Unit I _ Lecture PPT INTRODUCTION TO IOT PPT (2).pptx

NALESVPMEngg 55 views 124 slides Oct 15, 2024
Slide 1
Slide 1 of 124
Slide 1
1
Slide 2
2
Slide 3
3
Slide 4
4
Slide 5
5
Slide 6
6
Slide 7
7
Slide 8
8
Slide 9
9
Slide 10
10
Slide 11
11
Slide 12
12
Slide 13
13
Slide 14
14
Slide 15
15
Slide 16
16
Slide 17
17
Slide 18
18
Slide 19
19
Slide 20
20
Slide 21
21
Slide 22
22
Slide 23
23
Slide 24
24
Slide 25
25
Slide 26
26
Slide 27
27
Slide 28
28
Slide 29
29
Slide 30
30
Slide 31
31
Slide 32
32
Slide 33
33
Slide 34
34
Slide 35
35
Slide 36
36
Slide 37
37
Slide 38
38
Slide 39
39
Slide 40
40
Slide 41
41
Slide 42
42
Slide 43
43
Slide 44
44
Slide 45
45
Slide 46
46
Slide 47
47
Slide 48
48
Slide 49
49
Slide 50
50
Slide 51
51
Slide 52
52
Slide 53
53
Slide 54
54
Slide 55
55
Slide 56
56
Slide 57
57
Slide 58
58
Slide 59
59
Slide 60
60
Slide 61
61
Slide 62
62
Slide 63
63
Slide 64
64
Slide 65
65
Slide 66
66
Slide 67
67
Slide 68
68
Slide 69
69
Slide 70
70
Slide 71
71
Slide 72
72
Slide 73
73
Slide 74
74
Slide 75
75
Slide 76
76
Slide 77
77
Slide 78
78
Slide 79
79
Slide 80
80
Slide 81
81
Slide 82
82
Slide 83
83
Slide 84
84
Slide 85
85
Slide 86
86
Slide 87
87
Slide 88
88
Slide 89
89
Slide 90
90
Slide 91
91
Slide 92
92
Slide 93
93
Slide 94
94
Slide 95
95
Slide 96
96
Slide 97
97
Slide 98
98
Slide 99
99
Slide 100
100
Slide 101
101
Slide 102
102
Slide 103
103
Slide 104
104
Slide 105
105
Slide 106
106
Slide 107
107
Slide 108
108
Slide 109
109
Slide 110
110
Slide 111
111
Slide 112
112
Slide 113
113
Slide 114
114
Slide 115
115
Slide 116
116
Slide 117
117
Slide 118
118
Slide 119
119
Slide 120
120
Slide 121
121
Slide 122
122
Slide 123
123
Slide 124
124

About This Presentation

Introduction to Sensors - Light sensor, voltage sensor, Temperature and Humidity Sensor, Motion Detection Sensors, Wireless Sensors, Level Sensors, USB Sensors, Embedded Sensors, Distance Measurement with ultrasonic sensor Introduction to Actuators- Connecting LED, Buzzer, Controlling- AC
Power devi...


Slide Content

TE IT (2019 Course) Elective I : Internet of Things Prepared by : Prof Nale Rajesh Keshav IT Department SVPM’s COE,Malegaon ( Bk ), Baramati 413115 1

2

Reference Books Suggested…. 3

Elective-I Internet of Things ( TH) CO # CO Statement Blooms Level Associated Unit CO # 1 Discuss fundamentals, architecture and framework of IoT . L2 : Understand U # I : Introduction to IoT CO # 2 Select suitable sensors and actuators for real time scenarios. L3 : Understand & Apply U # II : THINGS IN IOT Controlling Hardware CO # 3 Justify the significance of protocol for wireless communication and IoT challenges. L5 : Evaluate U # III : Communication Protocols and IoT Challenges CO # 4 Understand the Python programming for development of IoT applications. L2 : Understand U # IV : IoT Platforms and its Programming CO # 5 Understand the cloud interfacing technologies. L2 : Understand U # V : IoT Physical Servers and Cloud Offerings CO # 6 Design and Implement real time IoT applications L3 : Design & Apply U # VI : Domain Specific Applications of IoT

Unit I :- INTRODUCTION TO IOT (6 Hrs) 5

Definitions of Internet of Things  ( IoT ) The Internet of Things ( IoT ) is the network of physical objects(things) that accessed through the Internet. A  thing  in the IOT can be a any other natural or man-made object. 1. person with a heart monitor implant , 2. a farm animal with a  biochip transponder , object that can be assigned an Internet Protocol (IP) address and is able to transfer data over a network. 6

IOT Device with Sensors and Actuators 7

How IoT works ? The IoT architecture  consists of smart “things” - devices that use embedded systems (processors, sensors, and hardware). These devices collect, send, and manage data and systems based on data acquired from the environment. IoT devices connect to IoT gateways, IoT platforms, or other devices for analysis and share the sensor data they collect. 8

9 Fig: Application : IOT based Home Appliance Control using Blynk Server ThingSpeak : It includes a Web Service (REST API)   , You can send data to ThingSpeak ™ from your devices, create instant visualizations of live data, and send alerts using web services. Blynk : It is an IoT platform for iOS or Android smartphones that is used to control Arduino , Raspberry Pi and NodeMCU via the Internet . This application is used to create a graphical interface. After downloading the Blynk app, you can create a project dashboard and arrange buttons, sliders, graphs, and other widgets onto the screen. ESP8266 Wi-Fi Module: The ESP8266 is a Wi-Fi chip with a full TCP/IP stack and Micro Controller Unit capability. 

