Unit 1 Fundamentals of IoT - WordPress.com

36
Unit 1: Fundamentals of IoT SNJB’s Late Sau. K. B. Jain C.O.E. 1 Prepared By: Prof. D. J. Pawar Unit 1 Fundamentals of IoT 1.1 Introduction: IoT systems allow users to achieve deeper automation, analysis, and integration within a system. They improve the reach of these areas and their accuracy. IoT utilizes existing and emerging technology for sensing, networking, and robotics. IoT exploits recent advances in software, falling hardware prices, and modern attitudes towards technology. Its new and advanced elements bring major changes in the delivery of products, goods, and services; and the social, economic, and political impact of those changes. IoT − Key Features The most important features of IoT include artificial intelligence, connectivity, sensors, active engagement, and small device use. A brief review of these features is given below: 1. AI IoT essentially makes virtually anything ―smart‖, meaning it enhances every aspect of life with the power of data collection, artificial intelligence algorithms, and networks. This can mean something as simple as enhancing your refrigerator and cabinets to detect when milk and your favorite cereal run low, and to then place an order with your preferred grocer. 2. Connectivity New enabling technologies for networking, and specifically IoT networking, mean networks are no longer exclusively tied to major providers. Networks can exist on a much smaller and cheaper scale while still being practical. IoT creates these small networks between its system devices. 3. Sensors IoT loses its distinction without sensors. They act as defining instruments which transform IoT from a standard passive network of devices into an active system capable of real-world integration.

Transcript of Unit 1 Fundamentals of IoT - WordPress.com

Unit 1: Fundamentals of IoT SNJB’s Late Sau. K. B. Jain C.O.E.

1 Prepared By: Prof. D. J. Pawar

Unit 1 Fundamentals of IoT 1.1 Introduction:

IoT systems allow users to achieve deeper automation, analysis, and integration

within a system. They improve the reach of these areas and their accuracy. IoT

utilizes existing and emerging technology for sensing, networking, and robotics.

IoT exploits recent advances in software, falling hardware prices, and modern

attitudes towards technology. Its new and advanced elements bring major changes

in the delivery of products, goods, and services; and the social, economic, and

political impact of those changes.

IoT − Key Features

The most important features of IoT include artificial intelligence, connectivity,

sensors, active

engagement, and small device use. A brief review of these features is given below:

1. AI – IoT essentially makes virtually anything ―smart‖, meaning it enhances

every aspect of life with the power of data collection, artificial intelligence

algorithms, and networks. This can mean something as simple as enhancing

your refrigerator and cabinets to detect when milk and your favorite cereal run

low, and to then place an order with your preferred grocer.

2. Connectivity – New enabling technologies for networking, and specifically

IoT networking, mean networks are no longer exclusively tied to major

providers. Networks can exist on a much smaller and cheaper scale while still

being practical. IoT creates these small networks between its system devices.

3. Sensors – IoT loses its distinction without sensors. They act as defining

instruments which transform IoT from a standard passive network of devices

into an active system capable of real-world integration.

Unit 1: Fundamentals of IoT SNJB’s Late Sau. K. B. Jain C.O.E.

Prepared By: Prof. D. J. Pawar 2

4. Active Engagement – Much of today's interaction with connected technology

happens through passive engagement. IoT introduces a new paradigm for

active content, product, or service engagement.

5. Small Devices – Devices, as predicted, have become smaller, cheaper, and

more powerful over time. IoT exploits purpose-built small devices to deliver its

precision, scalability, and versatility.

1.2 Definition of IoT:

The Internet of things refers to a type of network to connect anything with the

Internet based on stipulated protocols through information sensing

equipments to conduct information exchange and communications in order to

achieve smart recognitions, positioning, tracing, monitoring, and

administration.

A dynamic global network infrastructure with self-configuring capabilities

based on standard and interoperable communication protocols where physical

and virtual "things" have identities, physical attributes and virtual personalities,

use intelligent interfaces, are seamlessly integrated into the information

network, and often communicate data associated with users and their

environments.

