0% found this document useful (0 votes)
17 views100 pages

Ksr-Mod 1

Uploaded by

Rajeshwari K S
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
17 views100 pages

Ksr-Mod 1

Uploaded by

Rajeshwari K S
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 100

Module-1

Introduction to IoT
Module-1 Overview
Definition and Characters of IoT
Physical Design of IoT
Logical Design of IoT
IoT Enabling Technologies
IoT Levels & Deployment Templates
Internet: A vast global network of connected
Introduction to IoT

servers, computers, tablets, and mobiles that


is governed by standard protocols for the
connected systems.

Thing: A thing in IoT refers to physical


entities or devices like sensors, actuators,
and computing devices like routers,
gateways, PCs, laptops, mobiles, etc.
Introduction
Internet of Things (IoT) comprises things that have
unique identities and are connected to the internet.
Existing devises , such as networked computers or 4G
enabled mobile phones already have some form of unique
identities and are also connected to the internet, the focus
on IoT in the configuration, control and networking via the
internet of devices or things , that are traditionally not
associated with the Internet. These include devices such as
thermostats, utility meters, a blue tooth- connected
headset, irrigation pumps and sensor or control circuits for
an electric car’s engine
 Experts forecast that by the year 2020 there will be a total
of 50 billion devices/ things connected to the internet.
Contd…
The scope of IoT is not limited to just connected
things(Devices, appliance, machines) to the Internet.
Applications on IoT networks extract and create
information from lower level data by filtering,
processing , categorizing, condensing and
contextualizing the data.
The information obtained is then organized and
structured to infer knowledge about the system and
or its user, its environment and its operations and
progress towards its objectives, allowing a smarter
performance.
Fig: Inferring information and knowledge
from Data
Applications of
IoT
Definition
Definition: A dynamic global n/w
infrastructure with self configuring
capabilities based on standard and
interoperable communication protocols
where physical and virtual ―things‖ have
identities, physical attributes and virtual
personalities and use intelligent interfaces,
and are seamlessly integrated into
information n/w, often communicate data
associated with users and their environments.
Characteristics of IoT
 Dynamic & Self Adapting: IoT devices and systems may have the
capability to dynamically adapt with the changing contexts and take
actions based on their operating condition.
Ex: Surveillance cameras can adapt their modes based on whether
it is day or night.

 Self Configuring: IOT devices have self configuring capability,


allowing a large number of devices to work together to provide
certain functionality. These devices have the ability configure
themselves setup networking, and fetch latest software upgrades
with minimal manual or user interaction.

 Interoperable communication protocols: IoT Devices may


support a number of interoperable communication protocols and can
communicate with other devices and also with the infrastructure.
Characteristics of IoT Contd…
Unique Identity: Each IoT devices has a unique
identity and a unique identifier(IPaddress,
URI).IoT systems may have intelligent interfaces
which adapt based on the context, allow
communication with users and the environment
contexts.
Integrated into information network: IoT
devices are usually integrated into the information
network that allows them to communicate and
exchange data with other devices and systems.
Physical Design of IoT Contd…
Things of IoT:
The “Things” in IoT usually refers to IoT devices which have
unique identities and can perform remote sensing, Actuating
and monitoring capabilities.
IoT devices can:
 Exchange data with other connected devices and applications
(directly or indirectly), or
 Collect data from other devices and process the data locally or
 Send the data to centralized servers or cloud-based application
back-ends for processing the data,
 Perform some tasks locally and other tasks within the IoT
infrastructure, based on temporal and space constraints((ie :
Memory, processing calibrators, communication latencies and
speed and deadlines).
Generic block diagram of an IoT Device

