Internet Of Things(IoT)
•Internet technology connecting devices, machines and tools to the internet by means of wireless technologies.
• Over 9 billion ‘Things’ connected to the Internet, as of now.
• ‘Things’ connected to the Internet are projected to cross 20 billion in the near future.
• Unification of technologies such as low-power embedded systems, cloud computing, big-data, machine learning, and
networking.
• Some areas identified as IoT enablers:
1. RFID,
2. Nanotechnology,
3. Sensors,
4. Smart Networks.
3.
Definition and Characteristics
•The Internet of Things (IoT)is the network of physical objects that contain embedded technology
to communicate and sense or interact with their internal states or the external environment.
• Characteristics
• Efficient, scalable and associated architecture
• Unambiguous naming and addressing
• Abundance of sleeping nodes, mobile and non-IP devices
• Intermittent connectivity
4.
Modern Day IoTApplications
• Forest Fire Detection
• Air Pollution
• Snow Level Monitoring
• Landslide and Avalanche Prevention
• Earthquake Early Detection
• Water Leakages
• Radiation Levels
• Explosive and Hazardous Gases
• Supply Chain Control
• NFC Payment
• Intelligent Shopping Applications
• Smart Product Management
Baseline Technologies
A numberof technologies that are very closely related to IoT include
• Machine-to-Machine (M2M) communications,
• Cyber-Physical-Systems (CPS)
• Web-of-Things (WoT).
IoT vs M2M
• M2M is part of the IoT, while M2M standards have a prominent place in the IoT standards landscape.
• However, IoT has a broader scope than M2M, since it comprises a broader range of interactions, including
interactions between devices/things, things and people, things with applications and people with applications.
• It also enables the composition of workflows comprising all of the above interactions.
• IoTincludes the notion of internet connectivity (which is provided in most of the networks outlined above), but is
not necessarily focused on the use of Telcom networks.
7.
IoT vs. WoT
•WoT enables access and control over IoT resources and applications using mainstream web technologies.
• The approach to building WoT is therefore based on RESTful principles and REST APIs, which enable both developers and
deployers to benefit from the popularity and maturity of web technologies.
• Still, building the WoT has various scalability, security etc. challenges, especially as part of a roadmap towards a global WoT.
• While IoT is about creating a network of objects, things, people, systems and applications, WoT tries to integrate them to the
Web.
• Technically speaking, WoT can be thought as a flavor/option of an application layer added over the IoT’s network layer.
However, the scope of IoT applications is broader and includes systems that are not accessible through the web (e.g.,
conventional WSN and RFID systems).
8.
Need for IoT
•More data means better decisions
• Ability to track and monitor things
• Lighten the workload with automation
• Increases efficiency by saving money and resources
• Better quality of life
Need an IoT Device Management Platform
• Accelerate Time-to-Market and Reduce Costs
• Enable Secure Device On- and Off-boarding
• Streamline Network Monitoring and Troubleshooting
• Simplify Deployment and Management of Downstream Applications
• Mitigate Security Risks
9.
Sensing
• A sensordetects (senses) changes in the ambient conditions or in the state of another device or a system, and forwards or processes this
information in a certain manner
Sensors
• They perform some input functions by sensing or feeling the physical changes in characteristics of a system in response to a stimuli.
• For example heat is converted to electrical signals in a temperature sensor, or atmospheric pressure is converted to electrical signals in a
barometer.
Transducers
• Transducers convert or transduce energy of one kind into another.
• For example, in a sound system, a microphone (input device) converts sound waves into electrical signals for an amplifier to amplify (a
process), and a loudspeaker (output device) converts these electrical signals back into sound waves
Sensor vs. Transducer
• The word “Transducer” is the collective term used for both Sensors which can be used to sense a wide range of different energy forms such as
movement, electrical signals, radiant energy, thermal or magnetic energy etc., and Actuators which can be used to switch voltages or currents
10.
Features
• It isonly sensitive to the measured property (e.g., A temperature sensor senses the ambient temperature of a room.)
• It is insensitive to any other property likely to be encountered in its application (e.g., A temperature sensor does not bother
about light or pressure while sensing the temperature)
• It does not influence the measured property (e.g., measuring the temperature does not reduce or increase the temperature).
Sensor Classes
11.
Sensor Classes
Analog Sensors
•Analog Sensors produce a continuous output signal or voltage which is generally proportional to the quantity being measured.
