of this book is a CRIMINAL act. Anyone found guilty is LIAB!,.E to face LEGAL proceedings.
k, a10. o sc
r.
us• various examples of software and development tools.
.
~sw~ru--ious examples of M2M soflwarc and development tool s arc as follows,
2.5
1, t';::i:e of the open source web based sollware. fl suppot l meta points, datab1:1sc, multiple protocols and platform, user
·ned events and import/export.
Jell pe\ficeHive , , . . . . .
Z, . tvne of M2M communication framework which 1s constclcrcd as an mtcgration tool used to provide connect10n
. rule- based e-networks as we 11 as
It is a Jt' and devices. It contuins web-based management soll ware lo create sccut11y
ih IoT
i,eiween e .
'toring devices.
rrtOlll •
,Mainspring
3, . p,.,wided b, M2M labs as a resource framework and developing tool to build M2M appl!cat,om . It provides the fol-
It JS '" -
100 services.
Jo\\ :,Normalization and validation of data.
❖ Interaction between applications and devices.
❖ Apache Cassandra and Java programming.
❖ functions such as data retrieval and long tem1 data storage.
: providing flexible models of devices along with their configuration~.
❖ NoSQL database.
Open M2M Protocols, Frameworks and Tools
4
' various frameworks, tools and open protocols are as follows,
of M2M equipment and automatic SIM activation
~ The 3GPP study group is involved for analysing security properties
including subscription change and remote provisions. · ·
❖ The standards collection of MQTT-OASIS, XMPP and LwM2M-OMA for pi:otocol.
❖ Standards of weightless group and wireless spaces for M2M.
❖ Different projects of eclipse M2M industries are tools, frameworks, koneki and eclipse SCADA available as open standard
of communication protocols.
❖ The development of ITU-T Focus group M2M standardization for M2M service layer.
Q11. Illustrate the differences between loT and M2M.
Model Paper-II, Q4(b} _
A115wer:
loT (Internet of Things) M2M (Machine-to-Machine Communication)
l. IoT deals with sensors automation and acts as an Internet M2M proviqes direct communication between machines.
platform. ,
I
2. The communication protocols 11sed in IoT are HTTP, The communication protocols used in M2M are proprietary
MQTI, XMPP, AMQP, DDS, COAP and web sockets. or non-IP based. They include zigbee, ModBus, M-Bus,
Bluetooth, wireless M-Bus, Z-wave, 6Lo WPAN, PLC etc.
3. The main focus of IoT is on software. The IoT devices The focus of M2M ,is more on hardware along with the
make use of special software for collecting sensor data embedded modules.
to interface with cloud via IP based communication and
I
tor analyzing the data.
4. . "Things" in loT are physical objects holding unique M2M systems contain homogenous machine types in M2M j
identifiers which can sense and interact with either the area network.
external environment or internal physical state. The IoT
system contains heterogeneous things.
I
5. The data in IoT is extracted into cloud. This data is The data in M2M is extracted in point solutions and ori-
analyzed and stored in cloud database by the anaJytics premises storage infrastructure.
component. The results are visualized through cloud
based applications.
6. Devices need Internet for communication.
Devices does not need Internet for communication.
7. Scope in IoT is very large due to wide range of devices.
Scope in M2M is limit_ed to few devices.
8. .
Data in IoT is accessed by cloud applications like Data in M2M is accessed by on premises applications like
useful 8ervice to the user. Some of the types of interoperability are as follows,
1. Syntactic Interoperability
The ability of systems to accurately interpret the message structure of shared data and read the contents of message Withot
without k'llowing the meaning is called s~tactic interoperability. An example of this type of interoperability is smart city sySletn
that can receiw data from data center and can recognise the data format to extract data from message.
2. Semantic Interoperability
The ability of systems.to interpret the content and meaning of exchanged data is called semantic interoperability. It is offered
by various semantic techn9logies and knowledge management systems. An example of semantic interoperability is, enabling sman
city system to extract the data received from some other system to understand its meaning and generate meaningful inform~tion.