An IoT device may consist of several


interfaces for connections to other devices,
both wired and wireless
 I/O interfaces for sensors
 Interfaces for Internet connectivity
Memory and storage interfaces
Audio/video interfaces.
Generic block diagram of an IoT Device
HDMI: High definition multimedia Interface.
3.5mm: Audio Jack which headphone adapter.
RCA: Radio corporation of America.
UART: Universal Asynchronous Receiver Transmitter.
SPI: Serial Peripheral Interface.
I2C: Inter integrated circuit
CAN: Controller Area Network used for Micro-controllers
and devices to communicate.
SD: Secure digital (memory card)
MMC: multimedia card
SDIO: Secure digital Input Output
GPU: Graphics processing unit.
DDR: Double data rate
IoT Protocols
IoT Protocols
Link Layer
 Link Layer protocols determine how the data is
physically sent over the networks physical layer or
medium(example copper wire, electrical cable, or
radio wave).
 The Scope of The Link Layer is the Last Local
Network connections to which host is attached.
 Host on the same link exchange data packets over
the link layer using the link layer protocol.
 Link layer determines how the packets are coded
and signaled by the hardware device over the
medium to which the host is attached
IoT Protocols: Link Layer
 802.3-Ethernet: IEEE802.3 is collection of wired Ethernet standards for
the link layer. Eg: 802.3 uses co-axial cable; 802.3i uses copper twisted
pair connection; 802.3j uses fiber optic connection; 802.3ae uses Ethernet
overfiber.
 802.11-WiFi: IEEE802.11 is a collection of wireless LAN(WLAN)
communication standards including extensive description of link layer. Eg:
802.11a operates in 5GHz band, 802.11b and 802.11g operates in 2.4GHz
band, 802.11n operates in 2.4/5GHz band, 802.11ac operates in 5GHz
band, 802.11ad operates in 60Ghzband.
 802.16 -WiMax: IEEE802.16 is a collection of wireless broadband
standards including exclusive description of link layer. WiMax provide
data rates from 1.5 Mb/s to 1Gb/s.
 802.15.4-LR-WPAN: IEEE802.15.4 is a collection of standards for low
rate wireless personal area network(LR-WPAN). Basis for high level
communication protocols such as ZigBee. Provides data rate from 40kb/s
to250kb/s.
 2G/3G/4G-Mobile Communication: These are the different generations of
mobile communication standards including second generation (2G including
GSM and CDMA). 3rd Generation (3G including UMTS and CDMA2000) and
4th generation 4G including LTE . Data rates from 9.6kb/s(2G) to up
to100Mb/s(4G).
IoT Protocols Contd…

Network/Internet Layer
 The network layer are responsible for sending of
IP datagrams from the source network to the
destination network.
 This layer Performs the host addressing and
packet routing.
 The datagrams contains a source and destination
address which are used to route them from the
source to the destination across multiple
networks.
 Host Identification is done using the hierarchy IP
addressing schemes such as ipv4 or IPv6.
IoT Protocols: Network/Internet Layer
IPV4: Internet protocol versions for open parents close
(IPV4) is there most deployed internet protocol that is
used to identify the device is on a network using a
hierarchy latest schemes. It uses 32 bit addresses scheme
that allows total of 232 address. As more and more devices
got connected to the internet. The Ipv4 has succeeded by
IPv6.
IPv6: It is the newest versions of internet protocol and
successor to IPv4. IPv6 uses 128 bit address schemes that
are lost total of 2128 are 3.4* 10 38 address.
6LoWPAN: IPv6 over low power wireless personal area
networks brings IP protocol to the low power device
which have limited processing capability it operate in the
2.4 GHz frequency range and provide the data transfer
rate off to 50 kb/s.
IoT Protocols
 Transport layer :