• Physical quantities such as Temperature, Speed, Pressure, Displacement, Strain etc. are all analog quantities as they tend to be
continuous in nature.
• For example, the temperature of a liquid can be measured using a thermometer or thermocouple (e.g. in geysers) which
continuously responds to temperature changes as the liquid is heated up or cooled down.
Digital Sensors
• Digital Sensors produce discrete digital output signals or voltages that are a digital representation of the quantity being measured.
• Digital sensors produce a binary output signal in the form of a logic “1” or a logic “0”, (“ON” or “OFF”).
• Digital signal only produces discrete (non continuous) values, which may be output as a single “bit” (serial transmission), or by
‐
combining the bits to produce a single “byte” output (parallel transmission).
12.
Scalar Sensors
• ScalarSensors produce output signal or voltage which is generally proportional to the magnitude of the quantity being measured.
• Physical quantities such as temperature, colour, pressure, strain, etc. are all scalar quantities as only their magnitude is sufficient
to convey an information.
• For example, the temperature of a room can be measured using a thermometer or thermocouple, which responds to temperature
changes irrespective of the orientation of the sensor or its direction.
Vector Sensors
• Vector Sensors produce output signal or voltage which is generally proportional to the magnitude, direction, as well as the
orientation of the quantity being measured.
• Physical quantities such as sound, image, velocity, acceleration, orientation, etc. are all vector quantities, as only their magnitude
is not sufficient to convey the complete information.
• For example, the acceleration of a body can be measured using an accelerometer, which gives the components of acceleration of
the body with respect to the x,y,z coordinate axes.
13.
Actuator
• An actuatoris a component of a machine or system that moves or controls the mechanism or the system
• An actuator is the mechanism by which a control system acts upon an environment
• An actuator requires a control signal and a source of energy.
• Upon receiving a control signal is received, the actuator responds by converting the energy into mechanical
motion.
• The control system can be simple (a fixed mechanical or electronic system), software based (e.g. a printer
‐
driver, robot control system), a human, or any other input.
14.
Actuator Types
Hydraulic Actuators
•A hydraulic actuator consists of a cylinder or fluid motor that uses hydraulic power to facilitate mechanical operation.
• The mechanical motion is converted to linear, rotary or oscillatory motion.
• Since liquids are nearly impossible to compress, a hydraulic actuator exerts considerable force.
• The actuator’s limited acceleration restricts its usage
• Pneumatic Actuators
• A pneumatic actuator converts energy formed by vacuum or compressed air at high pressure into either linear or rotary motion.
• Pneumatic rack and pinion actuators are used for valve controls of water pipes.
• Pneumatic energy quickly responds to starting and stopping signals.
• The power source does not need to be stored in reserve for operation.
• It is responsible for converting pressure into force
15.
Electric Actuators
• Anelectric actuator is generally powered by a motor that converts electrical energy into mechanical torque.
• The electrical energy is used to actuate equipment such as solenoid valves which control the flow of water in pipes in response
to electrical signals.
• Considered as one of the cheapest, cleanest and speedyactuator types available.
Thermal or Magnetic Actuators
• These can be actuated by applying thermal or magnetic energy.
• They tend to be compact, lightweight, economical and with high power density.
• These actuators use shape memory materials (SMMs), such as shape memory alloys (SMAs) or magnetic shape memory alloys
‐
(MSMAs).
• Some popular manufacturers of these devices are Finnish Modti Inc.and American Dynalloy.
16.
Mechanical Actuators
• Amechanical actuator converts rotary motion into linear motion to execute some movement.
• It involves gears, rails, pulleys, chains and other devices to operate.
• Example: rack and pinion.
Soft Actuators
• Soft actuators (e.g. polymer based) are designed to handle fragile objects like fruit harvesting in agriculture or manipulating
the internal organs in biomedicine.
• They typically address challenging tasks in robotics.
• Soft actuators produce flexible motion due to the integration of microscopic changes at the molecular level into a macroscopic
deformation of the actuator materials.
17.
IoT Components
• Componentfor interaction and communication with other IoT devices
• Component for processing and analysis of operations
• Component for Internet interaction
• Components for handling Web services of applications
• Component to integrate application services
• User interface to access IoT
Device
Local Network
Internet
Backend Service
Application
Sensing Layer
• Inthe sensing layer, the wireless smart systems with tags or sensors are now able to automatically sense and exchange information among
different devices.
