[go: up one dir, main page]

0% found this document useful (0 votes)
215 views24 pages

IOT Unit 1 (Nirali)

Iot book

Uploaded by

siddhimulik901
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF or read online on Scribd
0% found this document useful (0 votes)
215 views24 pages

IOT Unit 1 (Nirali)

Iot book

Uploaded by

siddhimulik901
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF or read online on Scribd
You are on page 1/ 24
luna =1 SENSORS, ACTUATORS, IoT & IoE TSENSOR sensors are used fOr {1 ensing things and devices etc le output in response toa specified measurement rts it into a signal suitable for process! 1 to detect the presence of a particular physical quantity. ble form like changes in ch 1 device that provides 2 usa ing (eg. electrical, mechanical, attains 2 phy ‘e characteristics of any device or ysical parameter and conv material Jn is converted to a human-readal ‘The sensor jaracteristics, optical th ut of the sensor is a signal whic +The out scitance, impedance etc. changes in resistance, CaP Transducer: ‘transducer converts a signal from one physical structure to another. Itconverts one type of enera itmight be used as actuators in various systems yy into another type. 1A Sensors Characteristies —____— 1. Static 2. Dynamic 1. Static Characteris itis about how the output of a sensor changes in response f0 2” input change after steady state condition. ult close to the true valve of the measured quantity. It (Accuracy: 1e output compared to 2 «Accuracy is the capability of measuring instru measures errors. It is measured by absolute a higher prior system. Absolute error = Measured value - True value Measured value True value iments to give a res rnd relative errors. Express the correctness of th Relative error = (iy Range: + Gives the highest and the lowest value of the physical these values, there is no sense or no kind of response. erature has a range of -200°c to 800°. quantity within which the sensor can actually sense, Beyond €g. RTD for measurement of temps i) Resolution: * Resolution is an important specification the accretion is zero, iti called threshold n towards selection of sensors. The higher resolution, better the precision. When + Provi * Provide the smallest changes inthe input that a sensor sable to sense (iv) Precision: * tis the capacit pacity of @ measuring instrument to give the same reading when repetitively measuring the same quantity Under __nder the same prescribed conditions - qa » MODERNIZED IoT (BE E&TC) SENSORS, ACTUATORS, tot & op ‘= It implies agreement between successive readings, not closeness to the true value. — Pneumatic > Hydraulic > Electric > Thermal > Magnetic + We will dive deeper into these below, However, now we have defined what an actuator is, let's look at the difference between this and an IoT sensor. What's the Difference Between Sensors and Actuators in IoT? ‘© Essentially, an actuator creates movement, whereas a sensor monitors environmental conditions. These conditions may include fluid levels, temperatures, vibrations or voltage. + The main characteristics between sensors and actuators can be broken down further into the following: > Electrical Signaling: Actuators measure heat or motion energy in order to determine the resulting action. On the flipside, sensors work through electrical signaling to read the environmental conditions and perform their assigned task > Conversion Direction: An actuator converts an electrical signal to a physical action. A sensor does the opposite, converting a physical attribute to an electrical signal. > Inputs and Outputs: Actuators track the outputs of machines and systems, whereas sensors look at the inputs from the environment. 1.2.1 Different Actuator Types in IoT © Now we have looked at what separates actuators from sensors, we are going to go deeper into the different actuators con the market and the function they serve. 1. Hydraulic Actuators * The sole function of an actuator that’s used in a hydraulic control system is to convert the hydraulic energy supplied by the pump and processed by the control elements into useful work + Actuators have either a linear or rotary output. _SENSORS, ACTUATORS, tor 4 MODERNIZED ToT (BEERTC) 2. Pneumatic Actuators , f compressed air ~ int + A pneumatic actuator is a device that converts energy ~ typically in the form of compr 1 mechan, motion, + Pneumatic actuators are notable in their use for applications where the opening and closing of valves takes place», this reason, they hold value within applications where there is a fire oF ignition risk. pneumatic actuators are also known inthe industry by several different monikers, including Pneumatic cylinders > Air cylinders > Air actuators 3. Electrical Actuators + Anelectric actuator converts electricity into kinetic energy in either a single, linear or rotary motion. The motor of an electric actuator can operate at any voltage, however, the most common voltages used are: > 230 VDC > 208 VDC 115 VAC 24 VAC 24.VDC 12voc They are typically used in industrial applications associated with manufacturing valves, pumps and motors. vYyyyY | 4. Thermal Actuators | ‘A thermal actuator is a type of non-electric motor. It’s equipped with thermal-sensitive material that's capable dl producing linear motion in response to temperature changes. | When used alongside other devices, a thermal actuator doesn't require an outside power source to produce moti ‘Temperature changes can be used to perform tasks such as release latches, operate switches and open or close val® They can be used for many applications and in mary industries, including aerospace, automotive, agriculture, sola" building services. | in| 5, Magnetic Actuators ‘A magnetic actuator is a device that uses Micro Electro Mechanical Systems (MEMS) to convert an electric curren a mechanical output. They operate in either a rotary or linear direction and can have continuous or limited motion, Magnetic actuators ** used within the aerospace, automotive industry, healthcare, computers and many other inlostves. r industries. 