Characteristics of IOT The main key  characteristics of IoT  are  C onnectivity ,  Intelligence ,  Dynamic nature ,  Security ,  sensing ,  Heterogeneity , and  Enormous scale . 10

11 (Machine Learning/ AI )

12

13

14 Basic IOT Architecture

15 Sensors & Actuators Sensors are everywhere, sensors sense data from the atmosphere or place. the eg .  temperature sensor  senses temperature from the room and shares it through  IoT gateway. IoT Gateways & frameworks Gateways act as a carrier between the internal network of sensor nodes with the external Internet or World Wide Web. The received signals are to be uploaded on the network using different communication media such as  Wi-Fi ,  Bluetooth or BLE ,  LoRaWAN ,  LTE , and many more. Cloud server The data transmitted through the gateway is stored & processed securely within the cloud server i.e. in data centres .  This processed data is then used to perform intelligent actions that make all our devices Smart Devices. Mobile applications The intuitive mobile apps will help end-users to control & monitor their devices (ranging from the room thermostat to vehicle engines) from remote locations.

16 IOT Layers

17

18 IOT without FOG Computing & With FOG Computing

19 EDGE Computing, FOG Computing & CLOUD Computing Fog computing offers a compromise between cloud and edge computing for real-time, scalable data analysis. Ideal for regional applications and IoT .

20 Data Analysis Real Time ,Local network , Temporary storage Less time sensitive data , Permanent storage

21 4- Stages of IOT architecture :

22 4 Stage IoT architecture which are: STAGE 1 : Sensors and actuators to collect data and perform actions. STAGE 2 : Internet gateways and Data Acquisition Systems. Internet gateway via wireless WANs or wired WANs. The Internet gateways receive the aggregated and digitized data by DAS and route it over to Stage 3 systems. STAGE 3 : Edge IT Edge IT systems perform enhanced analytics and pre-processing such as machine learning and visualization on data received from stage 2. STAGE 4 : Data center and cloud Where data analyzed, managed, and securely stored 

23

24

IoT Framework and Architecture 25 In general, a framework is  a real or conceptual structure intended to serve as a support or guide for the building of something that expands the structure into something useful.

The IoT World Forum ( IoTWF ) Standardized 7-Layer Architecture

Layer 1: Physical Devices and Controllers Layer This layer is home to the “things” in the Internet of Things, including the various endpoint devices and sensors that send and receive information. The size of these “things” can range from almost microscopic sensors to giant machines in a factory. Their primary function is generating data and being capable of being queried and/or controlled over a network.

Layer 2: Connectivity Layer

Layer 3: Edge Computing Layer The emphasis is on data reduction and converting network data flows into information that is ready for storage and processing by higher layers . Information processing is initiated as early and as close to the edge of the network as possible

Upper Layers: Layers 4 to 7 The upper layers deal with handling and processing the IoT data generated by the bottom layer.

Physical Design of IoT The  physical design  of an  IoT  system is referred to as the Things/Devices and protocols that are used to build an IoT system. All these things/Devices are called Node Devices and every device has a unique identity that performs remote sensing, actuating,  and monitoring work. and the protocols that are used to establish communication between the Node devices and servers over the internet. 1. IOT Device 2. IOT Protocols 32

Physical Design of IoT – 1. IOT Device 33

34 1) Things in IoT : IOT Device Connectivity Devices like USB hosts and ETHERNET are used for connectivity between the devices and the server. Processor A processor like a CPU and other units are used to process the data. these data are further used to improve the decision quality of an IoT system. Audio/Video Interfaces An interface like High Definition Multimedia Interface(HDMI) and RCA cable devices is used to record audio and videos in a system. Input/Output interface To give input and output signals to sensors, and actuators we use things like UART, SPI, CAN, etc. Storage Interfaces Things like Secure Digital ( SD ) , Mult iMedia Card MMC, and Secure Digital I/O Card SDIO are used to store the data generated from an IoT device. Other things like DDR and Graphics processing unit GPU are used to control the activity of an IoT system.

35 IOT Protocols : Before going to IOT Protocols just take a revision of OSI-ISO and TCP/IP Layers …………….

TCP/IP Protocol Suite 36 Revision : TCP/IP and OSI model

Interfaces b/w Layers 2. 37

Revision : OSI-ISO Layers/TCP-IP Layers 7. APPLICATION – responsible for interactions with operating system or application. This layer provides application services for file transfer, e-mail and other network software services (Telnet, FTP, HTTP, RSTP), LOG-IN ,LOG OUT etc 6. PRESENTATION – responsible for delivery and formatting data into the form understanding for Application layer. Presentation layer ensures that data from one computer will be readable on the other one (Windows and Unix) 5. SESSION – responsible for establishing, management and terminating connection between applications. Session layer sets up , coordinates conditions of conversation between applications at each end (L2TP , H.264 -audio-video transmission)  4. TRANSPORT – provides transparent data transfer between nodes and is responsible for end to end error recovery and flow control. When some data will be lost network layer will take care to bring them back. (TCP, UDP) 3. NETWORK – the layer which brings routing, addressing, error handling, internetworking technologies. Makes path to reach the target node through the network. (IP, ICMP) 2 . DATA LINK – responsible for encoding and decoding physical layer into bits. Besides is responsible for error detection and frame synchronization. Data link layer is consists of two sub-layers The Media Access Control (MAC) (addresses layer 3 packets with MAC address, error detection, flow control, access control to the medium)  and the Logical Link Control  (LLC) (“frames” layer 3 packets, identifies using network layer protocol, lost frames retransmission, makes connection with upper layers. (ARP, PPP, HDLC, Ethernet, 802.11) 1 . PHYSICAL – responsible for sending bit stream (electrical signals, light pulse, radio waves) through the network. It provides physical devices including cables, cards, interfaces. (USB, Bluetooth, Ethernet physical layer, SONET) 2. 38