• These technology advances significantly improve the capability of IoT to sense and identify things or environment.
• In some industry sectors, intelligent service deployment schemes and a universal unique identifier (UUID) are assigned to each service or
device that may be needed.
• A device with UUID can be easily identified and retrieved.
• Thus, UUIDs are critical for successful services deployment in a huge network like IoT
Networking Layer
• The role of networking layer is to connect all things together and allow things to share the information with other connected things.
• In addition, the networking layer is capable of aggregating information from existing IT infrastructures (e.g., business systems, transportation
systems, power grids, healthcare systems, ICT systems, etc.).
• To design the networking layer in IoT, designers need to address issues such as network management technologies for heterogonous networks
(such as fixed, wireless, mobile, etc.), energy efficiency in networks, QoS requirements, service discovery and retrieval, data and signal
processing, security, and privacy
20.
Service Layer
• Servicelayer relies on the middleware technology that provides functionalities to seamlessly integrate services and applications
in IoT.
• The middleware technology provides the IoT with a cost-efficient platform, where the hardware and software platforms can be
reused.
• A main activity in the service layer involves the service specifications for middleware, which are being developed by various
organizations. A well-designed service layer will be able to identify common application requirements
• This layer also processes all service-oriented issues, including information exchange and storage, data management, search
engines, and communication
• This layer includes the following components.
1. Service discovery: finding objects that can offer the needed services and information in an efficient way
2. Service composition: enabling the interaction and communication among connected things. The discovery phase leverage the relationships
among different things to discover the desired service, and the service composition component is to schedule or re-create more suitable
services in order to acquire the most reliable services to meet the request .
21.
Trustworthiness management: aimingat determining trust and reputation mechanisms that can evaluate and use the information
provided by other services to create a trustworthy system
Service APIs: supporting the interactions between services required in IoT
Interface Layer
• There is also a necessity for an interface layer to simplify the management and interconnection of things
• A good interface profile is related to the implementation of Universal Plug and Play (UPnP), which defines a protocol for
facilitating interaction with services provided by various things
• The interface profiles are used to describe the specifications between applications and services. The services on the service
layer run directly on limited network infrastructures in order to effectively find new services for an application, as they connect
to the network. Recently, a SOCRADES integration architecture (SIA) has been proposed to effectively interact between
applications and services
22.
IoT Application Architecture
•The example automatic monitoring system for elderly patients requires data collection and real-time analysis, network connectivity for access to the
infrastructure services, and an application to support user interface and display.
• The IoT architecture for the system consists of three stages: physical, communication, and application.
• The first layer features a multiple-sensor network that evaluates the patient’s vital readings such as nutrition, medical intakes, and physical
activities. Also included in the physical layer is another monitoring network that consists of in-house sensors and actuators to maintain air quality,
temperature, and to analyse and determine any hazardous conditions for the patient.
• The second layer includes OT devices that collect the information gathered by the sensors, translate it into meaningful data streams and transfer
them to a back-end destination. The third layer is where data is received, stored, and processed using cloud-based data analysis engines and
machine learning mechanisms.
• The resulting insights can be used to recommend the proper healthcare service for each specific situation or applied in further research or
management purposes
• The healthcare monitoring system presented must provide accessibility to different users. For example, the healthcare provider, the patient
themselves, and any family members or caregivers. In view of this, one of the challenges of using IoT within healthcare monitoring is providing
data security and privacy. Security can be achieved by having an encryption when transferring the data
• An example is the use of a microprocessor that ensures and provides a secure encryption communication method through a secure socket layer
(SSL).
23.
IoT Categories andChallenges
Industrial IoT
• IoT device connects to an IP network and the global Internet.
• Communication between the nodes done using regular as well as industry specific technologies.
Consumer IoT
• IoT device communicates within the locally networked devices.
• Local communication is done mainly via Bluetooth, Zigbee or WiFi.
• Generally limited to local communication by a Gateway
Challenges
Security Scalability InteInteroperabilityroperability
Energy efficiency Bandwidth management Data storage and Analytics
Modelling and Analysis Interfacing Complexity management
24.
6LoWPAN
• Low powerWireless Personal Area Networks over IPv6.