1.3 Characteristics of IoT:

The fundamental characteristics of the IoT are as follows : 1. Interconnectivity: With regard to the IoT, anything can be interconnected

with the global information and communication infrastructure.

2. Things-related services: The IoT is capable of providing thing-related services within the constraints of things, such as privacy protection and semantic consistency between physical things and their associated virtual things. In order to provide thing-related services within the constraints of things, both the technologies in physical world and information world will change.

3. Heterogeneity: The devices in the IoT are heterogeneous as based on

different hardware platforms and networks. They can interact with other devices or service platforms through different networks.

4. Dynamic changes: The state of devices change dynamically, e.g., sleeping

and waking up, connected and/or disconnected as well as the context of devices including location and speed. Moreover, the number of devices can change dynamically.

5. Enormous scale: The number of devices that need to be managed and that communicate with each other will be at least an order of magnitude larger than the devices connected to the current Internet.

Unit 1: Fundamentals of IoT SNJB’s Late Sau. K. B. Jain C.O.E.

3 Prepared By: Prof. D. J. Pawar

Even more critical will be the management of the data generated and their interpretation for application purposes. This relates to semantics of data, as well as efficient data handling.

6. Safety: As we gain benefits from the IoT, we must not forget about safety. As

both the creators and recipients of the IoT, we must design for safety. This includes the safety of our personal data and the safety of our physical well-being. Securing the endpoints, the networks, and the data moving across all of it means creating a security paradigm that will scale.

7. Connectivity: Connectivity enables network accessibility and compatibility.

Accessibility is getting on a network while compatibility provides the common

ability to consume and produce data.

1.4 Architecture of IoT:

Architecture of IoT

Unit 1: Fundamentals of IoT SNJB’s Late Sau. K. B. Jain C.O.E.

Prepared By: Prof. D. J. Pawar 4

IOT architecture consists of different layers of technologies supporting IOT. It serves

to illustrate how various technologies relate to each other and to communicate the

scalability, modularity and configuration of IOT deployments in different scenarios.

Figure 4 shows detailed architecture of IOT. The functionality of each layer is

described below :

A. smart device / sensor layer:

The lowest layer is made up of smart objects integrated with sensors. The sensors

enable the interconnection of the physical and digital worlds allowing real-time

information to be collected and processed. There are various types of sensors for

different purposes. The sensors have the capacity to take measurements such as

temperature, air quality, speed, humidity, pressure, flow, movement and electricity

etc. In some cases, they may also have a degree of memory, enabling them to

record a certain number of measurements. A sensor can measure the physical

property and convert it into signal that can be understood by an instrument. Sensors

are grouped according to their unique purpose such as environmental sensors, body

sensors, home appliance sensors and vehicle telematics sensors, etc.

Most sensors require connectivity to the sensor gateways. This can be in the form of

a Local Area Network (LAN) such as Ethernet and Wi-Fi connections or Personal

Area Network (PAN) such as ZigBee, Bluetooth and Ultra Wideband (UWB). For

sensors that do not require connectivity to sensor aggregators, their connectivity to

backend servers/applications can be provided using Wide Area Network (WAN) such

as GSM, GPRS and LTE. Sensors that use low power and low data rate

connectivity, they typically form networks commonly known as wireless sensor

networks (WSNs). WSNs are gaining popularity as they can accommodate far more

sensor nodes while retaining adequate battery life and covering large areas.

B. Gateways and Networks :

Massive volume of data will be produced by these tiny sensors and this requires a

robust and high performance wired or wireless network infrastructure as a transport

medium. Current networks, often tied with very different protocols, have been used

to support machine-to-machine (M2M) networks and their applications. With demand

needed to serve a wider range of IOT services and applications such as high speed

transactional services, context-aware applications, etc, multiple networks with

various technologies and access protocols are needed to work with each other in a

heterogeneous configuration. These networks can be in the form of a private, public

or hybrid models and are built to support the communication requirements for

latency, bandwidth or security. Various gateways (microcontroller, microprocessor...)

& gateway networks (WI-FI, GSM, GPRS…) are shown in figure 3.