39

40 1 ) Link Layer : Protocols determine how data is physically sent over the network physical layer or medium. Local network connect to which host is attached. Hosts on the same link exchange data packets over the link layer using link layer protocols. Link layer determines how packets are coded and signaled by the h/w device over the medium to which the host is attached. Protocols: A) 802.3-Ethernet: IEEE802.3 is collection of wired Ethernet standards for the link layer. Eg : 802.3 uses co-axial cable; 802.3i uses copper twisted pair connection; 802.3j uses fiber optic connection; 802.3ae uses Ethernet over fiber. B) 802.11-WiFi: IEEE802.11 is a collection of wireless LAN(WLAN ) communication standards including extensive description of link layer. Eg : 802.11a operates in 5GHz band , 802.11b and 802.11g operates in 2.4GHz band, 802.11n operates in 2.4/5GHz band , 802.11ac operates in 5GHz band, 802.11ad operates in 60Ghzband. C) 802.16 - WiMax : IEEE802.16 is a collection of wireless broadband standards including exclusive description of link layer. WiMax provide data rates from 1.5 Mb/s to 1Gb/s . D) 802.15.4-LR-WPAN : IEEE802.15.4 is a collection of standards for low rate wireless personal area network(LR-WPAN). Basis for high level communication protocols such as ZigBee . Provides data rate from 40kb/s to250kb/s . E ) 2G/3G/4G -Mobile Communication: Data rates from 9.6kb/s(2G) to up to100Mb/s(4G).

2) Network/Internet Layer: Responsible for sending IP datagrams from source n/w to destination n/w. Performs the host addressing and packet routing. Datagrams contains source and destination address. Protocols : A) IPv4: Internet Protocol version4 is used to identify the devices on a n/w using a hierarchical addressing scheme. 32 bit address. Allows total of 2** 32addresses. B)IPv6 : Internet Protocol version6 uses 128 bit address scheme and allows 2** 128 addresses. C) 6LOWPAN : ( IPv6 over Low power Wireless Persona lArea Network)operates in 2.4 GHz frequency range and data transfer 250 kb/s 41

C) Transport Layer: Provides end-to-end message transfer capability independent of the underlying n/w. Set up on connection with ACK as in TCP and without ACK as in UDP. Provides functions such as error control, segmentation, flow control and congestion control. Protocols: Transmission control Protocol (TCP) and User Datagram Protocol (UDP) 42

4 ) Application Layer: This layer  provides service  to the users. It gives information to the user.   A ) HTTP: Hyper Text Transfer Protocol for transmitting media documents. it is used to communicate between web browsers and servers . it makes a request to a server and then waits till it receives a response and in between the request server does not keep any data between the two requests.  B) WebSocket : This protocol enables two-way communication between a client and a host that can be run on an untrusted code in a controlled environment. This protocol is commonly used by web browsers . . 43

44

45 B) CoAP : Constrained Application Protocol for machine-to-machine (M2M) applications with constrained devices (Sensors, actuators ,Microcontrollers, Computers etc), constrained environment and constrained n/w. Uses client server architecture.

46 D) MQTT: Message Queue Telemetry Transport is light weight messaging protocol based on publish-subscribe model . Uses client server architecture. Well suited for constrained environment. The MQTT server manages the incoming message and sends it over to the subscriber clients . XMPP: Extensible Message and Presence Protocol for real time communication and streaming Extensible Markup Language( XML) data between network entities.

47 F) AMQP: Advanced Message Queuing Protocol is open application layer protocol for business messaging. Supports both point-to-point and publish-subscribe model.

48 XMPP Protocol :Extensible Message and Presence Protocol for real time communication and streaming XML data between network entities. Support client-server and server-server communication. XML -stands for eXtensible Markup Language. HTML -is Hypertext Markup Language. XML can transport the data and information, HTML can look after the display and presentation of their information. DDS: Data Distribution Service is data centric middleware standards for device-to-device or machine-to-machine communication without Broker . It Uses publish-subscribe model.