3. Technical Interoperability
The ability of systems, compo~ents or applications to establish the communication and share messages without understanding
the contents is called technical interoperability. It does not req~ire the knowledge of data format but require the knowledge o
network connectivity. It is actually related with elements which allow M2M (Machine-to-Ma chine) communication .
The relevant standards, for IoT to solve the ipteroperability problem and allow compatibility between IoT systems are
follows,
(i) OneM2M
It is a global standards initiative available for Io T and M2M communications . It works on service layer including technic
requirements, data semantics, API and security solutions to allow IoT interop-erability.
(ii) ARM
It is an IoT reference architectural model that is proposed by European research proje~t loT-A. It contains a set ofbuil .
blocks representing the basic components and the components that allow creation-of IoT interoperable system.
3. IoTivity
It i~ offered by open connectivity foundation as an open source' framework allowing seamless interconnection an
management of both wired and wireless devices from operating syste.m or device manufacturer.
4, AllJoyn
It is an open source framework that enables devices to interact with machines without concerning about communicatio
technology. It is mandatory in IoT system and an important and critical challenge to be solved in IoT. Many IoT systems ~
currently unable to communicate or interoperate. The reason behind this is the high hetero,geneous nature of IoT systems. Th1
IoT covers a wide range of devices, technologies, protocols, applications, systems and data. With this, global reference standar
for IoT offers interoperability . . .
WARNING: Xerox/Photocopying of this book is a CRIMINAL act. Anyone found guilty is LIABLE to face LEGAt. proceedings.
t1NIT-_2__ __ __ __ __ __,.......___ ___ ___
___-----_ _ _ _ _ _ _ _2_.7
~ tNT ROD UCT ION TOA RDU INO PROGRAMM ING
. Give a brief introduction to Ardulno programming.
013
,'1l9wer :
'Model Pttper-1, QS(a)
Arduino is an open source hardw are plutlb1111 whkh i8 uvallahlc
to be Wied by hohhyisf'! and enthu'liHsts ac,ross the globe
d ,clop projects. 1t 1s accornpanicd with ATMFClA micrncontrn
llcr to process data aml off ct proper workin g orJo'f system. It
~: r~ssible to program /\rduilw multiple times lo Jcvclop uilfcrc
nt types of loT projects with di ffcrcnt types of code.
Arduift.o ts cons1dcrc<l as the brnin of system s processing data from
sensor s. It offers, simple and robust development board .
. reliable and allows the electronics world to be programmable.
It IS
LEO Pin 13 IJlgllal pin,
Tron1n1lt/rwcel-.,•
indicator lighl1
01
US0 -8
Reiet ,
PO~~~
DC power connetlor Afl,Uc,ttfl
~H
LIi
0 ,-J 'f 1"1 "till
"',: ,r C ,r .,_
1. I LI. L l
I, ... ~ ,
Po~d~ pins Analog input,
,
The requirements to start Arduino is an Arduino uno and USB cable.
The software is however available for free. Initially,
theArduino development environment is required to be installed
on the computer. Next, the USB cable is plugged in and the first
program is uploaded. The only ~rogram to be installed on Arduin
o is the sketch to be run because Arduino does not have any
operating system. The analog re~1stance sensors can be directly plugge
d into Arduino without the need for any external hardware
since it posseses a built-in anolog-to-digital converter. The Arduin
o uno can easily get damaged with a wrong wire connection.
Q14. Describe basic Arduino setup for windows 7 and
windows 8.
AnSwer:
Model Paper-II, QS
The process of setting up Arduino on Windows is as follows,
I. Initially downioad latest version of Arduino software from http://
arduino.cc/en/main/software.
2. Unizip the downloaded archive to a suitable location in the.system.
3. Now, connectArduino UNO to computer by using·a USB cable.
Arduino extracts power from USB without the need of
external power supply._ ,
4. Windows begins the installation process automatically and install
s Arduino drivers. However, in certain reasons, installation
may f~il and show an error message. In such case, the below
steps must be followed, ·
0) In Window explorer, right click on Computer and select
Manage.
(ii) In Computer Management, select Device Manager search
for Arduino uno, right click on it and then select Update
Driver software.