 The Transport layer protocols provides end-to-end message


transfer capability independent of the underlying network.
 The message transfer capability can be set up on connections,
either using handshake or without handshake acknowledgements.
 Provides functions such as error control , segmentation, flow
control and congestion control.
 TCP: Transmission Control Protocol used by web browsers(along
with HTTP and HTTPS), email(along with SMTP, FTP). Connection
oriented and stateless protocol. IP Protocol deals with sending
 UDP: User Datagram Protocol is connectionless protocol. Useful in
time sensitive applications, very small data units to exchange.
Transaction oriented and stateless protocol. Does not provide
guaranteed delivery.
IoT Protocols: Transport layer
 TCP: Transmission control protocol is the most widely used
to transport layer protocol that is used by the web
browsers along with HTTP , HTTPS application layer
protocols email program (SMTP application layer protocol)
and file transfer protocol.
 TCP is a connection Oriented and stateful protocol while IP
protocol deals with sending packets, TCP ensures reliable
transmissions of packets in order.
 TCP also provide error deduction capability so that
duplicate packets can be discarded and low packets are
retransmitted .
 The flow control capability ensures that the rate at which
the sender since the data is now to too to high for the
receiver to process.
IoT Protocols: Transport layer
UDP: unlike TCP, which requires carrying out an
initial setup procedure, UDP is a connection less
protocol.
UDP is useful for time sensitive application they
have very small data units to exchange and do
not want the overhead of connection setup.
UDP is a transactions oriented and stateless
protocol.
UDP does not provide guaranteed delivery,
ordering of messages and duplicate eliminations.
IoT Protocols
Application layer :
Application layer protocol define how the
application interfaces with the lower layer
protocols to send the data over the network.
 Data are typically in files, is encoded by the
application layer protocol and encapsulated in
the transport layer protocol.
Application layer protocol enable process-to-
process connection using ports.
IoT Protocols: Application layer
Http: Hypertext transfer protocol is the application
layer protocol that forms the foundations of world
wide web http includes,commands such as GET,
PUT, POST, DELETE, HEAD, TRACE, OPTIONS etc.
The protocol follows a request-response model
where are client sends request to server using the
http commands.
 Http is a stateless protocol and each http request is
independent father request and http client can be a
browser or an application running on the client
example and application running on an IoT
device ,mobile applications or other software.
IoT Protocols: Application layer
CoAP: Constrained application protocol is an
application layer protocol for machine to machine
application(M2M) meant for constrained environment
with constrained devices and constrained networks.
Like http CoAP is a web transfer protocol and uses a
request- response model, however it runs on the top
of the UDP instead of TCP.
 CoAP uses a client–server architecture where client
communicate with server using connectionless
datagrams.
It is designed to easily interface with http like http,
CoAP supports method such as GET, PUT, DELETE .
IoT Protocols: Application layer
Websocket: Websocket protocol allows full
duplex communication over a single socket
connections for sending message between client
and server.
 Websocket is based on TCP and Allows streams
of messages to be sent back and forth between
the client and server while keeping the TCP
connection open.
 The client can be a browser, a mobile
application and IoT device
IoT Protocols: Application layer
MQTT :Message Queue Telemetry Transport it is
a lightweight message protocol based on public -
subscribe model.
 MQTT uses a client server Architecture by the
clients such as an IoT device connect to the
server also called the MQTT broker and
publishers message to topic on the server.
The broker forward the message to the clients
subscribed to topic MQTT is well suited for