‐
• Allows for the smallest devices with limited processing ability to transmit information wirelessly using an Internet
protocol.
• Allows low power devices to connect to the Internet.
‐
• Created by the Internet Engineering Task Force (IETF) RFC
‐ 5933 and RFC 4919
Features of 6LoWPANs
• Allows IEEE 802.15.4 radios to carry 128 bit addresses of
‐ Internet Protocol version 6 (IPv6).
• Header compression and address translation techniques allow the IEEE 802.15.4 radios to access the Internet.
• IPv6 packets compressed and reformatted to fit the IEEE 802.15.4 packet format.
• Uses include IoT, Smart grid, and M2M applications.
25.
Addressing And PacketFormat
• 64 bit addresses: globally unique
‐
• 16 bit addresses: PAN specific; assigned by PAN coordinator
• IPv6 multicast not supported by 802.15.4
• IPv6 packets carried as link layer broadcast frames
Packet Format
Header Type: Dispatch Header
• Dispatch: Initiates communication
• 0,1: Identifier for Dispatch Type
• Dispatch:
• 6 bits
• Identifies the next header type
• Type Specific Header:
• Determined by Dispatch header
26.
Header Type: MeshAddressing Header
• 1,0: ID for Mesh Addressing Header
• V: ‘0’ if originator is 64 bit extended address, ‘1’ if 16 bit
‐ ‐ address
• F: ‘0’ if destination is 64 bit addr., ‘1’ if 16 bit addr.
‐ ‐
• Hops Left: decremented by each node before sending to next hop
Header Type: Fragmentation Header
27.
6LoWPAN Routing Considerations
LOADngRouting
• Derived from AODV and extended for use in IoT.
• Basic operations of LOADng include:
• Generation of Route Requests (RREQs) by a LOADng Router (originator) for discovering a route to a destination,
• Forwarding of such RREQs until they reach the destination LOADng Router,
• Generation of Route Replies (RREPs) upon receipt of an RREQ by the indicated destination, and unicast hop by hop forwarding of
‐ ‐
these RREPs towards the originator.
• If a route is detected to be broken, a Route Error (RERR) message is returned to the originator of that data packet to inform the
originator about the route breakage.
• Optimized flooding is supported, reducing the overhead incurred by RREQ generation and flooding.
• Only the destination is permitted to respond to an RREQ.
• Intermediate LOADng Routers are explicitly prohibited from responding to RREQs, even if they may have active routes to the sought
destination.
• RREQ/RREP messages generated by a given LOADng Router share a single unique, monotonically increasing sequence number.
28.
RPL Routing
• DistanceVector IPv6 routing protocol for lossy and low power networks.
• Maintains routing topology using low rate beaconing.
• Beaconing rate increases on detecting inconsistencies (e.g. node/link in a route is down).
• Routing information included in the datagram itself.
• Proactive: Maintaining routing topology.
• Reactive: Resolving routing inconsistencies.
• RPL separates packet processing and forwarding from the routing optimization objective, which helps in Low power Lossy Networks (LLN).
• RPL supports message confidentiality and integrity.
• Supports Data Path Validation and Loop Detection
‐
• Routing optimization objectives include
• minimizing energy
• minimizing latency
• satisfying constraints (w.r.t node power, bandwidth, etc.)
29.
Radio frequency identification(RFID)
‐
•Data digitally encoded in RFID tags, which can be read by a reader.
• Somewhat similar to barcodes.
• Data read from tags are stored in a database by the reader.
• As compared to traditional barcodes and QR codes, RFID tag data can be read outside the line of sight.
‐ ‐
Features
• RFID tag consists of an integrated circuit and an antenna.
• The tag is covered by a protective material which also acts as a shield against various environmental effects.
• Tags may be passive or active.
• Passive RFID tags are the most widely used.
• Passive tags have to be powered by a reader inductively before they can transmit information, whereas active tags have their
own power supply.
30.
Working Principle
• Derivedfrom Automatic Identification and Data Capture (AIDC) technology.
• AIDC performs object identification, object data collection and mapping of the collected data to computer systems with little or
no human intervention.
• AIDC uses wired communication
• RFID uses radio waves to perform AIDC functions.
• The main components of an RFID system include an RFID tag or smart label, an RFID reader, and an antenna.
Applications
• Inventory management
• Asset tracking and Personnel tracking
• Controlling access to restricted areas
• ID badging
• Counterfeit prevention (e.g. in the pharmaceutical industry)
31.