LOGICAL DESIGN of IoT Refers to an abstract represent of entities and processes without going into the low level specifies of implementation. 1) IoT Functional Blocks 2 ) IoT Communication Models 3 ) IoT Communiation APIs 49

1) IoT Functional Blocks Provide the system the capabilities for identification, sensing, actuation , communication and management. 1. Device : An IoT system comprises of devices that provide sensing, actuation, monitoring and control functions . 2. Communication : handles the communication for IoT system . 3. Services : for device monitoring, device control services, data publishing services and services for device discovery. 4. Management: Provides various functions to govern the IoT system . 5 Security: Secures IoT system and priority functions such as authentication ,authorization , message and context integrity and data security. 6.Application : IoT application provide an interface that the users can use to control and monitor various aspects of IoT system. 50

2) IoT Communication Models IoTs enable people and things to be connected anytime, in any space, with anything and anyone, through any network and service . Understanding how the different IoT devices communicate with each other is important Request-Response Publish- Subsciber Push-Pull Exclusive Pair 51

1. Request Response Model 52

53 The communication takes place between a client and a server . In this model, basically a client sends requests to the server and the server responds to the requests. That is why it is called as Request-Response model. After receiving the request from the client, the server decides how to respond, fetches the data from the database and its resource representation, prepares a response and ultimately sends the response to the client. Request-Response model is a stateless model . Each request-response pair is independent of others. Example is Hyper Text Transfer Protocol ( HTTP). HTTP operates as a query-response protocol between a client and a server. When we search a query on a browser then the browser submits an HTTP request to the server and then the server returns a response to the browser(client). Other Example(s):-  CoAP   (Constrained Application Protocol)

2. Publish-Subscribe Model(Pub-Sub) 54

55 In this model, you will find three main entities:- Publisher , Broker and Consumer Let us see the roles of each of these 3 entities. Publishers, send the data to the topics that are managed by the broker. They are the source of data. The Man in the Middle, the Broker, has the responsibility to accept the data sent by the publisher and deliver that data to the consumers. What is the task of the Consumers? Consumers will subscribe to the broker-managed topics. Publishers aren't aware of who the consumers are. Once the data is published on a topic, the broker sends this message to all consumers who have subscribed to the specific topic. Example: It works a bit like YouTube . When you subscribe to a channel and tap the Bell icon, you'll get notifications if the YouTube channel posts a video. new article is published on the website it is directly sent to the broker and then the broker sends these new data or posts to all the subscribers.

3) Push-Pull Model 56

57 Here too, we have 3 entities:- Publisher , Queues and Consumers. Push-Pull is a communication model where data producers push data into queues and consumers pull data out of queues. here also producers are not aware of the consumers.  What are Queues? They are used to separate out single producer-consumer communication. Queues act as a buffer which helps in situations when there is a mismatch between the rate at which the producers push data and the rate at which the consumer pull data.(flow control mechanisms). Example When we visit a website we saw a number of posts that are published in a queue and according to our requirements, we click on a post and start reading it.

58 Exclusive Pair communication model

59 It is a bi-directional, fully duplex communication model in which a dedicated communication link is set between the client and the server. Here first set up a connection between the client and the server and remain open until the client sends a close connection request to the server. no exchange of messages would take place between the client and the server when connection closed. The Server has the record of all the connections which has been opened. This model is a state- ful type. Example(s):-  Websockets .

60 Stateless vs State ful protocol In stateless – session information not on server it is present in cache, so multiple request In state- ful – session information on particular server , so auto updation is possible, as server crash information lost, not scalable

What is Stateless and State- ful Protocols? State-less Protocol It is a network model in which the client sends a request to the server and the server in return sends a response back according to the current state just like the Request-Response model. They are very easy to implement on the Internet. In a Stateless architecture, We don’t maintain the state of the user in any particular server, We always stored it in shared storage( cache or database). So that if any server crashed, the state of the user will be safe in the shared location and can be accessed through any server. It is easily scalable . Examples:-  HTTP   (Hypertext Transfer Protocol) ,  UDP   (User Datagram Protocol) ,  DNS  (Domain Name System) . State- ful Protocol In this protocol, suppose a client sends a request to the server and the server doesn't respond, then the client resends a request to the server. Stateful protocols are logically heavy to implement on the Internet. In stateful architecture as a state of the information is maintained in the server, so if there is an issue with the server then the state of the user will be lost. Let's say user A wanted to buy some items from Flipkart / Amazon and added the items in the cart while connected with server 1, then server 1 crashed. So now user A can connect to some other server through load balancer but the state of the user is lost. So the user needs to add all the items to the cart all over again. Examples:-  FTP   (File Transfer Protocol) ,  Telnet . TCP 61

62

IoT Communication APIs API stands for  Application Programming Interface .  An API is an interface used by programs to access an application/Communicate two different Apps. The API acts as a middleman between any two machines that want to connect with each other for a specified task . IoT APIs are the interface points between an IoT device and the Internet and/or other network components. Example : FACEBOOK App and Facebook Server Two Types: HTTP and WebSocket both are communication protocols used in client-server communication. 1) REST based communication APIs(Request-Response Based Model ) : HTTP 2 ) WebSocket based Communication APIs(Exclusive Pair Based Model) : WEBSOCKET 63

1. REST Based API Representational state transfer(REST ) API is an architectural style for building web services that interact via an HTTP protocol. Uses request-response communication model. It is Stateless protocol. Delivers data in the format such as JSON , XML, or HTML format . JavaScript Object Notation (JSON) is a standard text-based format for representing structured data based on JavaScript object syntax. It is commonly used for transmitting data in web applications. Extensible Markup Language (XML) is a simple text-based format for representing structured information: documents, data, configuration, books, transactions, invoices, and much more. Typical data transfer protocols, such as SOAP (Simple Object Access Protocol), offer excellent  data security and integrity  capabilities. But Compared to SOAP, older web services, REST is more flexible and easy to implement. 64