C. Management Service Layer :

Unit 1: Fundamentals of IoT SNJB’s Late Sau. K. B. Jain C.O.E.

5 Prepared By: Prof. D. J. Pawar

The management service renders the processing of information possible through

analytics, security controls, process modeling and management of devices.

One of the important features of the management service layer is the business and

process rule engines. IOT brings connection and interaction of objects and systems

together providing information in the form of events or contextual data such as

temperature of goods, current location and traffic data. Some of these events require

filtering or routing to post-processing systems such as capturing of periodic sensory

data, while others require response to the immediate situations such as reacting to

emergencies on patient‘s health conditions. The rule engines support the formulation

of decision logics and trigger interactive and automated processes to enable a more

responsive IOT system.

In the area of analytics, various analytics tools are used to extract relevant

information from massive amount of raw data and to be processed at a much faster

rate. Analytics such as in-memory analytics allows large volumes of data to be

cached in random access memory (RAM) rather than stored in physical disks. In-

memory analytics reduces data query time and augments the speed of decision

making. Streaming analytics is another form of analytics where analysis of data,

considered as data-in-motion, is required to be carried out in real time so that

decisions can be made in a matter of seconds.

Data management is the ability to manage data information flow. With data

management in the management service layer, information can be accessed,

integrated and controlled. Higher layer applications can be shielded from the need to

process unnecessary data and reduce the risk of privacy disclosure of the data

source. Data filtering techniques such as data anonymisation, data integration and

data synchronization, are used to hide the details of the information while providing

only essential information that is usable for the relevant applications. With the use of

data abstraction, information can be extracted to provide a common business view of

data to gain greater agility and reuse across domains.

Security must be enforced across the whole dimension of the IOT architecture right

from the smart object layer all the way to the application layer. Security of the system

prevents system hacking and compromises by unauthorized personnel, thus

reducing the possibility of risks.

D. Application Layer :

The IoT application covers ―smart‖ environments/spaces in domains such as:

Transportation, Building, City, Lifestyle, Retail, Agriculture, Factory, Supply chain,

Emergency, Healthcare, User interaction, Culture and tourism, Environment and

Energy.

Unit 1: Fundamentals of IoT SNJB’s Late Sau. K. B. Jain C.O.E.

Prepared By: Prof. D. J. Pawar 6

1.5 ENABLING TECHNOLOGIES FOR IOT :

Internet of things (IoT) is a global infrastructure for the information society,

enabling advanced services by interconnecting (physical and virtual) things based on

existing and evolving interoperable information and communication technologies.

With the Internet of Things the communication is extended via Internet to all

the things that surround us. The Internet of Things is much more than machine to

machine communication, wireless sensor networks, sensor networks , 2G/3G/4G,

GSM, GPRS, RFID, WI-FI, GPS, microcontroller, microprocessor etc. These are

considered as being the enabling technologies that make ―Internet of Things‖

applications possible.

Enabling technologies for the Internet of Things are considered in and can be

grouped into three categories:

(1) technologies that enable ―things‖ to acquire contextual information,

(2) technologies that enable ―things‖ to process contextual information, and

(3) technologies to improve security and privacy.

The first two categories can be jointly understood as functional building blocks

required building ―intelligence‖ into ―things‖, which are indeed the features that

differentiate the IoT from the usual Internet. The third category is not a functional but

rather a de facto requirement, without which the penetration of the IoT would be

severely reduced.

The Internet of Things is not a single technology, but it is a mixture of different

hardware & software technology. The Internet of Things provides solutions based on

the integration of information technology, which refers to hardware and software

used to store, retrieve, and process data and communications technology which

includes electronic systems used for communication between individuals or groups.

Unit 1: Fundamentals of IoT SNJB’s Late Sau. K. B. Jain C.O.E.

7 Prepared By: Prof. D. J. Pawar

There is a heterogeneous mix of communication technologies, which need to be

adapted in order to address the needs of IoT applications such as energy efficiency,

speed, security, and reliability. In this context, it is possible that the level of diversity

will be scaled to a number a manageable connectivity technologies that address the

needs of the IoT applications, are adopted by the market, they have already proved

to be serviceable, supported by a strong technology alliance. Examples of standards

in these categories include wired and wireless technologies like Ethernet, WI-FI,

Bluetooth, ZigBee, GSM, and GPRS.