constrained and environments.
IoT Protocols: Application layer
XMPP: Extensible Messaging and Presence Protocol
it is a protocol for real-time communication and
streaming XML data between network entities
XMPP powers wide range of applications including
messaging, presence, data syndication, gaming
multiparty chat and voice / voice calls.
XMPP Allows sending small chunks of XML data
from one network entity to another in real time.
XMPP supports both client to server and server –
client communication path.
IoT Protocols: Application layer
DDS: Data distribution service is the date centric
middleware standard for device-to-device machine to
machine communication.
DDS uses a publish subscribe model where publisher
(example device that generate data)create topics to
which subscribers can subscribe. Publisher is an
object responsible for data distributions and the
subscriber responsible for receiving published data.
DDS provide quality of service (QoS) control and
configurable reliability.
IoT Protocols: Application layer
 AMQP(Advanced Message Queuing protocol): It is an open
application layer protocol for business messaging.
 AMQP support point to point and publish - subscribe model
routing and queuing.
 AMQP broker receive message from publishers (example
devices or applications that generate data) and route them
over connections to consumers (application that process data).
 Publishers publish the message to exchange which then
distribute message copies to queues.
 Messages are either delivered by the brokers to consumers
which have subscribed to the queues or consumers can pull
the messages from queues.
LOGICAL DESIGN of IoT
Logical design of an IoT system refers to an
abstract representation of the entities and
processes without going into the low-level
specifics of the implementation.
IoT Functional Blocks
IoT Communication Models
IoT Comm. APIs
IoT Functional Blocks
An IoT system comprises a number of
functional blocks that provide the system the
capabilities for identification, sensing,
actuation, communication and management.
Figure shows the functional block diagram of
IoT.
Functional Block Diagram of IoT.
IoT Functional Blocks
 Device: An IoT system comprises of devices that provide
sensing, actuation, monitoring and control functions.
 Communication: handles the communication for IoT system.
 Services : An IoT system uses various types of IoT services
such as services for device monitoring ,device control
services ,data publishing services and services for device
discovery. Management: Provides various functions to
govern the IoT system.
 Security: Secures IoT system and provides priority
functions such as authentication, authorization, message
and context integrity and data security.
 Application: IoT application provide an interface that the
users can use to control and monitor various aspects of IoT
system.
IoT Communication Modules
1. Request–Response Communication Model:
 Request–Response is a communication model in
which the client sends requests to the server and
the server responds to the requests.
 When the server receives a request, it decides how
to respond, fetches the data, retrieves resource
representations, prepares the response and then
sends the response to the client.
 Stateless communication model and each request-
response pair is independent of others.
 Figure shows the block diagram of Request-
Response Communication Model.
Request–Response Communication Model Diagram
IoT Communication Modules Contd…
2. Publish–Subscribe Communication Model:
 Publish–Subscribe is a communication model that
involves publishers, brokers and consumers.
 Publishers are the source of data. Publishers send the
data to the topics which are managed by the broker.
Publishers are not aware of the consumers.
 Consumers subscribe to the topics which are managed
by the broker.
 When the broker receives data for a topic from the
publisher, it sends the data to all the subscribed
consumers.
 Figure shows the block diagram of Publish-Subscribe
Communication Model.
Publish–Subscribe Communication Model diagram
IoT Communication Modules Contd…
3. Push–Pull Communication Model:

 Push–Pull is a communication model in which the data


producers push the data to queues and the consumers
pull the data from the queues. Producers do not need to
be aware of the consumers.
 Queues help in decoupling the messaging between the
producers and consumers.
 Queues also act as a buffer which helps in situations
when there is a mismatch between the rate at which the
producers push data and the rate at which the
consumers pull data.
 Figure shows the block diagram of Push-Pull
Communication Model.
Push–Pull Communication Model Diagram
IoT Communication Modules Contd…
4. Exclusive Pair Communication Model:
Exclusive Pair is a bidirectional, fully duplex
communication model that uses a persistent
connection between the client and the server.
Once the connection is set up it, remains open
until the client sends a request to close the
connection.
Client and server can send messages to each
other after connection setup.
 Figure shows the block diagram of Exclusive
Pair Communication Model.
Exclusive Pair Communication Model Diagram
IoT communication APIs
1. REST-based Communication APIs:
 Representational State Transfer (REST) is a set of
architectural principles by which you can design
web services and web APIs that focus on a system’s
resources and how resource states are addressed
and transferred.
 REST APIs follow the request–response
communication model.
 REST architectural constraints apply to the
components, connectors and data elements within a
distributed hypermedia system.
 Figure shows the RESET API Architecture diagram.
Communication with REST API- Architecture
REST architectural constraints
Client – Server
Stateless
Cacheable
Layered System
Uniform Interface
Code on demand
Client – Server
The principle behind the client-server
constraint is the separations of concerns.
For example, client should not be concerned
with the storage of data which is their
concern of the server.
Similarly, the server should not be concerned
about the user interface which is a concern of
the client.
Separation allows client and server to be
independently deployed and updated.
Stateless:
Each request from client to server must
contain all the information necessary to
understand the request , and cannot take
advantage of any stored context on the server
.
The Session state is kept entirely on the
client.
Cache-able
Cache constrain requires that the data within
the response to a request be implicitly or
explicitly labeled as catchable or non-
catchable.
 Then a client cache is given the right to
reuse that response data for later, equivalent
requests.
Caching can partially or completely eliminate
some interactions and improve efficiency and
scalability.
Layered system
Layered system constraint, constrains the
behavior of components such that each
component cannot see beyond the immediate
layer with which they are interacting.
 For example, client cannot tell whether it is
connected directly to the end server or to an
intermediary along the way.
System scalability can be improved allowing
intermediaries to respond to request instead of
tender server, without the client having to do
anything different
Uniform interface
Uniform interface constraints requires that the
method of communication between client and
server must be uniform.
Resources are identified in the request and
separate from the representation of the
resource that are returned to the client.
 When climbing holds a representation of your
resource it has all the information required to
update or delete the resource .
Each message includes enough information to
describe how to process the message.
Code on demand
Service can provide executable code script
for clients to execute in their context.
This constraint is only one that is optional.
Request-Response model used by REST
RESTful web service is a collection of
resources which are represented by URIs.
RESTful web API has a base URI.
(e.g: http://example.com/api/tasks/).
The clients and requests to these URIs using
the methods defined by the HTTP
protocol(e.g: GET, PUT, POST or DELETE).
A RESTful web service can support various
internet media types.
Request-Response model used by REST
HTTP Request methods and actions
IoT communication APIs Contd…
2. Web Socket-based Communication APIs:
WebSocket API allow bi-directional, full duplex
communication between client and server.
Unlike request-response API allow full duplex
communication and do not require new
connection to be set up for each message to be
sent.
Websocket communication begins with connection
setup request send by the client to the server.
WebSocket-based Communication APIs Contd…
The request is sent over http and the server
interprets it as an upgrade request.
If the server support protocol, the server
responds to the website handshake response.
After the connection setup the client and the
server can send data or messages to each
other in full duplex model.
WebSocket API reduce network traffic and
latency as there is no overhead for
connection setup and determination records
to each message.
WebSocket Protocol
Difference between REST and WebSocket-based
Communication APIs:
IoT enabling Technologies
Enabled by several Technologies including
Wireless Sensor Networks,
Cloud Computing,
Big Data Analytics,
Embedded System,
Security Protocols and Architectures,
Communication Protocols,
Web Service,
Mobile Internet