6. Relay Actuators A relay is an electrically operated switch. The majority of relays use electromagnets to mechanically operate # schanically However, other operating principles can also be used, for example, solid-state relays It takes a relatively small amount of power to operate a relay coil. That bei ter ing trol heaters, lamps or AC circuits. '9 So, it can still be used to con’ ]ODERNIZED ToT (BE E&TC) eo) SENSORS, ACTUATORS, lot & of .2.2 Working of Actuators It is basically a motor that converts energy into torque. This torque controls a mechanism or a system where the actuator has been incorporated. It helps in introducing or preventing the motion. It runs on electric or pressure. The control system can be controlled mechanically or electronically, software driven or human operated. They work because of the work done by the rotor and stator assemblies, also known as the primary and secondary windings within the motor. Voltage is applied to the primary assembly which results in inducing the flow of current to the rotor assembly or the secondary winding. The interaction of these two creates a magnetic field which results in motion, The working of actuators differs slightly based on their types. Pneumatic actuators work using the pressure of air and hydraulic actuators work using liquid pressure. A valve drive can simply be defined as a black box with a signal or a power supply via air or oil pressure that creates @ stop for the valve movement as an output. The quality of a valve depends on many parameters such as metallurgy, mechanical resistance, machining, etc. The performance of a valve is highly dependent on its actuator. Itis important to consider the factors you are considering: frequency of operation, ease of access and critical features. [13 BASIC IloT FUNDAMENTALS, CONCEPTS AND TERMS The four pillars of loT and the main concepts to understand are: (i) Data: loT technologies provide myriad ways to collect data about the physical world. Data is the fuel of IoT that's why itis so important. (ii) Device: The actual, physical components or things in the internet of things that collect this data. ‘Analytics: The process of making collected data useful by turning raw data into actionable insights (iv) Connectivity: Makes sharing data and insights possible, increasing the value of that data, This Is the internet in internet of things. [1.4 NETWORKING BASICS * Letus understand functional description of 7 layers of IoT protocol stack as shown in the Fig. 1.1 | ‘Application ayer Layer6 —| ‘User experience layer Layers —| __ Sessionimessage layer Layer —»| RF layer Layer3 —o[ Hardware Interface layer Layer2. —+| Processing and control action layer Layer’ —»] __ Physical or sensor layer Fig, 1.1: oT Protocol Stack Layers «oT stack consists of following seven layers viz. Sensor layer, processing/control layer, hardware interface layer, RF layer. session/message layer, user experience layer and application layer. 1. IoT Stack Layer 1: Physical or Sensor Layer: i ts are mainly ith physical components. The physical componen + Similar to 0: ical layer, this loT layer 2 interfaces wi one n vail The sensors are used for sensing of various parameters as Pe application of use. There are [ ae sone na for same functionality and hence appropriate selection ‘of sensor is done based on cost and quality. which provides sensed data to IoT stack for further processing DERNIZED foT (BE ESTO) 1.6) __ SENSORS, ACTUATORS, toT aj, mot D1 2. IoT Stack Layer 2: Processing and Control Layer : at this layer, Microcontroller/Processor and operating syste * Th ided by layer-1 using sensors are processe a oy ‘aa tole at thie aye Various development kits can be used for this purpose such as Arduino, NodeMCU (bace en ESP32 or ESPS266), ARM, PIC etc. Typical operating systems used are Android, Linux, 1OS etc 3, ToT Stack Layer 3: Hardware Interface Layer : + This layer include components or interfaces used for communication such as RS232, RS485, SPI, 12C, CAN, SCI etc tion at various baud rates in synchronous/asynchronoys These interfaces are used for serial oF parallel communi modes. The above mentioned interface protocols ensue flawless communication. 4. ToT Stack Layer 4: RF Layer : + This radio frequency layer houses RF technologies based on short range or long range and data rate desired by the application of use. The common indoor RF/wireless technologies include Wifi, Bluetooth, Zigbee, Zwave, NEC, RFID etc, The common outdoor RF cellular technologies include GSM/GPRS, CDMA, LTE-M, NB-IoT, 5G etc RF layer does communication of data using radio frequency based EM waves. There is another technology which uses light waves for ata communication, This light based data communication is referred as Lifi. 5. IoT Stack Layer 5: Session/Message Layer : + This layer deals with various messaging protocols such as MQTT, CoAP, HTTP, FTP (or Secured FTP), SSH etc. It define: how messages are broadcasted to the cloud. Refer architectures of MQTT protocol and CoAP protocol 6. loT Stack Layer 6: User Experience Layer : ‘+ This layer deals with providing best experience to the end users of IoT products. To fulfil this, this layer takes care o rch Ul designs with lots of features. Various languages and tools are developed for the design of GUI intertace softwares. These include objected oriented and procedure oriented technologies as well database languages (DBMS SQU in addition to analytics tools. 7. oT Stack Layer 7: Application Layer : ‘This layer ubilzes rest of the six layers in order to develop desired application. The typical case studies or application of oT are as follows > Smart Home > Smart Parking System based on zigbee, LORaWAN and other wireless technologies = Sman Energy System refer Smart Grid Architecture > Sman City > Smart lighting system based on zigbee standard Smen Retail = Sman Agnculture farming Waste Management = °° © © RAID (radio frequency identification) is a form of Areless Communication that incorporates the use of electuamagnetit animal ot persor ee 1.5.1 How Does RFID Work? * Every RFID system consists of Mew Components 9 scanning antenna, 4 tansceiver and a the scanning antenna and Wansceiver are combined. they ate teleLses to 45 an REO ve verona ne ‘der or interrogator There are O¥ RHO veader 1s a network adio waves 1o Wanseit types of RFID read portable of permanently attach sends a wave back to the ante s fixed readers and mobile readers 1 connected device that can be sus fa nals that activate the tag Once activated, the 2 na where its translated into data = — [MODERNIZED IoT (BE E8TC) an SENSORS, ACTUATORS, oT 8 1oE_ ‘he transponder is in the RFID tag itself. The read range for RFID tags varies based on factors including the type of tag, type of reader, RFID frequency and interference in the surrounding environment or from other RFID tags and readers. ‘Tags that have a stronger power source also have a longer read range 41.5.2 What are RFID Tags and Smart Labels? FID tags are made up of an integrated circuit (C), an antenna and a substrate. The part of an RFID tag that encodes identifying information is called the RFID inlay. ‘There are two main types of RFID tags: (ii) Active RFID: An active RFID tag has its own power