IEEE 802.15.4
• Wellknown standard for low data rate WPAN.
‐ ‐
• Developed for low data rate monitoring and control applications and extended life low power consumption uses.
‐ ‐ ‐ ‐ ‐
• This standard uses only the first two layers (PHY, MAC) plus the logical link control (LLC) and service specific convergence
sub layer (SSCS) additions to communicate with all upper
‐ layers
• Operates in the ISM band
• Uses direct sequence spread spectrum (DSSS) modulation.
• Highly tolerant of noise and interference and offers link reliability improvement mechanisms.
• Low speed versions use Binary Phase Shift Keying (BPSK).
‐
• High data rate versions use offset quadrature phase shift
‐ ‐ ‐ keying (O QPSK).
‐
• Uses carrier sense multiple access with collision avoidance (CSMA CA) for channel access.
‐
• Multiplexing allows multiple users or nodes interference free access to the same channel at different times.
‐
32.
Zigbee
• Most widelydeployed enhancement of IEEE 802.15.4.
• The ZigBee protocol is defined by layer 3 and above. It works with the 802.15.4 layers 1 and 2.
• The standard uses layers 3 and 4 to define additional communication enhancements.
• These enhancements include authentication with valid nodes, encryption for security, and a data routing and forwarding capability that
enables mesh networking.
• The most popular use of ZigBee is wireless sensor networks using the mesh topology.
ZigBee Types
ZigBee Coordinator (ZC):
• The Coordinator forms the root of the ZigBee network tree and might act as a bridge between networks.
• There is a single ZigBee Coordinator in each network, which originally initiates the network.
• It stores information about the network under it and outside it.
• It acts as a Trust Center & repository for security keys.
ZigBee Router (ZR):
• Capable of running applications, as well as relaying information between nodes connected to it.
ZigBee End Device (ZED):
• It contains just enough functionality to talk to the parent node, and it cannot relay data from other devices.
• This allows the node to be asleep a significant amount of the time thereby enhancing battery life.
• Memory requirements and cost of ZEDs are quite low, as compared to ZR or ZC.
33.
ZigBee Network Layer
•The network layer uses Ad Hoc On Demand Distance Vector (AODV)
‐ routing.
• To find the final destination, the AODV broadcasts a route request to all its immediate neighbors.
• The neighbors relay the same information to their neighbors, eventually spreading the request throughout the network.
• Upon discovery of the destination, a low cost path is calculated and
‐ informed to the requesting device via unicast messaging.
Applications
• Building automation
• Remote control (RF4CE or RF for consumer electronics)
• Smart energy for home energy monitoring
• Health care for medical and fitness monitoring
• Home automation for control of smart homes
• Light Link for control of LED lighting
• Telecom services
34.
HART & WirelessHART
• Wireless HART is the latest release of Highway Addressable Remote Transducer (HART) Protocol.
• HART standard was developed for networked smart field devices.
• The wireless protocol makes the implementation of HART cheaper and easier.
• HART encompasses the most numberof field devices incorporated in any field network.
• Wireless HART enables device placements more accessible and cheaper– such as the top of a reaction tank, inside a pipe, or at
widely separated warehouses.
• Main difference between wired and unwired versions is in the physical, data link and network layers.
• Wired HART lacks a network layer of field devices incorporated in any field network.
35.
NFC
• Near fieldcommunication, or NFC for short, is an offshoot of radio frequency
‐ identification (RFID).
• NFC is designed for use by devices within close proximity to each other.
• All NFC types are similar but communicate in slightly different ways.
NFC Types
• Passive devices contain information which is readable by other devices, however it cannot read information itself.
• NFC tags found in supermarket products are examples of passive NFC.
• Active devices are able to collect as well as transmit information.
• Smartphones are a good example of active devices.
Working Principle
• Works on the principle of magnetic induction.
• A reader emits a small electric current which creates a magnetic field that in turn bridges the physical space between the devices.
• .
36.
• The generatedfield is received by a similar coil in the client device where it is turned back into electrical impulses to
communicate data such as identification number status information or any other information.
• ‘Passive’ NFC tags use the energy from the reader to encode their response while ‘active’ or ‘peer to peer’ tags have their own
‐ ‐
power source
NFC Applications
• Smartphone based payments.
