IoT Unit 1
IoT Unit 1
By:
Manjunath C Lakkannavar
Assistant Professor, Dept. of ECE
Ramaiah Institute of Technology, Bengaluru – 54
Email: [email protected]
Mobile: +91-7411403673
OVERVIEW
Unit 1: Introduction & concepts
Unit 2: Developing Internet of Things, IoT Physical Devices and End Points
Unit 3: Smart Objects, IP as the IoT Network Layer
Unit 4: Data and Analytics for IoT, Securing IoT
Unit 5: IoT Case Studies
UNIT – I
Introduction & concepts: Definition and Characteristics of IoT, Things in IoT, IoT Protocols, IoT Functional
Blocks, IoT Communication Models, IoT Communication APIs, IoT Enabling Technologies, IoT Levels and
Deployment Templates, IoT and M2M, SDN and NFV for IoT, IoT System Management with NETCONFIG-
YANG
UNIT – II
Developing Internet of Things: IoT Platform Design Methodology, Specifications: Requirements, Process,
Domain, Information, Services, Level, Functional, Operational, Integration, Application Development
IoT Physical Devices and End Points: Basic Building Blocks of an IoT Device, Raspberry Pi, Linux on
Raspberry Pi, Raspberry Pi Interfaces: Serial, SPI, I2C
UNIT – III
Smart Objects: The “Things” in IoT, Sensors, Actuators, and Smart Objects, Sensor Networks, Connecting
Smart Objects, Communications Criteria, IoT Access Technologies.
IP as the IoT Network Layer: The Business Case for IP, The need for Optimization, Optimizing IP for IoT,
Profiles and Compliances, Application Protocols for IoT, The Transport Layer, IoT Application Transport
Methods
UNIT – IV
Data and Analytics for IoT: An Introduction to Data Analytics for IoT, Machine Learning, Big Data Analytics Tools and
Technology, Hadoop, HDFS, Mapreduce, Apache spark, Apache storm, Edge streaming, Network Analytics
Securing IoT: A Brief History of OT Security, Common Challenges in OT Security, How IT and OT Security Practices and
Systems Vary, Formal Risk, Analysis Structures: OCTAVE and FAIR, The Phased Application of Security in an Operational
Environment
UNIT – V
IoT Case Studies: Home automation: Supply of Gas and Water, Smart Meters, Smart lighting, Home intrusion detection;
Smart parking environment: Weather monitoring system, Weather reporting bot, Air Quality and monitoring pollutants,
Forest fire detection, Agriculture – Smart irrigation, IoT printer, VANET
REFERENCE BOOKS:
1. Vijay Madisetti and Arshdeep Bahga, “Internet of Things (A Hands -on-Approach)”, 1stEdition, VPT, 2014.
(ISBN: 978-8173719547) Edition, McGraw Hill Education, 2017.
2. David Hanes, Gonzalo Salgueiro, Patrick Grossetete, Robert Barton, Jerome Henry,"IoT Fundamentals: Networking
Technologies, Protocols, and Use Cases for the Internet of Things”, 1 st Edition, Pearson Education (Cisco Press Indian
Reprint).
Unit 1
• Introduction to IoT
• IoT and M2M
• IoT System management with
NETCONF-YANG
Outline
• IoT definition
• Characteristics of IoT
• Physical Design of IoT
• Logical Design of IoT
• IoT Protocols
• IoT Levels & Deployment Templates
• Difference between IoT and M2M
• SDN and NFV for IoT
• NETCONF
Definition of IoT
• Self-Configuring
Setup networking
Upgrade software with minimal user intervention
• Unique Identity
Monitor status
Query device
Control remotely
• The "Things" in IoT usually refers to IoT devices which have unique
identities and can perform remote sensing, actuating and monitoring
capabilities.
• IoT devices can:
• Exchange data with other connected devices and applications (directly or
indirectly), or
• Collect data from other devices and process the data locally or Send the data
to centralized servers or cloud-based application back-ends for processing the
data, or
• Perform some tasks locally and other tasks within the IoT infrastructure,
based on temporal and space constraints
• Eg: Mobile Phone
Generic block diagram of an IoT Device
• Link Layer
• 802.3 – Ethernet(10Mb/s to 40 Gb/s) – wired LAN
• 802.11 – WiFi (1 Mb/s to 6.75Gbp/s) – wireless LAN
• 802.16 – WiMax (1.5Mb/s to 1 Gb/s)
World wide interoperability for microwave access(multiple physical layer and
multiple MAC channels)
• 802.15.4 – LR-WPAN (40Kb/s – 250 Kb/s)
• 2G/3G/4G (9.6Kbps – 100Mb/s)
• Network/Internet Layer
• IPv4
• IPv6
• 6LoWPAN---2.4GHz, 250Kbp/s
• Transport Layer
• TCP- connection oriented, Reliable
• UDP- connectionless, used for time sensitive small data transfer
• Application Layer
• HTTP- Hyper text transfer protocol-TCP-request response(RR)
• CoAP- Constrained Application Protocol (M2M)-UDP-RR
• WebSocket- full duplex comm over single socket- CS
• MQTT- Message Queue telemetry transport- CS-pub/subs
• XMPP – extensible messaging and presence protocol- real time- CS-Server to
server
• DDS- Data Distribution Service- M to M- pub/subscribe
• AMQP- Advanced message queuing protocol – business messaging-
PP,Pub/sub
• Link Layer: Link Layer protocols determine how the data is physically
sent over the networks physical layer or medium(example copper wire,
electrical cable, or radio wave). The Scope of The Link Layer is the Last
Local Network connections to which host is attached. Host on the same
link exchange data packets over the link layer using the link layer
protocol. Link layer determines how the packets are coded and signaled
by the hardware device over the medium to which the host is attached.