Every URL( Uniform Resource Locator) is known as a Request , whereas the data returned is known as Response . It uses the following HTTP requests : 65

RESTful web services are represented by using URL or URI (Uniform Resource Identifier ) . A  URI  is an  identifier  of a specific resource. Examples:  Books, Documents 66

Client-Server: The principle behind client-server constraint is the separation of concerns. Separation allows client and server to be independently developed and updated . Stateless : Each request from client to server must contain all the info. Necessary to understand the request, and cannot take advantage of any stored context on the server . Cache-able : to improve network efficiency responses must be capable of being labeled ascacheable or non-cacheable. If a response is cache-able, then a client cache is given the right to reuse that response data for later, equivalent requests . Named resources - the system is comprised of resources which are named using a URL. Interconnected resource representations - the representations of the resources areinterconnected using URLs User Interface: constraint requires that the method of communication between a client and a server must be uniform. Uniform interface: all resources are accessed with a generic interface (e.g., HTTP GET,POST , PUT, DELETE). REST Web Services Characteristics 67

68 By using a  Representational State Transfer (REST) API,  developers can augment HTTP to make stateless apps to produce stateful behavior. A stateless application doesn’t save any client session (state) data on the server where the application lives. Instead, it stores all data on the back-end database or externalizes state data into the caches of clients that interact with it. In web applications, stateless apps can behave like stateful ones. By using a  Representational State Transfer (REST) API,  developers can augment HTTP to make stateless apps to produce stateful behavior. An example of this would be your username appearing in a website navbar following a successful login. This stateful behavior is possible because of a session identifier (typically a cookie) that the client saves on its own system. 

2) WebSocket based Communication APIs(Exclusive PairBased Model) WebSocket  is a computer  communications protocol , providing  full-duplex  communication channels over a single  TCP  connection . WebSocket APIs allow bi-directional, full duplex communication between clients and servers. WebSocket APIs follow the exclusive pair communication model. Here first set up a connection between the client and the server and remain open until the client sends a close connection request to the server . WebSocket is a stateful protocol where communication happens over a dedicated TCP connection. On the other hand, HTTP is inherently a stateless protocol. Since communication over WebSocket happens over a reusable TCP connection, the overhead per message is lower compared to HTTP. Hence it can reach higher throughput per server.  REST (Representational State Transfer) is an architectural style which puts a set of constraints on HTTP to create web services. WebSocket does not put any condition on the message to be exchanged 69

70

71 The basis Of Comparison  WebSocket REST HTTP The use of HTTP occurs in the initial connection. HTTP is a common protocol in RESTful web services. Communication Bi-directional in nature. Uni -directional in nature. Nature Socket-based concept. Resources based concept, rather than commands. Scenario Real-time chat application. Lots of getting request. Dependency Based on IP address and port number. Based on the HTTP protocol and uses HTTP methods to relay data. Cost The cost of communication is lower. The cost of communication is comparatively higher than WebSocket . Performance Better with high loads. Great for occasional communication. State WebSocket is a stateful protocol. REST is based on HTTP, which is a stateless protocol. Websocket Vs RESTful

IoT Levels and Deployment Templates Developing an IoT Level Template system consists of the following components: 72

IoT Level-1 A level-1 IoT system has a single node/device that performs sensing and/or actuation, stores data, performs analysis and hosts the application Level-1 IoT systems are suitable for modeling low- cost and low-complexity solutions where the data involved is not big and the analysis requirements are not computationally intensive . Example: Home automation system. 73

74 IOT Deployment Level 1 Example- Home automation system

IoT Level-2 A level-2 IoT system has a single node that performs sensing and/or actuation and local analysis. Data is stored in the cloud and application is usually cloud- based. Level-2 IoT systems are suitable for solutions where the data involved is big, however, the primary analysis requirement is not computationally intensive and can be done locally itself . Example: Smart Irrigation System . 75

76 IOT Deployment Level 2 Example- Smart Irrigation System .

IoT Level-3 A level-3 IoT system has a single node . Data is stored and analyzed in the cloud and application is cloud- based. Analysis at Cloud storage . Level-3 IoT systems are suitable for solutions where the data involved is big and the analysis requirements are computationally intensive . Example: system for tracking package handling 77

78

IoT Level-4 A level-4 IoT system has multiple nodes that perform local analysis. Data is stored in the cloud and application is cloud-based. Level-4 contains local and cloud- based observer nodes which can subscribe to and receive information collected in the cloud from IoT devices. Level-4 IoT systems are suitable for solutions where multiple nodes are required, the data involved is big and the analysis requirements are computationally intensive . Example: IoT system for Noise Monitoring. 79

80 IOT Deployment Level 4 Example- system Noise Monitoring .

81 IoT Level-5 A level-5 IoT system has multiple end nodes and one coordinator node . The end nodes that perform sensing and/or actuation. Coordinator node collects data from the end nodes and sends to the cloud. Data is stored and analyzed in the cloud and application is cloud-based. Level-5 IoT systems are suitable for solutions based on wireless sensor networks, in which the data involved is big and the analysis requirements are computationally intensive . Example: system for Forest Fire Detection.