and Semantic Search Engine .
Wireless Sensor Networks
Wireless Sensor Network ( WSN) comprise of
distributed devices with the sensor which are used to
monitor the environmental and physical conditions.
 A WSN consists of a number of end nodes and
routers and a coordinator.
End nodes have several sensors attached to them.
End node can also act as a routers.
Routers are responsible for routing the data packet
from end nodes to the coordinator.
The coordinator node collect the data from all the
notes coordinator also act as a Gateway that connects
the WSN to the internet.
Wireless Sensor Networks Contd…
WSNs used in IoT systems are described as follows:
 Weather Monitoring System: in which nodes collect temp,
humidity and other data, which is aggregated and analyzed.
 Indoor air quality monitoring systems: to collect data on the
indoor air quality and concentration of various gases.
 Soil Moisture Monitoring Systems: to monitor soil moisture
at various locations.
 Surveillance Systems: use WSNs for collecting surveillance
data(motion data detection).
 Smart Grids : use WSNs for monitoring grids at various
points.
 Structural Health Monitoring Systems: Use WSNs to monitor
the health of structures(building, bridges) by collecting
vibrations from sensor nodes deployed at various points in
the structure.
Wireless Sensor Networks Contd…
WSNs are enabled by wireless communication
protocols such as IEEE 802.15.4.
Zig Bee is one of the most popular wireless
technologies used by WSNs.
Zig Bee specifications are based on IEEE 802.15.4.
Zig Bee operates 2.4 GHz frequency and offers data
rates upto 250 KB/s and range from 10 to
100meters.
WSNs are self organizing networks. This capability
of WSN makes the network robust.
In the event of some node failure or addition of the
new node to the network, the network reconfigure
itself.
Wireless Sensors
Cloud Computing
Cloud Computing is a transformative
computing paradigm that involves delivering
applications and services over the internet.
 Cloud Computing involves provisioning of
computing networking and storage resources
on demand and providing these resources as
metered services to the users, in a “ pay as
you go” model.
Cloud Computing resources can be
provisioned on demand by the user without
requiring interactions with the Cloud Service
Provider.
Cloud Computing Contd…
The process of provisioning resources is
automated.
Cloud Computing resources can be accessed over
the network using standard access mechanism
that provide platform-independent access through
the use of heterogeneous client platforms such as
workstations, laptops, tablets and Smart phones.
The computing and storage resources provided by
Cloud Service Provider our food to serve multiple
user using multi Tenancy.
Multi-tenant aspects on the multiple users to be
served by the same physical hardware .
Cloud Computing services
Infrastructure-as-a-service(IaaS) :
 IaaS provides the user the ability provision
computing and storage resources.
 These resources are provided to the users as
virtual machine instances and virtual storage.
 Users can start, stop configure and manage the
virtual machines instance on the virtual storage
using can deploy operating systems and
applications on their choice on the actual
resources provisions in the cloud .
 Cloud Service Provider manages the underlying
infrastructure.
Cloud Computing services
Platform-as-a-service(PaaS) :
 Platform-as-a-service provides the user the ability to
develop and deploy application in the cloud using
the deployment tools, application programming
interfaces (API), software libraries and services
provided by the Cloud Service Provider.
 The Cloud Service Provider manages the underlying
cloud infrastructure including servers, network,
operating systems and storage .
 The users are responsible for deploying, developing,
configuring and managing applications on the cloud
infrastructure.
Cloud Computing services
Software-as-a-service(SaaS) :
 SaaS provides the user a complete software
applications of the user interface to the application
itself .
 The Cloud Service Provider manage the underlying
cloud infrastructure including server, network
storage and application software, and the user is
unaware of the underlying architecture of the cloud.
 Applications are provided to the user through a
thin client interface (example Browser application).
 SaaS applications are accessed from various client
smart phones running different operating system.
Cloud Computing Physical Diagram
Big Data Analytics
Big data is defined as collections of data set
whose volume, velocity (in terms of its
temporal variations )or variety, is so large
that it is difficult to store, manage, process
and analyze the data using traditional
database and data processing tools.
 Big Data Analytics involving several steps
starting from data cleansing, data
munging(or wrangling),data processing and
visualization.
Examples of big data generated by IoT
systems
Sensor data generated by IoT system such as
weather monitoring stations.
Machine sensor data collected from sensor
embedded in Industrial and energy system for
monitoring their files and protecting failure.
Health and fitness data generated by IoT
devices such as wearable fitness band.
Data generated by IoT system for Location
tracking of vehicle.
 Data generated by retail inventory monitoring
system.
Characteristics of Big Data