The key enabling technologies for the Internet of Things is presented in

Figure.

1.6 HISTORY OF IoT:

IoT was originally introduced by the Auto-ID research center at the MIT

(Massachusetts Institute) where an important effort was made to uniquely identify

products. The result was termed EPC (electronic product code), which was then

commercialized by EPCglobal. EPCglobal was created to follow the AutoID

objectives in the industry, with the EAN.UCC (European Article Numbering Uniform

Code Council), now called GS1, as a partner to commercialize Auto-ID research,

mainly the EPC.

A ―thing‖ or ―object‖ is any possible item in the real world that might join the

communication chain. the initial main objective of the IoT was to combine the

communication capabilities characterized by data transmission. This was viewed as

the Internet, also known as the network of bits representing the ―digital world‖. The

process of automation was viewed as connecting the real or physical world, named

the ―network of atoms‖ characterized by the smallest component, which is the atom,

to the digital world, named the ―network of bits‖, characterized by the smallest

component, which is the bit.

Unit 1: Fundamentals of IoT SNJB’s Late Sau. K. B. Jain C.O.E.

Prepared By: Prof. D. J. Pawar 8

Figure 1.1. Origin of IoT [HOD 01]

In 2005, the ITU (International Telecommunication Unit) showed interest in

new telecommunication business possibilities that could be built into services around

the new connectivity of environment objects to the network.

The ITU produced a comprehensive report on the IoT from technical,

economical and ethical views. It introduced a new axis in the ubiquitous networking

path to complete the existing ―anywhere‖ and ―anytime‖ connectivity. It is the

―anything‖ connectivity axes where the thing-to-thing or machine-to-machine

interaction is added to complete the existing person-to-person and person-to-

machine interaction in the possible connectivity framework. This clearly opens new

service opportunities.

Unit 1: Fundamentals of IoT SNJB’s Late Sau. K. B. Jain C.O.E.

9 Prepared By: Prof. D. J. Pawar

Figure 1.2 presents the ITU view of ubiquitous networking, adding the

―anything connection‖ to the connectivity anywhere and anytime.

Figure 1.2. ITU any place, any time and any thing vision [IoT 05]

By adding the ―any thing‖ connection axis, new sources of information are

introduced in the connected network and this enables new services exploiting the

newly-introduced information in the network. These services will be designed to offer

the expected ubiquitous networking, where the real-world environment might react

and adapt to different situations in order to make human life easier and more

comfortable. Connecting these new objects will obviously raise many questions such

as:

the connecting technology of the so-called objects;

the interoperability between objects;

the communication model of these connected objects;

the possible interaction with the existing models, such as the Internet;

the choice of the transport model;

the addressing, identifying and naming;

the security and privacy;

the economic impact and the telecommunication value chain evolution.

Unit 1: Fundamentals of IoT SNJB’s Late Sau. K. B. Jain C.O.E.

Prepared By: Prof. D. J. Pawar 10

1.7 about objects/Things in the IoT

What exactly is a connecting or connected object or a thing? In close-to-

market IoT applications, RFID tags and sensors are connecting inanimate objects

and are building the actual things enabling the first IoT services.

Following the American Auto ID research center description of the IoT and the

European CASAGRAS research project terminology [CAS 08], ―things‖ or ―objects‖

are described as a set of atoms. The atom is the smallest object in the IoT; as could

be seen by nanotechnology, which is one of the enabling technologies of the IoT. A

network of atoms combined with a network of bits falls into what is named the IoT. It

will gather a set of objects connected to the network to help in the execution of new

services enabling the smart world. So with the atom, being the smallest possible

object, it is possible to classify objects based on their size and complexity, their

moveable aspect and whether they are animate or inanimate, as shown in Figure 1.4

In this terminology, classic devices such as PCs and mobile phones are already

connected objects using wired or wireless communication. IoT will extend the

connectivity and interworking of these currently existing objects with new objects

connected through radio sensing or identifying technologies, such as sensor or RFID

Unit 1: Fundamentals of IoT SNJB’s Late Sau. K. B. Jain C.O.E.