source, often a battery (ii) Passive RFID: A passive RFID tag receives its power from the reading antenna, whose electromagnetic wave induces a current in the RFID tag's antenna, ‘There are also semi-passive RFID tags, meaning a battery runs the circuitry while communication is powered by the RFID reader. Low-power, embedded non-volatile memory plays an important role in every RFID system. RFID tags typically hold less than 2,000 KB of data, including a unique identfier/serial number. Tags can be read-only or read-write, where data can be added by the reader or existing data overwritten. ‘The read range for RFID tags varies based on factors including type of tag, type of reader, RFID frequency and interference in the surrounding environment or from other RFID tags and readers. Active RFID tags have 2 longer read range than passive RFID tags due to the stronger power source. ‘Smart labels are simple RFID tags. These labels have an RFID tag embedded into an’ adhesive label and feature @ barcode. They can also be used by both RFID and barcode readers. Smart labels can be printed on-demand using desktop printers, where RFID tags require more advanced equipment. 1.5.3 Components of RFID Technology ‘RFID technology consists of four components such as RFID tags, antenna, RFID receiver (transceiver) and software. ‘Antenna Electronic ‘microchip 1.2: Youtube RAID Tag RFID tags are small devices consists of an electronic microchip embedded inside and an antenna, The microchip has the unique identification number of the RFID tag. Passive RFID tag does not have a power source; it will receive power from radio signals transmitted from the RFID receiver, These tags will operate when the reader is atthe proximity of the tags (line of sight not required) Antenna coil will act as power source and medium to transfer data to the reader Types of Tags (i) Passive Tags: Does not have a power source, uses power from the reader to operate. (i) Battery Assisted Passive Tags: Logic circuit chip uses battery power. Need RF signals from the reader to activate and function, (ii) Active Tags: Uses @ power source like battery, does not require power from source/reader SENSORS, ACTUATORS, tot MODERNIZED IoT (BE E&TC) leg 2. Antenna in which it operates, + RFID antennas are designed to operate at a specific frequency for each applications ps The i onit. antennas are often mounted on the RFID reader and easily accessible for tags to tap Low frequency High frequency Ultra high frequency SB) Fig. 1.3 In some handheld devices, antenna is often attached to the device. Size and shape of the antenna depends on the application and the operating frequency of the system. 3. RFID Reader BHD reader is one of the significant hardware component in the RFID system which read information from the RFI) devices/tags and connected to the network to transfer the information to the database. Specification of RFID Reader Frequency: Operating frequency is one of the specifications of the RFID reader, | Frequency Band Range Data Rate LF 120-160 kz 10cm Low HF: 19.56 MHz atm | Lowto moderate HF: 433 MHz 1-400 m Moderate Un: 965-868 MHz | 112m | Moderate thigh 902-228 Mz microwave: 2450-5800 MHz 12m High | Microwave:31-10GH2 | uptoz00m | High | 4. Software * RFID technology uses specific software depends on service providers. This software controls the RFID reader, initiate scan and retrieve information from the tags and stores the information to a local computer or send to the clout storage ‘+ RFID tags can be erased and re-used using control software, How RFID Works? Electromagnetic field Franspunrteg —\\ es coupling SuPlind Power Power Data, Data MODERNIZED oT (BE E&TC) as) SENSORS, ACTUATORS, loT & IoE RFID technology works based on the principle of inductive coupling which include a source antenna and receiver antenna. Each RDID tag will have a microchip which contains a unique identification number, model, manufacturing date, expiry date, access information etc. 1s RFID reading is a process of accessing information of a tag using a reader. When the user initiates a scanning, the tags are placed near the RFID reader or vice versa. «RFID reader sends radio frequency signals using it's antenna, small coils embedded on the RFID tag pick up the signal from the reader and activate the tag (in passive tags) by powering it «+ Once the tag is activated, it starts to transmit data back to the reader using the same antenna coils using inductive coupling (backscatter coupling) method. [1.6 WIRELESS SENSORS NETWORK Overview of Wireless Sensor Networks «Awireless sensor network is a network of many sensor nodes arranged in different patterns, to monitor environmental conditions, such as temperature, sound, pressute, motion, vibration, pollution or physical movements, They then cooperate to transmit the data over the network, to a place for analysis or storage. You can see some of their © Router configurations below. Star © End node ‘© Coordinator Digimesh Zigbee Peer to peer mesh Fig. 1.5: The main configuration types of wireless sensor networks «There are two main types of sensor nodes, battery-powered oF natural-powered, most of which use solar energy. The sensor nades can only travel a few tens of meters, so the network nodes will forward the data from the sensors to the gateway from the cloud. Since iti @ wireless sensor network, they will be communicated over the internet, Data in this network is transmitted in many steps to reach the destination Base station @® Wireless sensor network » MODERNIZED lof (BE E&TC) SENSORS, ACTUATORS, for a, 1.6.1 Benefits of Wireless Sensor Networks ~ £0. with your use of a wired sensor network, installing a wireless sensor network brings more benef don't need to spend money on wires, You also have no limitations in installing wireless sensors becay, -m anywhere. Optimal Cost: Installation costs ma expanding the system, costs are opti First of all, you it’s simple, you can place ther 'y be more expensive than if you installed a wired system, but when maintaining g timized when you use a wireless sensor network Easy Maintenance: In addition to saving on maintenance fees, thanks to the battery- or solar-powered sensors, enery, qramtenance for them is easy. When a node fails, you only need to replace it, thanks to the nature of this network i, the nodes work independently of each other and only connect wirelessly. Security: These network application projects are those that put security first. From smart home to the commercs center, government office or a smart city. Thanks to the internet connection which is the evolution of wireless networ; like 5G technology, data is transmitted with low bandwi idth and high speed allowing us to implement many effecte security measures. * High Flexibility and Scalability: Wireless sensor networks have never been used only for large areas. They are ju Superior to other types. If you want to set it up for your office, it is quite possible that the model type has a lot ¢ flexibility. When expanding, you simply add the node at the position you want. Let's take @ look at some real-life examples. * Wireless Sensor Network (WSN) is an infrastructure-less wireless network th: iat is deployed in a large number c!