Volume: Through there is no fixed threshold for
volume of data to be considered as big data, however
the term big data is used for massive scale data that is
difficult to store, manage and process using
traditional data bases and data processing
architecture.
The Volume of data generated by modern IT, industrial
and healthcare systems, for example, is a growing
exponentially driven by the lowering cost of data
storage and processing architectures and the need to
extract valuable insights from the data to improve
business processes, efficiency and services to
consumers.
Characteristics of Big Data
Velocity: Velocity is another important
characteristics of big data and the primary
reasons for exponential growth of data velocity of
the data of a store how fast the data is generated
and how frequently it varies.
 Modern IT Industrial and other systems are
generating data at increasing the highest speeds.
Variety: Variety refers to the forms of the data.
Big data comes in for different forms such as
structured or unstructured data including text
data, audio, video and sensor data .
Big Data Analytics Physical Diagram
Communications protocol
Communications protocols form the
backbone of IoT system and enable network
connectivity and coupling to applications.
Communications protocols allow device to
exchange data over the network.
These protocols define the data exchange
formats and data encoding schemes for
devices and routing of packets from source to
destination.
Other function of the protocol include
sequence control flow control and
Embedded Systems
 An Embedded system is computer system that has computer
hardware and software embedded perform specific task.
 In contrast to general purpose computers or personal
computers, which can perform various types of tasks, embedded
systems are designed to perform a specific set of tasks.
 Embedded system include Microprocessor and
Microcontroller ,Memory(Ram ROM cache) Networking units
(Ethernet WI-FI adaptor) input/output unit display keyboard ,
display and storage (such as Flash Memory). Some embedded
system have specialist processes such as digital signal
processor (DSPs) graphics processors and application specific
processors.
 Embedded System range from low cost miniaturized devices
such as digital watches to devices such as digital cameras, Point
of sales terminals, vending machines, appliances etc.
IoT levels and Deployment Templates
IoT system comprises of the following
components:
Device : An IoT device allow identification,
remote sensing, actuating and remote
monitoring capabilities.
Resources : Resources are software
components on the device for accessing and
storing information or controlling actuators
connected to the device. Resources also
include software components that enable
network access for the device .
IoT levels and Deployment Templates
Contd…
Controller service: Controller Service is a native
service that runs on the device and interact with the
web services. Controller service sends data from the
device to the web service receive command from the
application from controlling the device.
Database: Database can be either local or in the cloud
and stores the data generated by the IoT device.
Web service: Serve as a link between the device,
application database and analysis components. Web
Services can be implemented using HTTP and REST
principles or using website protocol.
IoT levels and Deployment Templates
Contd…
Analysis component: The analysis component is
responsible for analyzing the IoT data and
generate results in the form which are easy for
the user to understand. Analysis of IoT data can
be performed either locally or in the cloud.
Analyzed results are stored in the local or cloud
database.
Application: IoT applications provide an interface
that the user can use to control and monitor
various aspects of the IoT system. Applications
also allow user to view the system status and view
the processed data.
IoT Level-1
 we define various levels of IoT systems with increasing
completely.
 Level 1 IoT system has a single node / device that performs
sensing and/or actuation, stores data, reforms analysis and the
host to the application.
 Level 1 IoT systems are suitable for modeling low cost and low
complexity solutions where the data involving is not big and
the analysis requirements are not computationally intensive.
 Let us now consider an example of Level 1 IoT system for
home automation.
 This system consists of the single node that allows controlling
the lights and appliances in your home remotely .
 The device used in this system interface with their lights and
appliances using electronic relay switches.
IoT Level-1 diagram
IoT Level-1 Contd…
The status information of each light or appliance is
maintained in a local database. REST service
deployed locally allow retrieving and updating the
state of the each light or appliances in the status
database.
The controller service continuously monitor the
state of each light or appliance and triggers the
relay switches accordingly.
The application which is deployed locally has a user
interface for controlling the lights or appliances.
Since the device is connected to the internet, the
application can be accessed remotely as well.
IoT Level-2
Level 2 IoT system has a single node that
performs sensing and/or actuation and local
analysis.