82 IOT Deployment Level 5 Example- system for Forest Fire Detection .

IoT Level-6 A level-6 IoT system has multiple independent end nodes that perform sensing and/or actuation and send data to the cloud. Data is stored in the cloud and application is cloud-based. The analytics component analyzes the data and stores the results in the cloud database. The results are visualized with the cloud-based application. The centralized controller is aware of the status of all the end nodes and sends control commands to the nodes . Example: system for Weather Monitoring System . 83

84 IOT Deployment Level 6 Example- system for Weather Monitoring System.

IoT Enabled Technologies – Wireless Sensor Networks, Cloud Computing, Embedded Systems, Big Data Analysis, UAV, Web Services 85

86 1. Wireless Sensor Network(WSN): Wireless Sensor Network (WSN)is  deployed in a large area with a large number of wireless sensors nodes( more than 65.000 sensors) in an ad-hoc manner that is used to monitor the system, physical or environmental conditions .  The IEEE 802.15.4 communication protocol is used in the wireless sensor network because he has a low power-consumption and a low range . Zig Bee , WirelessHART are the most popular wireless technologies used by WSNs . The IPv6 addressing scheme used.

WSNs used in IoT systems are described as follows: Weather Monitoring System : in which nodes collect temp, humidity and other data, which is aggregated and analyzed . Indoor air quality monitoring systems : to collect data on the indoor air quality and concentration of various gases . Soil Moisture Monitoring Systems: to monitor soil moisture at various locations . Surveillance Systems: use WSNs for collecting surveillance data(motion data detection ). Smart Grids : use WSNs for monitoring grids at various points. Structural Health Monitoring Systems: Use WSNs to monitor the health of structures(building, bridges) by collecting vibrations from sensor nodes deployed at various points in the structure 87

2) Cloud Computing: Cloud is a collection of servers (networks, storage, service, and hardware) that can be accessed over the Internet, and all data is saved on physical servers in data centers. Through cloud computing, we may access actual servers and execute apps written in computer code on their devices It provides data storage, infrastructure, and application services online Cloud computing is a technology that uses the Everyday life activities such as  Banking, Email, Media Streaming, and Ecommerce  all use the Cloud.  88

89 Services offered to users by Cloud computing.

90 Difference between IAAS ,PAAS & SAAS

91 Real Time Example

92

3) Embedded Systems : It is a computer system that has computer hardware and software embedded to perform specific tasks. Embedded Systems such as digital watches ,as digital cameras, POS terminals, vending machines, appliances etc., 93

94 An embedded device system generally runs as a single application. However, these devices can connect through the internet connection, and able communicate through other network devices.

4) Big Data Analytics: Big data means a large set (petabytes or gigabytes) of structured, unstructured or semi-structured data and analyzing those data to get the insights of the business trend. Data analytics is the science of analyzing raw data to make conclusions about that information. Data analytics help a business optimize its performance, perform more efficiently, maximize profit, or make more strategically-guided decisions . 95

96 Big data analysis Tools

97 Some examples of big data generated by IoT are Sensor data generated by IoT systems. Machine sensor data collected from sensors established in industrial and energy systems. Health and fitness data generated IoT devices. Data generated by IoT systems for location and tracking vehicles. Data generated by retail inventory monitoring systems. Role of Big Data in IoT : IoT big data processing follows four sequential steps – A large amount of unstructured data is generated by IoT devices which are collected in the big data system. This IoT generated big data largely depends on their 3V factors that are volume, velocity(Speed), and variety (type). In the big data system which is basically a shared distributed database, the huge amount of data is stored in big data files . Analyzing the stored IoT big data using analytic tools like Hadoop MapReduce or Spark Generating the reports of analyzed data.

5) Unmanned Aerial Vehicles (UAVs) An unmanned aerial vehicle (UAV) is defined as a "powered, aerial vehicle that does not carry a human operator, uses aerodynamic forces to provide vehicle lift, can fly autonomously or be piloted remotely, can be expendable or recoverable UAVs are used for observation and tactical planning. UAVs are classified based on the altitude range, endurance and weight, and support a wide range of applications including military and commercial applications . ( eg . Drone, 98

6) Web Services Web services are a mechanism for exchanging data between disparate systems that are not developed by the same parties. A web service is any piece of software that makes itself available over the internet to provide services to Machine to Machine and uses a standardized XML messaging system for Web systems. XML stands for eXtensible Markup Language XML is a markup language much like HTML XML was designed to store and transport data XML was designed to be self-descriptive XML tags are not predefined like HyperText Markup Language or  HTML tags There are mainly two types of web services. SOAP web services . SOAP (Simple Object Access Protocol) RESTful web services . Example: Facebook, Gmail (or any popular email website) 99

DOMAIN SPECIFIC Applications IoTs 1) Home Automation: a) Smart Lighting: helps in saving energy by adapting the lighting to the ambient conditions and switching on/off or diming the light when needed. b) Smart Appliances: make the management easier and also provide status information to the users remotely . c) Intrusion Detection: use security cameras and sensors(PIR sensors and door sensors) to detect intrusion and raise alerts. Alerts can be in the form of SMS or email sent to the user. d) Smoke/Gas Detectors: Smoke detectors are installed in homes and buildings to detect smoke that is typically an early sign of fire. Alerts raised by smoke detectors can be in the form of signals to a fire alarm system. Gas detectors can detect the presence of harmful gases such as CO, LPGetc . , 2 ) Cities: a) Smart Parking: make the search for parking space easier and convenient for drivers. Smart parking are powered by IoT systems that detect the no. of empty parking slots and send information over internet to smart application backends . b) Smart Lighting: for roads, parks and buildings can help in saving energy. c) Smart Roads: Equipped with sensors can provide information on driving condition, travel time estimating and alert in case of poor driving conditions, traffic condition and accidents. d) Structural Health Monitoring: uses a network of sensors to monitor the vibration levels in the structures such as bridges and buildings. e) Surveillance: The video feeds from surveillance cameras can be aggregated in cloud based scalable storage solution. 100