(iii) Now select "Brow'se my computer for driver software". Go
to Arduino folder that is extracted, then select arduino.inf
in drivers directory and click on Next.
(iv) .Finally, Windows begins the installation of drivers .
S. ,
Now double click on Arduino icon in unzipped folder and launch
Arduino IDE.
6.
Finally, test the installation.
Initially, load the test program.
void settlp( )
{
void loop()
•
{
Serial. begin(9600);
Serial.println("Hello World!");
}
void loop()
{
}
Q15. Illustrate the anatomy of an Arduino program and write
in brief about shields.
Answ er:
Model Paper-I, QS(~
Anatomy of Arduioo Program
j ' ·An Arduino program begins with the execution of code in setup() function. Then the code present in loop() is repeat
for infinite times until power is disconnected.
I
I For remaining answer refer Unit-II, Q 14, Topic: blink.ino.
The Arduiho executes setup() when it boots. Then, the pin D 13 is ·configured
to output mode so as to make it controllabl
from the program. Once the setop() is·completed, loop() is called infinitely.
Dl3 is set to HIGH indicating that +SV is provided
to it. The pins remain intact when delay occurs. During this time, L LED remains
lit until Dl3 remain HIGH. In the next delay,
D 13 remain LOW and LED remains off. It would be one for a second and
I
off for another second repeatedly.
Shields
Shields are boards that are connected on top ~f Arduino for enhancing its features
so that it can be utilized ~ore efficientlY,
Various types of shields are used to perform different tasks ranging from
simple prototyping to more sophisticated shields Jjke
'
!
I
WiFi or Ethernet.
.
WARNING: Xerox/Photocopying of this book is a CRIMINAL act. Anyone found'guilty is LIABLE.
to face LEGAL proceedings.
vNtf-2 , 2 .9
As the shields are connected 011 top of Arduino using pin-to-pin conncctio11s, they min imize the need for extra wires.
. shields specifically designed for proli,ltyping nnd hence, they do not require electronlcs. They extract the Arduino header
'ertain . . , , ,
" d n1akc them adJaccnt to solucrlcss brcodbonrd. 1 his is clone lo connect tho Jumper wires easily.
piJlS all
VV
t
.
,I
(
Figure: Shields
It is also possible to build customized shields so that easy-to-use and robust Arduino add-ons can be created.
Sensors are now a days becoming ubiquitous.Various technologies such as networking, communication, miniaturization
etc., contribute to the success of sensing paradigm. The~ are now becoming small in tenns of size to easily dispose, disappear
and deft. So sensors which_are of low cost, power and memory systems are becoming persuasive, pervasive and penetrative. They
are now becoming smart there by conserving and preserving battery to _extend its lif~. _
Toe smart sensors can buffer and transmit data and are mainly useful for environmental and asset monitoring. A network
of sensors, electronics, mobiles etc., is created to gather data and deposit in central repositories for posterior processing which
illustrated below, ·
Technologies Applications
..-----. '
Cooperative Femtocell LTE/WiMAX IPTV, VoIP, DVB group
Networks Networks multicast management, location-based service
The sensors have now become ,ery important in daily life. They are interco~nected to extract data from devices:;.
frum sens-ors to renlote control S'-'ste1ns . e, brokers, connectors, drivers, sensor
The mi·ddlewar gateways, controllers
d e1c.,~ait
• J . • . • h
moorpora~ed to gather and transmit the data . The frameworks and platforms are used for increasing t e spee of sensor-cl
. · actuall Ydepends upon ser.s\
· Actuation
. to ac-cumulate data in centralized location allowing cloud based data analytics. a~
.mtegrauoo.
B~-&..--tuators and sensors execute depending \lPon se~or findings and are the imPortant participants for~ smart enviro~
They rece1,·e sensor value based on which they respond. Integrating sensors and actuators the~efore plays important ParttoS'i
and sustain sm&~ environments. · . ·
The wireless sensor network (WSN) is a type of network built.by huge nu~ber of senso~ nodes. Each node has a sensor for
detecting various physical phenomena like light, heat,·pressure, presence and gas. The WSN is one of the revolutionary informatior1
1