Data is stored in the cloud and application is
usually cloud based.
 Level 2 IoT systems are suitable for solutions
where the data in world is big, however the
primary analysis requirement is not
computationally intensive and can be done
local itself.
Let us now consider an example of Level 2
IoT Level-2
diagram
Example-Smart Irrigation system
IoT Level-2 Contd…
 The system consists of the single node that monitor the soil
moisture level and control segregation system.
 The device used in this system collect soil moisture data
from sensor. The controller service continuously monitor the
moisture level.
 If the monster level drops below a threshold t , the irrigation
system is turned on.
 For controlling the irrigation system actuators such as
solenoid valve can be used.
 Rest Web Services is used for storing and retrieving data
which is stored in the cloud database.
 A cloud based application is used for visualizing the
moisture level over a period of time, which can help in
making decisions about irrigation schedules.
IoT Level-3
Level 3 system has a single node .
Data is stored and analyzed in the cloud
application is cloud-based.
Level 3 IoT system suitable for solutions
where the data involved is big and analysis
requirements computationally intensive.
IoT Level-3
diagram
IoT Level-3 Contd…
Let us considered example of Level 3 IoT system
is Tracking package handling.
The system consists of a single node that
monitors the vibration level for package being
shipped.
The device in the system uses accelerometer and
gyroscope sensor for monitoring vibration levels.
 The controller service send sensor data to the
cloud in real time using a website service.
The data is stored in the cloud and also visualized
using a cloud based application.
IoT Level-3 Contd…
The analysis component in the cloud can
Trigger alert the vibration level become
greater than threshold.
 The benefit of using websocket service
instead of the REST service this example the
sensor data can be sent in real-time to the
cloud.
 Cloud based application can subscribe to the
sensor data feeds for you in the real-time
data.
IoT Level-4
A Level 4 IoT system has multiple nodes that perform
local analysis.
Data is stored in the cloud and application is cloud
based.
Level 4 contains local and cloud based observer nodes
which can subscribe to and receive information
collected in the cloud from IoT devices.
Observer node can process information and use it for
various applications, however observer nodes do not
perform any control function.
Level 4 IoT systems are suitable for solutions where
multiple nodes are required the data involved is big and
the analysis requirements are computationally intensive.
IoT
Level-4
diagram
IoT Level-4 Contd…
Let us consider an example of Level 4 IoT system for
Noise monitoring.
The system consists of multiple nodes placed in
different locations for monitoring noise level in an area.
The nodes in this example are equipped with sound
sensor.
Nodes are independent of each other each node runs in
one controller service that sends the data to the cloud.
The data is stored in a cloud database.
The analysis of the data collected from a number of
nodes is done in the cloud.
A cloud based application is used for visualizing the
aggregated data.
IoT Level-5
A Level 5 IoT system has multiple end nodes and
one coordinator nodes and nodes that perform
sensing and / or actuation.
Coordinator node collects data from the entry and
send to the cloud.
Data is stored and analyzed in the cloud and
applications is cloud based.
Level 5 IoT system are suitable for Forest fire
detection.
The system consists of multiple nodes placed in
different locations for monitoring temperature,
humidity and carbon dioxide levels in a forest.
IoT Level-5
Diagram
IoT Level-5 Contd…
The end nodes in this example are equipped with
various sensors (such as temperature ,humidity and
CO2).
 The coordinator node collects the data from the end
nodes and act as a Gateway that provides internet
connectivity to the IoT system.
The controller service on the coordinator device
sends the collected data to the cloud .
The data is stored in the cloud database.
The analysis of the data is done in the computing
cloud to aggregate the data and make prediction.
A cloud-based is used for visualizing the data.
IoT Level-6
Level 6 IoT system has multiple independent nodes
that perform sensing and / or actuations and send
data to the cloud.
Data is stored in the cloud and applications is cloud
based .
The analytics component analyze the data and store
the results in the cloud database.
The results are visualized with the cloud based
application.
The centralized controller is aware of the status of
all the end nodes and send control commands to
the nodes.
IoT Level-6 Diagram
IoT Level-6 Contd…
Let us consider an example of the Level 6 IoT system for
weather monitoring.
The system consists of multiple nodes placed in different
location for monitoring temperature, humidity and
pressure in an area.
The end nodes are equipped with various sensors such as
temperature ,pressure and humidity.
The end nodes send the data to the cloud in real time
using a websocket service .
The data is stored in a cloud database.
The analysis of the data is done in the cloud to aggregate
the data and make predictions.
A cloud based applications is used for visualizing the data.

You might also like