| wireless sensors in an ad-hoc manner that is used to monitor the system, physical or environmental conditions. ‘Sensor nodes are used in WSN with the onboard processor that mana ‘Ges and monitors the environment in a partiul | area. They are connected to the Base Station which acts as a processin 19 unit in the WSN System. Base Station in a WSN System is connected through the internet to share data Sensing region Base station Tread Sensor noe Fig. 1.7 © WSN can be used for processing, analysis, storage and mining of the data. | Applications of WSN: ‘+ Internet of Things (oT) | «Surveillance and Monitoring for security, threat detection. «Environmental temperature, humidity and air pressure © Noise Level of the surrounding. + Medical applications like patient monitoring, © Agriculture © Landslide Detection odeRN! paler quality of service ED 1oT (BE E&TC) aa) SENSORS, ACTUATORS, loT & lof .ges of WSN: security issue 1 Energy efficiency Network throughput + Performance ‘bility to cope with node failure ross layer optimisation «+ Scalability to large scale of deployment 1.6.2 Components of WSI Sensor «Sensors in WSN are used to capture the environmental variables and which is used for data acquisition. Sensor signals are converted into electrical signals. Radio Nodes: 4 Ieis used to receive the data produced by the Sensors and sends it to the WLAN access point. It consists of @ microcontroller, transceiver, external memory and power source. WLAN Access Point: + Itreceives the data which is sent by the Radio nodes wirelessly, generally through the internet. Evaluation Software: +The data received by the WLAN Access Point is processed by software called as Evaluation Software for presenting the report to the users for further processing of the data which can be used for processing, analysis, storage and mining of the data |1.7 CHARACTERISTIC OF IoT According to the definition of Io, it is the way to inter-connection with the help of the internet devices that can be embedded to implement the functionality in everyday objects by enabling them to send and receive data. Today data is everthing and everywhere. Hence, IoT can also be defined as the analysis ofthe data generate a meaning actin triggered subsequently after the interchange of data. JT can be used to build applications for agriculture, assets tracking, energy sector, safety and security sector, defence, embedded applications, education, waste management healthcare product, telemedicine, smart city applications, etc. ‘There are the following characteristics of loT as follows: * Connectivity: Connectivity isan important requirement of the IoTinfestructure. Things of IoT should be connected to the lof infrastructure. Anyone, anywhere, anytime can connect this should be guaranteed at all times. For example, connection between people through internet devices like mobile phones, and other gadgets, also connection between Internet devices such as routers, gateways, sensors, etc. 1m the generated data is very important. For example, a has a unique ro if itis interpreted properly. Each IoT a tt and at times for querying its status. Intelligence and Identity: The extraction of knowledge Sensor generates data, but that data will only be useful identification is helpful in tracking the equipme”' ot zone is increasing day by day. Hence, an ToT setup should a generated as an outcome is enormous and it should be ‘ The number of elements connected to the | * capable of handling the massive expansion. The 42 handled appropriately, MODERNIZED 1 7 Id_ dynamically rk in ei * Dyna and Self-Adapting (Complexity): IoT devices shoul It should be adaptable to work in Sifter contexts and scenarios, Assume a camera meant for the surveillance. Conditions and different light situations (morning, afternoon, night) Architecture: [oT archite manufacturers’ products when multiple domains SENSORS, ACTUATOR: Le aig (eer gay ____— “et adapt themselves to the chang, forid, supporting differs, It should be byt ; c be homogeneous in nature oe tfunton hh thea lt wnt comed by anyone engineeing : ‘ome together. Safety: There is a danger of the sensitive personal he ing compromised when alll his/her d Sit I details of the users getting c i evice are connected to the internet. Thi iscan cause a loss to the user. Hence, data security is the major challenge Besides In cause a los: us 5 is also critic Ssuipment involved is huge. 1oT networks may also be atthe risk. Therefore, equipment safety 7. Physical Design of loT dd to build an ig) The physical design of an loT system is referred to as the things/devices and protocols that are use eae 2 sci. all these things/devices are called node cevices. Every device has a unique identity fis a Node anc uating and monitoring work and the protocols that are used to establish communicatio Node devices and servers over the intemet, Physical design of loT 1.8 PHYSICAL DESIGN OF IOT io Things Protocols Fig. 1.8: Physical design of loT Things/Devices * _Things/Devices are used to build a connection, process data, provide interfaces, provide stora: ge and provide graphic interfaces in an 1oT system. All these generate data in a form th, 'at can be analyzed by an analytical system and prograr to perform operations and used to improve the system. * For example temperature sensor that is used to analyze the temperature generates the data from a location and is the: determined by algorithms, | Connectivity Processor | | Auslo/Video YO interfaces | (for sensors, | USB host PU HOM actuators, ete) 3.5mm aud er RJ45/Ethemet_ — UART RCA video Memory interfaces Graphics Storage intertaces| NANOINOR Pu sz] MMC [poR ORAS MODERNIZED fo (HE ker) (133) SENSORS, ACTURTONS, Wik & Jot Processor +A processor like a CPU and other units ave used to process the data, Theses data are further used to ingece the decision quallty of an lot systern, nudio/Video Interfaces + Aninterface like HDMI and RCA devices bs used to record audio and videos i a system Input/Output interface + Togive input and output sig “Lo senvors and actuators vir 1 1 thingy ke