• Parcel tracking.
• Information tags in posters and advertisements.
• Computer game synchronized toys.
• Low power home automation systems.
‐
37.
Bluetooth
• Bluetooth wirelesstechnology is a short rangecommunications technology.
• Intended for replacing cables connecting portable units
• Maintains high levels of security.
• Bluetooth technology is based on Ad hoc technology also known as Ad hoc Piconets
‐ ‐
Features
• Bluetooth technology operates in the unlicensed industrial, scientific and medical (ISM) band at 2.4 to 2.485 GHZ.
• Uses spread spectrum hopping, full duplex signal at a nominal rate of 1600 hops/sec.
‐
• Bluetooth supports 1Mbps data rate for version 1.2 and 3Mbps data rate for Version 2.0 combined with Error Data Rate.
• Bluetooth operating range depends on the device
• Class 3 radios have a range of up to 1 meter or 3 feet
• Class 2 radios are most commonly found in mobile devices have arrange of 10 meters or 30 feet
• Class 1 radios are used primarily in industrial use cases have a range of 100 meters or 300 feet.
38.
Z Wave
• Zwave(or Z wave or Z wave) is a protocol for communication among devices used for home automation.
‐
• It uses RF for signaling and control.
• Operating frequency is 908.42 MHz in the US & 868.42 MHz in Europe.
• Mesh network topology is the main mode of operation, and can support 232 nodes in a network.
• Zwave utilizes GFSK modulation and Manchester channel encoding.
• A central network controller device sets up and manages a
‐ Zwave network.
• Each logical Zwave network has 1 Home (Network) ID and multiple node IDs for the devices in it.
• Nodes with different Home IDs cannot communicate witheach other.
• Network ID length=4 Bytes, Node ID length=1 Byte.
GFSK
• Gaussian Frequency Shift Keying.
• Baseband pulses are passed through a Gaussian filter prior to modulation.
• Filtering operation smoothens the pulses consisting of streams of 1 and 1, and is known as Pulse shaping.
‐
• Pulse shaping limits the modulated spectrum width.
39.
Wireless Sensor Networks(WSNs)
• Consists of a large number of sensor nodes, densely deployed over an area.
• Sensor nodes are capable of collaborating with one another and measuring the condition of their surrounding environments (i.e.
Light, temperature, sound, vibration).
• The sensed measurements are then transformed into digital signals and processed to reveal some properties of the phenomena
around sensors.
• Due to the fact that the sensor nodes in WSNs have short radio transmission range, intermediate nodes act as relay nodes to
transmit data towards the sink node using a multi hop path.
‐
Components of a Sensor Node
40.
Sensor Nodes
• Multifunctional
•The number of sensor nodes used depends on the application type.
• Short transmission ranges
• Have OS (e.g., TinyOS).
• Battery Powered – Have limited life
Constraints on Sensor Nodes
• Small size, typically less than a cubic cm.
• Must consume extremely low power
• Operate in an unattended manner in a highly dense area.
• Should have low production cost and be dispensable
• Be autonomous
• Be adaptive to the environment
41.
Applications
• Temperature measurement
•Humidity level
• Lighting condition
• Air pressure
• Soil makeup
• Noise level
• Vibration
Challenges
• Scalability
• Providing acceptable levels of service in the presence of large number of nodes.
• Typically, throughput decreases at a rate of , N = number of nodes.
• Quality of service
• Offering guarantees in terms of bandwidth, delay, jitter, packet loss probability.
• Limited bandwidth, unpredictable changes in RF channel characteristics.
42.
Node Behaviour inWSNs
• Normal nodes work perfectly in ideal environmental conditions
• Failed nodes are simply those that are unable to perform an operation; this could be because of power failure and environmental events.
• Badly failed nodes exhibit features of failed nodes but they can also send false routing messages which are a threat to the integrity of the network.
• Selfish nodes are typified by their unwillingness to cooperate, as the protocol requires whenever there is a personal cost involved. Packet dropping is the
main attack by selfish nodes.
• Malicious nodes aim to deliberately disrupt the correct operation of the routing protocol, denying network service if possible.
Event-Aware Topology Management in Wireless Sensor Networks
• Timely detection of an event of interest
• Monitoring the event
• Disseminating event data to the sink
‐
• Adapting with the changes of event state
• Event location
• Event area
• Event duration
43.