3) Environment : a) Weather Monitoring: Systems collect data from a no. of sensors attached and send the data to cloud based applications and storage back ends. The data collected in cloud can then be analyzed and visualized by cloud based applications. b) Air Pollution Monitoring: System can monitor emission of harmful gases(CO2, CO, NO , NO2 etc.,) by factories and automobiles using gaseous and meteorological sensors . The collected data can be analyzed to make informed decisions on pollutions control approaches. c) Noise Pollution Monitoring: Due to growing urban development, noise levels in cities have increased and even become alarmingly high in some cities. IoT based noise pollution monitoring systems use a no. of noise monitoring systems that are deployed at different places in a city. The data on noise levels from the station is collected on servers or in the cloud. The collected data is then aggregated to generate noise maps. d) Forest Fire Detection: Forest fire can cause damage to natural resources, property and human life. Early detection of forest fire can help in minimizing damage. e) River Flood Detection: River floods can cause damage to natural and human resources and human life. Early warnings of floods can be given by monitoring the water level and flow rate. IoT based river flood monitoring system uses a no. of sensor nodes that monitor the water level and flow rate sensors. 101

4) Energy: a) Smart Grids: is a data communication network integrated with the electrical grids that collects and analyze data captured in near-real-time about power transmission, distribution and consumption. Smart grid technology provides predictive information and recommendations to utilities, their suppliers, and their customers on how best to manage power. By using IoT based sensing and measurement technologies, the health of equipment and integrity of the grid can be evaluated. b) Renewable Energy Systems: IoT based systems integrated with the transformers at the point of interconnection measure the electrical variables and how much power is fed into the grid. For wind energy systems, closed-loop controls can be used to regulate the voltage at point of interconnection which coordinate wind turbine outputs and provides power support. c) Prognostics: In systems such as power grids, real-time information is collected using specialized electrical sensors called Phasor Measurment Units(PMUs) at the substations . The information received from PMUs must be monitored in real-time for estimating the state of the system and for predicting failures 5) Retail: a) Inventory Management: IoT systems enable remote monitoring of inventory using data collected by RFIDreaders . b) Smart Payments: Solutions such as contact-less payments powered by technologies such as Near Field Communication(NFC) and Bluetooth. c) Smart Vending Machines: Sensors in a smart vending machines monitors its operations and send the data to cloud which can be used for predictive maintenance . 102

6) Logistics: a) Route generation & scheduling: IoT based system backed by cloud can provide first response to the route generation queries and can be scaled upto serve a large transportation network. b) Fleet Tracking: Use GPS to track locations of vehicles inreal -time. c) Shipment Monitoring: IoT based shipment monitoring systems use sensors such as temp, humidity, to monitor the conditions and send data to cloud, where it can be analyzed to detect foods poilage . d) Remote Vehicle Diagnostics: Systems use on-board IoT devices for collecting data on Vehicle operations(speed, RPMetc .,) and status of various vehicle subsystems. 7 ) Agriculture: a) Smart Irrigation: to determine moisture amount in soil. b) Green House Control: to improve productivity. 8 ) Industry: a) Machine diagnosis and prognosis b) Indoor Air Quality Monitoring 9 ) Health and LifeStyle : a) Health & Fitness Monitoring b) Wearable Electronics 103

104

105 Machine-to-machine Communication (M2M)  M2M stands for  Machine to Machine  communication. It is a direct communication system between the devices using wired or wireless communications channels without any human interaction. It collects the data and shares it with other connected devices

Machine-to-machine Communication (M2M)  M2M communication is the data flow among people, devices, and systems. The data will be interpreted as information for remote control and monitoring. Three basic elements for M2M are: Embedded Processor for storing data Communication Technology for transfer of data Management Applications for monitoring and control M2M stands for machine-to-machine, mobile-to-machine, or man-to-machine communication . Evolution of M2M Technology Telemetry (1845 to 1990s ) :wired data transfer network. M2M systems (1990s to 2010 ): introduction of GSM data connectivity on mobile phones in 1995 (by Siemens ) Wireless technology. Internet  of Things (IOT) (2010 to present ): IoT could be viewed as M2M, but acting in a wider context . (Advanced M2M) The internet of things is the network of connections between M2M devices.   Machine 2 machine devices use the internet of things to transfer their data between devices. 106

107 M2M Applications: A common example of a machine to machine is controlling electrical devices like fans and bulbs using Bluetooth from the smartphone . The most common use of M2M is remote monitoring . For example, a vending machine can notify the merchant in case a product is out of stock. M2M is also used in supply chain management and warehouse management system In telemedicine , M2M allows remote check up on patients. It allows dispensing medicine and allows doctors to track the health status of patients . M2M also contributes heavily to financial activities to allow different purchasing options and examples include Google Wallet and Apple Pay . Finally, M2M also plays a huge part in robotics , traffic management , remote-control software , logistics , fleet management , and automation .