• Request-Response is a communication
model in which the client sends
requests to the server and the server
responds to the requests.
• Publish-Subscribe is a
communication model that involves
publishers, brokers and consumers.
• Publishers are the source of data.
Publishers send the data to the
topics which are managed by the
broker. Publishers are not aware of
the consumers.
• Consumers subscribe to the topics
which are managed by the broker.
• When the broker receives data for a
topic from the publisher, it sends
the data to all the subscribed
consumers.
Push-Pull communication model
• Exclusive Pair is a
bidirectional, fully duplex
communication model that
uses a persistent connection
between the client and server.
• Once the connection is setup
it remains open until the client
sends a request to close the
connection.
• Client and server can send
messages to each other after
connection setup.
IOT Communication Application
Programming Interface (API)
REST-based Communication APIs
• Representational State Transfer (REST) is a set of architectural
principles by which you can design web services and web APIs
that focus on a system’s resources and how resource states are
addressed and transferred.
• REST APIs follow the request-response communication model.
• The REST architectural constraints apply to the components,
connectors, and data elements, within a distributed
hypermedia system.
• Constraints
Client server- separation of concern- aids independent
development- client is concerned with user interface and server
with data storage.
Stateless- all information regarding request is at client so
assumptions of storage at server cannot be made
Cache-able- - cache-able response can be reused by client later.
This eliminates some interactions if request are same ,improves
efficiency and scalability
Layered System- intermediate devices can respond if they have
a response for the request and not the server always . This
increases scalability
Code on demand – servers can provide executable scripts for
clients to execute in their context
Uniform interface
WebSocket-based Communication APIs
• Database: Database can be either local or in the cloud and stores the data
generated by the IoT device.
• Web Service: Web services serve as a link between the IoT device, application,
database and analysis components. Web service can be either implemented
using HTTP and REST principles (REST service) or using WebSocket protocol
(WebSocket service).
• Analysis Component: The Analysis Component is responsible for analyzing the
IoT data and generate results in a form which are easy for the user to
understand.
• Application: IoT applications provide an interface that the users can use to
control and monitor various aspects of the IoT system. Applications also allow
users to view the system status and view the processed data.
IoT Level-1
• An M2M area network comprises of machines (or M2M nodes) which have
embedded hardware modules for sensing, actuation and communication.
• Various communication protocols can be used for M2M local area networks
such as ZigBee, Bluetooh, ModBus, M-Bus, Wirless M-Bus, Power Line
Communication (PLC), 6LoWPAN, IEEE 802.15.4, etc.
• The communication network provides connectivity to remote M2M area
networks.
• The communication network can use either wired or wireless networks (IP-
based).
• While the M2M area networks use either proprietary or non-IP based
communication protocols, the communication network uses IP-based
networks.
Book website: http://www.internet-of-things-book.com
M2M gateway
• Since non-IP based protocols are used within M2M area networks, the
M2M nodes within one network cannot communicate with nodes in an
external network.
• To enable the communication between remote M2M area networks,
M2M gateways are used.
• Communication Protocols
• M2M and IoT can differ in how the communication between the machines or
devices happens.
• M2M uses either proprietary or non-IP based communication protocols for
communication within the M2M area networks.
• M2M focus is on protocols below N/W layer and in IOT above N/W layer
• Machines in M2M vs Things in IoT
• The "Things" in IoT refers to physical objects that have unique identifiers and can
sense and communicate with their external environment (and user applications)
or their internal physical states.
• M2M systems, in contrast to IoT, typically have homogeneous machine types
within an M2M area network.
Book website: http://www.internet-of-things-book.com
Difference between IoT and M2M
• Software-Defined Networking
(SDN) is a networking architecture
that separates the control plane
from the data plane and
centralizes the network controller.
• Software-based SDN controllers
maintain a unified view of the
network and make configuration,
management and provisioning
simpler.
• The underlying infrastructure in
SDN uses simple packet forwarding
hardware as opposed to
specialized hardware in
conventional networks.
• The SNMP agent which is a software running on the managed device responds to the requests from
NMS and retrieves data from / writes to MIB
SNMP is an application layer protocol and uses UDP as the transport protocol
Limitations of SNMP
• While SNMP has be the most popular protocol for network management, it has its own
limitations
1. SNMP is designed to be simple, and, stateless, meaning the application will have to
maintain the context / state and has to be smart enough to roll back in the event of an
error / failure
2. SNMP is based on UDP and thus is not reliable – no acks
3. MIBs often lack writable objects, as such its not possible for writing configurations
using SNMP. Meaning SNMP can be used primarily for monitoring and status polling
4. There is no distinction between configuration and state data in the MIBs
5. Retrieving and playback of configuration data is cumbersome with SNMP
6. Earlier versions of SNMP did not have strong security features (the present / newer
versions have strong security support!!)
THE END…..