VARI, SH, CAN, ete storage Interfaces + Things like SD, MMC and SDIO are used to store the data generated from an lol device, ‘+ Other things like DDR and GPU are us 1.8.1 loT Protocols id to control the activity of an lot aystern, + These protocols are used to establish communication between a nod send commands to an lol device and receive data from an lol des protocols that are present on both the server and client-side and thes application, transport, network and link laye Ind a server over the internet Ithelps to the internet, We use different types of protocols are managed by network layers like Application layor ia CoAP WobSockets MOTT MPP. DOS. AMOP ‘Transport layor TP] Cor Notwork layer IPv4 IP V6. BLOWPAN. Link ayer 602.3 - Ethernet | [ 802.16 - WiMax 2G/3G/LTE- Collviar 202,11 - WIFI | [(002.15.4- LR-WPAN Fig. 1.20 Application Layer Protocol * In this layer, protocols define how the data can be sent over the network with the lower layer protocols application interface. These protocols include HTTP, WebSocket, XMPP, MQTT, DDS and AMQP protocols. HTTP * Hypertext transfer protocol is a protocol that presents in an application layer for transmitting media documents, It is used to communicate between web browsers and servers. It makes a request to a server and then waits til it receives a "esponse and in between the request server does not keep any data betwen two requests WebSocket This protocol enables weon a client and a host that can be run on an untrusted code in a two-way communication between 9 ¢ controlled environrnent, by web browsers his protocol is commonly used by We SENSORS, ACTUATORS, 101 ay io, MODERNIZED IoT (BE E&TC) asa) “ messaging transport, + It is a machine-to-machine connectivity protocol that was designed as a publish/subscribe ging transport. i, Used for remote locations where a small code footprint is required. Transport Layer F protocols pr * This layer is used to control the flow of data segments and handle the error control. Also, these layer pi Provide end-to-end message transfer capability independent of the underlying network * The transmission control protocol is a protocol that defines how to establish and maintain a ne at can exchange data in a proper manner using the internet protocol upp A user datagram protocol is a part of an internet protocol called the connectionless protocol. This protocol is not required to establish the connection to transfer data Network Layer * This layer is used to send datagrams from the source network to the destination network. We use IPv4 and IPve Protocols as host identification that transfers data in packets Ipva * This is @ protocol address that is a unique and numerical label assigned to each device connected to the network AnB address performs two main functions host and location addressing, Iva is an IP address that is 32-bit long. IPv6 Itis a successor of IPv4 that uses 128 bits for an IP anticipated problems. Link Layer address, It is developed by the IETF task force to deal with long + Ce Uet Protocols are used to send data over the network's physical layer. It also determines how the packets are coded and signaled by the devices Ethernet WiFi * The logical design of an IoT 5 the low-level specifies of impl to implement a system, * But before you learn about the lo gical design of 1oT systems you need to know lor. ‘Title bit about the physical design of Logical Design of Internet of Things(tor) 1. IoT Functional Blocks 2. lot Communication Models 3._ lot Communicz ion APIs [ODERNIZED 1oT (BE ETC) as) SENSORS, ACTUATORS, IoT & IoE 1, lot Functional Blocks + AnloT system consists of a number of functional blocks like Devices, services, communication, security and application that provide the capability for sensing, actuation, identification, communication and management. Application Services Management Security ‘Communication Device Fig. 1.11 «+ These functional blocks consist of devices that provide monitoring control functions, handle communication between host and server, manage the transfer of data, secure the system using authentication and other functions and interface to control and monitor various terms. Application + Itis an interface that provides a control system that use by users to view the status and analyze of system. Management + This functionel block provides various functions that are used to manage an [oT system Services + This functional block provides some services like monitoring and controlling a device and publishing and deleting the data and restoring the system Communication + This block handles the communication between the client and the cloud-based server and sends/receives the data Using protocols. Security + This block is used to secure an IoT system using some functions like authorization, data security, authentication, 2-step verification, ete Device . 4 monitoring control functions that collect data from the outer These devices are used to provide sensing an: environment. ToT Communication Models ‘an IoT system that is used to communicate between the system There are sever Js available in derma a eae weribe model, push-pull model, exclusive pair model, etc and server like the request-response model, publish-sub: Request-Response Communication Model client sends the request for data to the server and the server This model i which a cece ives a request it fetches the data, retrieves the resources and "esponds according to the request, When a server rece NO - Prepares the response and then sends the data back to the | Resources request Uupffetches peed (nese te ||eeources preparos. Fesponge and Sonds response, to clionts, Fig. 1.12: Request-Response communication model + In simple terms, we can sa of the client. In this model Example ¥ that in the request-response model server send the response of equivalent to the reque, HTTP works as a request response protocol between a client and server. * When we search a query on a browser then the browser submits an HTTP request to the server and then the sere returns a response to the browser(client), ‘Communication Model In this communication model, we have a broker be:ween Publisher and consumer. Here publishers are the source data but they are not aware of consumers They send the data managed by the brokers and when s consume Subscribes to @ topic that is managed by the broker and when {he broker receives data from the publisher it send, data to all the subscribed consumers the Publisher Sends messages, to topies Fig.1.13, Example On the website many times we si managed by some third-party and then the broker sends the: ubscribed to their newste Hers using our ery, Services and when a ‘we article