108 IoT systems rely on IP-based networks to send data collected from IoT -connected devices to gateways, the cloud or middleware platforms

109 IOT based Telemedicine Technology Example: Telemedicine system based on machine-to-machine (M2M) technology.  

Difference between IoT and M2M : 110 Data Sharing In M2M, devices may be connected through mobile or any other network. In IoT , data sharing depends on the Internet protocol network. Open API Support In M2M technology, there is no Open API support. IoT technology supports Open API integrations.

111 Make a choice between IoT and M2M Disadvantages of M2M The most major concerns regarding M2M are all about its security. M2M devices work without the involvement of any human. This directly leads to an increase in the security risks such as hacking, information breaches, cybercrimes, unauthorized logins, and so on. M2M is a better option when If you want your devices to have a point to point communication If you want quick communication between a few machines When you need your devices to work even without an internet connection If you are not concerned about scalability IoT is a better choice when If your devices need constant syncing If you want your devices to share information between each other constantly When you require high scalability and better performance in the management of device

Software Defined Network(SDN) A  Software Defined Network  (SDN) is an open approach to managing the network.  A centralized controller remotely controls the routers and switches within the network fabric, which are typically located far away at the network’s edge.  Software-Defined Networking (SDN) technology is an approach to  network management   that separates SDN decouples control-plane (i.e. decision making) from data-plane (the actual forwarding actions) and centralizes the network controller & provides API between them (e.g. OpenFlow API). . In a  conventional network , a routing algorithm is implemented in a distributed fashion in all switches (i.e. generally each switch has its own intelligence and makes its own routing decision). In  SDN architecture   routing algorithms  developed as a program in the controller, it collects all required metadata (e.g. switches, ports, host connections, links, speed, etc ) from the network then make a routing decision for each switch in the network. 112

113 Whereas in SDN, the control plane and data plane are separate entities, where the control plane acts as a  central controller for many data planes .

114

115 SDN Architecture SDN controllers are being sold in market by many big networking vendors/companies. Some examples of these controllers are  Cisco Open SDN controller, Juniper Contrail, Brocade SDN controller, and PFC SDN controller from NEC . Many Open source SDN controllers like Opendaylight , Floodlight, Beacon, Ryu etc. programmable open APIs

SDN Architecture Key elements of SDN: 1) Centralized Network Controller With decoupled control and data planes and centralized network controller, the network administrators can rapidly configure the network(Packet forwarding etc ). 2) Programmable Open APIs SDN architecture supports programmable open APIs for interface between the SDN application and control layers (Northbound interface). 3) Standard Communication Interface( OpenFlow ) SDN architecture uses a standard communication interface between the control plane and infrastructure layers (Southbound interface). OpenFlow , which is defined by the Open Networking Foundation (ONF) is the broadly accepted SDN protocol for the Southbound interface. NOTE: A northbound interface API or   protocol  that allows a lower-level network component to communicate with a higher-level or more central component, A southbound interface allows a higher-level component to send commands to lower-level network components. 116

Advantages/Benefits or of SDN: It enables centralized management of networking devices. It helps in automation of networking devices. It provides improvements to end users . It offers flexibility (as Software based) scalability and efficiency compare to traditional networking . High Security. Disadvantages of SDN: It requires a complete reconfiguration of the network. This increased cost due to reconfiguration . User should be Needs to be trained. Applications of SDN : Security Services. ... Network Intelligence and Monitoring. ... Compliance and Regulation-Bound Applications. ... High-Performance Applications. ... Distributed Application Control and Cloud Integration. 117

118 Network Function Virtualization(NFV)

Network Function Virtualization(NFV) Virtualization uses software that simulates hardware functionality to create a virtual system . NFV aims to transform legacy network infrastructure into virtualized networks. Instead of using dedicated hardware and network equipment NFV relies on virtualized components to deliver service to its users. 119 NFV is a network architecture concept that seeks to virtualize a part of the network infrastructure. As its name suggests, NFV does not simply create virtual network devices such as routers or switches, but also it virtualizes network functions. Examples include network traffic load balancing, implementation of security policies, intrusion detection services, and WAN acceleration. Network functions in a software

120 Virtualized Network Functions (VNFs)  – These are the functions of the network that are being virtualized.. NFV Infrastructure (NFVI)  – This is the physical infrastructure that is used to create and maintain the VNFs. They are composed of real physical hardware resources like CPUs, memory, storage, and network capabilities, and are the physical platforms on which the virtual computing power, storage, and network required for the VNFs are provisioned. NFV Management and Orchestration  – This is the component of the framework that is used to create, launch, and maintain the VNFs, and provides coordination between the NVFI and the VNFs. This is the interface from which the administrator can manage the whole NFV environment. Fig: Architecture of NFV

121 Benefits of NFV : Reduced space needed for network hardware Reduce network power consumption Reduced network maintenance costs Easier network upgrades Longer life cycles for network hardware Reduced maintenance and hardware costs Fig: How NFV fits into the overall network

SDN and NFV 122

SDN and NFV Integration in IOT applications 123 Orchestration is  the automated configuration, management, and coordination of computer systems, applications, and services . Orchestration helps IT to more easily manage complex tasks and workflows.

Thank You 124