11 Prepared By: Prof. D. J. Pawar

networks, allowing the development of new services involving information from the

environment. This information could be either a simple identifier, as with RFID, or

captured information, as with sensors. In other terminologies, common networking

devices such as PCs, laptops and mobile phones are not considered to be objects.

Only small devices, such as sensors, actuators and RFID added to objects

are considered as connected things or objects. Also, machines identified in home

networking (connected consumer electronic devices, such as smart TVs, fridges,

lights, etc.) are also connected objects. In this book, by ―thing‖ or ―object‖ we refer to

daily life and surrounding items connected using radio connectivity, such as sensors,

RFIDs or wired communication such as PLC. These technologies are enabling the

development of new services, orchestrating real-world information via the connected

objects.

Different technologies can be used to interconnect objects. Note that

connecting objects, such as consumer electronics, e.g. a smart fridge or a smart

heater, has started with home networking where consumer appliances are

connected through wired technology, such as PLC, allowing communication through

the power line. A number of standardization and industry organizations are

addressing different issues of the home networking puzzle.

Current home networking applications do not suffer from any resource

limitations. The connected objects (smart fridge, smart TV, etc.) can easily deploy an

existing communication model, such as the TCP/IP model, to allow data

transmission. They are affected more by interoperability problems. This is different

from the issues of new applications of IoT, which rely on sensors and RFIDs where

the resources of the connected objects via radio are limited by energy, memory and

processing capability.

Another concern is how to support the connectivity of heterogenous objects,

when a huge number of these objects/things will be connected by tags or sensors.

Sensor networks have been used in industrial process control. They have allowed

automation of the sense and actuate processes in order to perform automatic

control, maintenance and data collection operations. A large number of potential

environment monitoring applications for RFID and sensor networks are still to come.

In home networking, new applications using sensor and RFID technologies will allow

the automatic control of certain processes, hence minimizing human intervention.

1.8 THE IDENTIFIER IN THE IoT

IP addresses identify nodes in the Internet and serve as locators for routing.

IPv6 allows larger address space than IPv4. In the IoT a large identification space

will be needed to cover the identification of the tremendous number of connected

objects. A specific semantic of these identifiers will follow the application‘s need. In

the IoT, where objects are addressed via identifiers stored into tags and interrogated

by networked readers, the question of unifying and standardizing the identifier‘s size

and structure is critical in order to allow large deployment of services relying on

Unit 1: Fundamentals of IoT SNJB’s Late Sau. K. B. Jain C.O.E.

Prepared By: Prof. D. J. Pawar 12

these new connected objects. Since RFID technology is naturally used for

identification, the standardization of the identifier stored in the RFID is the current IoT

concern. The same question is raised for any addressing schemes used in the

network of objects. In the IP based case, the problem will be more about the

semantics of the identifier, scalability of the addressing space and memory size

limitation of the devices addressed by the chosen address/identifier space.

The term ―identifier‖ is similar to the term ―name‖. A name does not change

with location, in contrast to an ―address‖, which is intended to be used to refer to the

location of a thing. IP addresses are used to route packets between end-systems.

Emerging IoT service providers expect to rely on a convenient identifier space for the

envisioned service, knowing that anything can be assigned an identifier – a physical

object, person, place or logical object. A wide variety of services and applications

can be envisaged once it becomes possible to provide information associated with a

tag identifier in different forms (text, audio or image). For example, in a museum, an

identifier on a tag attached to a painting could be used to find further information on

the painting and the artist. In a grocery store, an identifier on a food package could

be used to check that the food is safe to eat and not a member of a sample that has

been found to be contaminated in some way. Other areas in which identifier-

triggered information access could be valuable are in:

medicine/pharmaceuticals;

agriculture;

libraries;

the retail trade;

the tourist industry;