Se New data oF posts to all the al 's published on the subscribers address, These email website ‘sil addresses 3 itis dire tly sent to the broke (Gil) Push-Pull Communication Model + Itis a communication model in which the the queues, Here also producers data push by the Producers i are not aware 4 qUeU6 and the of the consumers, the Sonsumers pull the data fro" SENSORS, ACTUATORS, IoT & IoE > Consumer 4 Publisher | Message Message Send messages | pushed to piled from toqueue | queues quoues, ‘Consumer 2 Fig. 1.14 : Push pull model Example When we visit a website we saw a number of posts that are published in a queue and according to our requirements, we click on a post and start reading it. (iv) Exclusive Pi Communi n Model + Itisa bidirectional fully duplex communication model that uses a persistent connection between the client and server. Here first set up @ connection between the client and the server and remain open until the client sends a close connection request to the server. Request t setup connection | | Response accepting the request ‘Message from client to server Client [Message from server to client | Server 3. ToT Communication APIs «These APIs like REST and WebSocket are used to communicate between the server and system in IoT. REST-Based Communication APIs + Representational state transfer(REST) API uses a set of architectural principles that used to design web services. These APIs focus on the systems’ resources that how resource states are transferred using the request-response communication model. This API uses some architectural constraints. Client-Server + Here the client is not aware of the storage of data because it is concerned about the server and similarly the server should not be concerned about the user interface because it is a concern of the client. And this separation is needed for independent development and updating of server and client. No matter how the client is using the response of the server and no matter how the server is using the request of the client. Stateless * It means each request from the client to the server must contain all the necessary information to understand by the server, Because if the server can't understand the request of the client then it can’t fetch the request data in a proper manner. Cacheable * In response, ifthe cache constraints are given then a client can reuse that response in a later request. It improves the efficiency and scalability of the system without loading the extra data * AREST{ul web APIs is implemented using HTTP and REST principles. ee elC——e—eeseseseee WebSocket Based Communication API 7 + This type of API allows bi-directional full-duplex communication DONT oe communication model. This API uses full-duplex communication $0 IF °° pet time when it requests new data. WebSocket API begins with a conne=tON it the st the WebSocket is supported by the server then it responds back t0 thE | 1 setup of a connection server and the client can send data to each other = + This type of API reduces the traffic and latency of data and makes sure that ea cannot terminate the request. [1.10 IoE ©The term “the internet of everything” is relatively rew, that’s why its applic: analysts and research firms often view IoE as the next stage of IOT. MODERNIZED IoT (BE E&TC) d client using the exclusive », a new connection setup e., ween server aN quire jeen the server and client ang uccessful response after. mode. et when we request new data; ‘ation may cause confusion. Technolog, + As for the term “the internet of everything,” it was introduced several years later to offer a broader view of inter connectivity. Numerous sources state that the tem was coined by Cisco, but the company itself denies tha, information. They claim that several technology companies, including Gartner and Qualcomm, started to use that wor ‘combination independently at approximately the same time as Cisco did. + Io is an extension of oT and is a term that refers to consumer products and devices that connect to the internet and have expanded digital features, It is an entire ecosystem where everything is inter-connected. Thus, IE is a wide concept that includes not only machine-to-machine communication (M2M) but also people to machine (P2M) ant People to people (P2P) communication through technology. While the M2M connection is always important, IoE places emphasis on the other two types of communication People-to-people (P2P] Peoptete-macnine (People (Pam Business Machine-to. machi (wayne Fig. 1.16:tnternet of everything The Fig. 1.16, visually represents the internet of interconnected, they play some separate roles. The connect to each other or people. The internet of components of everyday life as we currently know it things vs. the inte internet of things everything has a Met of Mainly encee*"9. While they are hist broader seo, ™PASSes devices and how the! © and im enti People-to-machine and the backward ma ee chine-o-people commu Turning on the lights or typing on a keyboar ne nicat rd are some common exe a camp Pewee a human and a de les of PK, i technology is a type of ¢ s Man uses connected devie® ee tances. A basic example ® MODERNIZED 1oT (BE E&TC) (2.19) SENSORS, ACTUATORS, loT & oE «To get a better idea of how loT relates to lof, let's illustrate it with an analogy from life. Imagine that “the internet of things" is @ road with cars, buses and other vehicles driving on it. Then, “the internet of everything” is the entire road system comprising of vehicles, drivers, pedestrians, traffic signals, crossroads, weather conditions, etc. To put it simply, JoT is 2 part of 10€ and a crucial one. Without IoT, the whole idea of lot is meaningless, + Overall, the 1oE market is estimated to grow at a CAGR of 15% and reach US$39 trillion by 2024 according to the Market Research Engine predictions, The Four Pillars of the Internet of Everything To better explain the IoE concept, it's important to understand the four essential components that constitute the internet of everything 1, Things + Things are the building blocks of both IoT and lof. By “things,” we mean connected objects that gather information about their status through sensors and share this information with one another over the internet. The number of internet-connected things is growing year by year and IDC expects it to reach 41.6 billion by 2025, In IoT, connected things can be various devices from consumer gadgets to water pipes. In lof, almost every physical object can be a connected thing: from cows to monitor their health and track movements to milk cartons to manage their supply chain. Anything that is equipped with sensors and linked over public or private networks becomes part of lof. 2. People People are integral to IoE since no intelligent connection is possible without them. All in all, lof is made by people and for people: humans use connected devices every day, analyze data and harness the potential of data insights. * People not only play an essential role in P2M and P2P communication, but they may also become connected themselves. In healthcare, specialists can place sensors under patients’ skin or on the body to get information on a person's vital signs for a better quality of patient care and treatment service. In this case, people act as nodes in the M2M communication process. 