Applications of WSNs:
•Mines
• Fire Monitoring and Alarm System for Underground Coal
• Mines Bord and Pillar Panel Using Wireless Sensor Networks
‐ ‐
• WSN based simulation model for building a fire monitoring and alarm
‐ (FMA) system for Bord & Pillar coal mine.
• The fire monitoring system has been designed specifically for Bord & Pillar based mines
• It is not only capable of providing real time monitoring and alarm in case of a fire, but also capable of providing the exact fire
‐
location and spreading direction by continuously gathering, analyzing, and storing real time information
• Healthcare
• Wireless body area networks (WBANs) have recently gained popularity due to their ability in providing innovative, cost‐
effective, and user friendly solution for continuous monitoring of vital physiological
‐ parameters of patients.
• Monitoring chronic and serious diseases such as cardiovascular diseases and diabetes.
• Could be deployed in elderly persons for monitoring their daily activities.
44.
Machine to MachineCommunication
• Communication between machines or devices with computing and communication facilities.
• Free of any human intervention.
• Similar to industrial supervisory control and data acquisition systems (SCADA).
• SCADA is designed for isolated systems using proprietary solutions, whereas M2M is designed for cross platform
‐ integration.
M2M Applications
• Environmental monitoring
• Civil protection and public safety
• Supply Chain Management (SCM)
• Energy & utility distribution industry (smart grid)
• Intelligent Transport Systems (ITSs)
• Healthcare
45.
M2M Features
• Largenumber of nodes or devices.
• Low cost.
• Energy efficient.
• Small traffic per machine/device.
• Large quantity of collective data.
• M2M communication free from human intervention.
• Human intervention required for operational stability andsustainability.
46.
Interoperability in Internetof Things
Interoperability is a characteristic of a productor system ,whose interfaces are completely understood ,to work with other
products or systems, present or future ,in either implementation or access, without any restrictions.
• Communicate meaningfully
• Exchange data or services
Why Interoperability is required?
• To fulfill the IoT objectives
• Physical objects can interact with any other physical objects and can share their information
• Any device can communicate with other devices anytime from anywhere
• Machine to Machine communication(M2M), Device to Device Communication (D2D), Device to Machine
Communication (D2M)
• Seamless device integration with IoT network
• Heterogeneity
• Different wireless communication protocols such as ZigBee(IEEE 802.15.4), Bluetooth (IEEE 802.15.1), GPRS,
6LowPAN, and Wi-Fi (IEEE 802.11)
• Different wired communication protocols like Ethernet (IEEE 802.3) and Higher Layer LAN Protocols (IEEE 802.1)
• Different programming languages used in computing systems and websites such as JavaScript, JAVA, C, C++, Visual
Basic, PHP, and Python
• Different hardware platforms such as Crossbow, NI, etc.
47.
Introduction to ArduinoProgramming
Features of Arduino
• Open source based electronic programmable board (micro controller)and software(IDE)
• Accepts analog and digital signals as input and gives desired output
• No extra hardware required to load a program into the controller board
Arduino IDE
• Arduino IDE is an open source software that is used to program the Arduino controller board
• Based on variations of the C and C++ programming language
• It can be downloaded from Arduino's official website and installed into PC
Integration of Sensors and Actuators with Arduino
Examples of Arduino programs with sensors and actuators
48.
Introduction to RaspberryPi
• Computer in your palm.
• Single-board computer.
• Low cost.
• Easy to access.
Raspberry Pi GPIO
• Act as both digital output and digital input.
• Output: turn a GPIO pin high or low.
• Input: detect a GPIO pin high or low.
Popular Applications
• Media streamer
• Home automation
• Controlling BOT
• VPN
• Light weight web server for IOT
• Tablet computer
49.
Applications of IoT
•Industrial Application
• https://www.iotworldtoday.com/2017/09/20/top-20-industrial-iot-applications/
IoT Weather Reporting system using Raspberry pi
https://www.irjet.net/archives/V6/i1/IRJET-V6I1220.pdf
Smart Irrigation System Using IoT
https://circuitdigest.com/microcontroller-projects/iot-based-smart-irrigation-system-using-esp8
266-and-soil-moisture-sensor
IoT based (WQMS) system using Arduino
https://create.arduino.cc/projecthub/chanhj/water-quality-monitoring-system-ddcb43