3. Data Data is yet another core component of IoE. IDC made yet another prediction of connected devices producing 79.4 28 of data in 2025 and this number will continue to increase exponentially every year. Currently, internet users generate about 25 quintillion bytes of data each day, For most of us, it's hard to imagine how much information that is. As the number of data sources and volumes grow, data management and analysis become more vital than ever before Data alone is useless, but when it's combined with thorough analysis, it helps bus decisions, nesses Make faster and smarter 4. Process Last but not least, process is a major JoE component. It determines how each ia ca above works with the ie to provide greater value in the digital world. When a connected thing sae te 9 ht data ee the right Person at the right time, the process is successful, The process isa linchpin of lof connectivity that allows for creating New opportunities across industries. work, Wired (the internet) oF wireless (LoRaWAN) networks One more important wi intioning, @ net Ce eer erere gerne Memon, jetworks, there is no LOT or lof ances. Without make it possible for billions of devices to communicate over distance RS, ACTUATORS, to MODERNIZED 1oT (BE E&TC) 0.20) _SENSORS, ACTUATORS. 1oT 4, | 1.11 IoT VS IoE me = - Internet of Things (107) 1 | Thetem lf i eared by cisco, The term oT coined b atProcter and Gamble. " 2. | 1o€ is the intetigent connection between peopl, process data and | fois he network of physical devices whef® collection ang | things by creating ‘web of tings whichis the next generation of | exchange of data occurs without human intervention | Serial No, 3 Kevin Ashton in 1999 during his wa internet. pe = 3. | The goal of lo i turing information nto actions providing dala | The goa of oT isto form an ecosystem of connected | based decision making and provide new capabilties and richer | objecs/physca device. Or to create an ecosystem experiences. connecting from Thing to Thing. . 4 In JoE, communication occurs between Machine to Machine, InloT, communication occurs between Machine to Machine Machine to People and technolagy assisted People to People. itis less complex than loE as loT(Internet of Things) is, considered as a part of Bigger loE ecosystem. Ithas one pillar things ie it focuses on physical objects only Itis considered as the subset of bigger Internet of Everything (loE) and loT is considered one generation before loE. 5 Itis more complex than loT as IoE includes loD (Internet of Digital), IoH (Internet of Human) and loT (Internet of Things), 6 Ithas four pillars people, process, data and things. 7. Itis considered as the superset for Internet of Things(!oT), along with oH, 1oD, communication technologies and the internet itself and itis considered a generation afte loT. 8 Example are Connecting roads with hospitals to save more lives, | Examples are Wearable health monitors, Connected Connecting homes for comfort living, connecting food and people | appliances, Aulonomous farming equipment, smarter energy in the supply chain, elderly care monitoring. ‘management systems, smart surveillance. Pillars of The Internet of Everything (IoE) + People: Connecting people in more relevant, valuable ways. = Data: Converting data into intelligence to make better decisions. Process: Delivering the right information to the right person (or machine) at the right time. Things: Physical devices and objects connected to the Internet and each other for intelligent decision making; oft called Internet of Things (101) 7 1.12 CONNECTING THE UNCONNECTED | eogrammed Configuration gives you the opportunity to adapt each technology tos ven rae nous oF Met have subtle differences. ach setting is li When it comes to programming, don't panic. This isn’t a programming course, but you will Se interesting and useful principles that apply when thirking about the lof, will be introduced to 5° 713 INTRODUCTION TO CONNECTING THINGS 1 Network engineering combines a range of different technologies. With different ‘ew, standards are required to ensure that they are all able to ¢ 1 standards and why we need them, what is a client s manufacturers and a multitude set “nmunicate and remain secure: " erver, ho i supports thelof - _ how cloud and fog computi™ systems old a ni 1n explores protocol MODERNIZED IoT (BE Ear, Es Wireless notebook x | To Inkjet printer computer Network printer Fig. 117 1.13.3 Connecting Things for Industries Industrial applications in the IoT require a degree of reliability and autonomy that is not as critical for the consumer environment, Some industrial applications require operations and calculations that happen too quickly to depend on human intervention, For example, if our smartphone fails to remind us of an appointment, it is inconvenient. If the braking system on a large mining truck fails, this can create catastrophic results for the individual and the organisation 1.13.4 The Converged Network and Things Many things are currently connected using a loose collection of independent, use-specific networks, as shown in the Fig. 1.18. As a result, they cannot be leveraged in the loE. For example, today’s cars have multiple proprietary networks to control engine function, safety features and communications systems. Converging these systems onto a common network alone would save over 23 kg (50 Ibs) of Cable in a modern full-size car. Other examples include commercial and residential buildings, which have various control systems and networks for heating, ventilation and air conditioning (HVAC), telephone service, security and lighting. These disparate networks will Converge to share the same infrastructure that includes comprehensive security, analytics and management Gpabiltie. As the components are connected to a converged network using [oy technologies eyes ‘More powerful as the full breadth of the loE is able to take advantage and help people improve their quality of life MODERNIZED IoT (BE E&TC) 20 2 networks Fig. 118 1.13.5 Need for Standards * When two devices communicate across a network, they must first agree on a certain set of predetermined rules protocols. Protocols refer to the rules of communication that devices use and are specific to the characteristics of th} conversation. In our day-to-day personal communication, the rules we use to communicate over one medium, ite telephone call, are not necessarily the same as the protocols for using another medium, such as sending a letter. = Protocols define the details of how messages are transmitted and received. Similar to how people use language communicate, protocols contain rules for how devices communicate. © A group of inter-related protocols that are necessary to perform a communication function is called a protocol sb Protocol suites help ensure interoperability between network devices. Individual protocols within a protocol suité be vendor-specific and proprietary. Proprietary, in this context, means that one company or vendor control t definition of the protocol and how it functions. Some proprietary protocols can be used by different organisations permission from the owner. Others can only be implemented on equipment manufactured by the proprietary vendo 1.13.6 Protocol Suite «© Networking protocol suites describe processes, such as: The format or structure of the message. ‘The method by which networking devices share information about pathways with other networks How and when error and system messages are passed between devices YYVYY ‘The set-up and termination of data transfer sessions, mented in hardware or software «protocol suites can be implemented in OF @ combination of nsile port of the processing to prepare data for transmission across the network both. Each layer is resP0" con networking protocol suites is known as 7 One of the most common wh ransmissic roto One ot ne estat communist aoe the IMernt mus us he eb gan CoNTe ato nee one the IP protocol from the Internet layer of the stack, 25 this allows them to Protocol suite, Specifically, they Send and rec the In ribes the rules that the TCP/IP protocol suite encompa ee 5se ean od «The TCP/IP model desc (ETF) defines the TCP/IP model. S. The Internet Engineering 1 CC SLEIEIS”YwYWS'SZ MODERNIZED IoT (BE E&Tc) SS rrTrr™r—r,TU—C——C.C=CFE§#EREE= 1.14 TRANSITIONING FROM THE INTERNET OF THINGS TO THE INTERNET OF EVERYTHING T already presen; +The lOT steady Presents a host of problems to companies, For starters, because of diferent application programming interfaces, i's often difficult to Get different objects talking to each other. But with the loE, these difficulties are even more challenging, «The biases Problem is getting all connected things to talk to each other using the same language. Though you might expect the language of data to be standardized, it's not, creating all sorts of cross-compatibility issues for those organization who want to make the move. +The solution here is to use the same protocols across all to another to communicate effectivel the Internet of Everything can be a ch: applications. One part of the system needs to be able to talk ly. But with competing standards and different sources of data, making sense of allenge. What's needed is an API that integrates the entire approach one another in a common language. Unfortunately, challenge. Every time a developer creates @ new produc and language. If a company wants to integrate that pr the code that will allow it to work seamlessly within its ~ a system where all data, devices and services can talk to given the way the current IoE landscape is set up, that’s a *, that product is designed as a standalone with its own features roduct into its application stack, it has to do the legwork, creating existing framework. Transitioning to the IoE from the Io, therefore, requires two fundamental changes. (i) Tt means ensuring that data are standardized - (for instance, rather than reporting in kilograms and pounds, architects need to choose one unit of measure and stick with i). (ii) New SaaS applications need to be written in such a way that everything else on the lof can talk to them, 1.15 BRINGING IT ALL TOGETHER Industry 4.0 is revolutionizing the way companies manufacture, improve and distribute their products, Manufacturers are integrating new technologies, including Internet of Things (IoT), cloud computing and analytics and Al and machine learning into their production facilities and throughout their operations. These smart factories are equipped with advanced sensors, embedded software anc robotics that collect and analyze data and allow for better decision making. Even higher value is created when data from production operations is combined with operational data from ERP, supply chain, customer service and other enterprise systems to create whole ew levels of visibility and insight from previously siloed information. This digital technologies lead to increased automation, predictive maintenance, self-optimization of process improvements and above all, a new level of efficiencies and responsiveness to customers not previously possible. Developing smart factories provides an incredible opportunity for the manufacturing industry to enter the fourth industrial revolution. Analyzing the large amounts of big data collected from sensors on the factory floor ensures real- time visibility of manufacturing assets and can provide tools for performing predictive maintenance in order to minimize equipment downtime. Using high-tech IoT devices in smart factories leads to higher productivity and improved quality. Replacing manual inspection business models with Al-powered visual insights reduces manufacturing errors and saves money and time. With minimal investment, quality control personnel can set up a smartphone connected to the cloud to monitor ‘manufacturing processes from virtually anywhere. By applying machine learning algorithms, manufacturers can detect Srrors immediately, rather than at later stages when repair work is more expensive. Industry 4.0 concepts and technologies can be applied across all types of industrial companies, including discrete and __Process manufacturing, as well as oil and gas, mining and other industrial segments, MODERNIZED tet (RE ESTE) 30) SHINSORS, ACTUATORS, 1, EXERCISE _ SS eee Re EXERCISE 2 Wet is sensor? 2 What are transducers? Expisin characteristics of sensor. Expiain in brief sensor classification. Explain types of actuators in lot, & Short note on four pillars of loT. 7. Explain Layer Stack of loT. & What is RFID? o Compare RFID Readers. ‘10. What are benefits of WSN? LL Write characteristics of IoT.

You might also like