logistics; and

supply chain management

For example, if we use IP address space for identification, and if a

device/thing has enough memory, we can consider IPv6 address space to be used

as an identifier space of objects, since IPv6 address space is supposed to be large

enough to offer up to 223 addresses in a square meter. Unfortunately, defining an

identifier is not only about the scalability of the identifier space but is also about the

structure and meaning/semantic of the identifier. It is important that an identifier only

plays the role of identification, so that even if the objects identified are mobile, the

identifier remains the same. In the IP communication model, IP addresses play two

roles: from a network point of view, they act as a locator for routing and from an

application point of view they identify hosts for the duration of a communication

session. This dual role is seen to be problematic due to increasing demands for

mobility and the multi-homing of end-systems.

1.9 IoT FRAMEWORKS:

A high levelM2Msystem architecture (HLSA) (see Figure 2.8) is defined in the ETSI

TS 102 690 V1.1.1 (2011–10) specification that is useful to the present discussion.

Unit 1: Fundamentals of IoT SNJB’s Late Sau. K. B. Jain C.O.E.

13 Prepared By: Prof. D. J. Pawar

We describe the HLSA next, summarized from Reference 23. The HLSA comprises

the device and gateway domain, the network domain, and the applications domain.

The device and gateway domain is composed of the following elements:

1. M2Mdevice: A device that runs M2M application(s) using M2M service

capabilities. M2M devices connect to network domain in the following manners:

Case 1 ―Direct Connectivity‖:M2Mdevices connect to the network domain via

the access network. The M2M device performs the procedures such as

Unit 1: Fundamentals of IoT SNJB’s Late Sau. K. B. Jain C.O.E.

Prepared By: Prof. D. J. Pawar 14

registration, authentication, authorization, management, and provisioning with the

network domain. The M2M device may provide service to other devices (e.g., legacy

devices) connected to it that are hidden from the network domain.

Case 2 ―Gateway as a Network Proxy‖: The M2M device connects to the

network domain via an M2M gateway. M2M devices connect to the M2M

gateway using the M2M area network. The M2M gateway acts as a proxy for

the network domain toward the M2M devices that are connected to it.

Examples of procedures that are proxied include authentication, authorization,

management, and provisioning. (M2M devices may be connected to the network

domain via multiple M2M gateways.)

Unit 1: Fundamentals of IoT SNJB’s Late Sau. K. B. Jain C.O.E.

15 Prepared By: Prof. D. J. Pawar

2. M2M area network: It provides connectivity betweenM2Mdevices andM2M

gateways. Examples of M2M area networks include personal area network (PAN)

technologies such as IEEE 802.15.1, Zigbee, Bluetooth, IETF ROLL, ISA100.11a,

among others, or local networks such as power line communication (PLC), M-BUS,

Wireless M-BUS, and KNX.3

3. M2M gateway: A gateway that runs M2M application(s) using M2M service

capabilities. The gateway acts as a proxy betweenM2Mdevices and the network

domain. The M2M gateway may provide service to other devices (e.g., legacy

devices) connected to it that are hidden from the network domain. As an example, an

M2M gateway may run an application that collects and treats various information

(e.g., from sensors and contextual parameters). The network domain is composed of

the following elements:

1. Access network: A network that allows the M2M device and gateway domain to

communicate with the core network. Access networks include (but are not limited to)

digital subscriber line (xDSL), hybrid fiber coax (HFC), satellite, GSM/EDGE radio

access network (GERAN), UMTS terrestrial radio access network (UTRAN), evolved

UMTS terrestrial radio access network (eUTRAN), W-LAN, and worldwide

interoperability for microwave access (WiMAX).

2. Core network: A network that provides the following capabilities (different core

networks offer different features sets):

Unit 1: Fundamentals of IoT SNJB’s Late Sau. K. B. Jain C.O.E.

Prepared By: Prof. D. J. Pawar 16

IP connectivity at a minimum, and possibly other connectivity means

Service and network control functions

Interconnection (with other networks)

Roaming

Core networks (CoNs) include (but are not limited to) 3GPP CoNs, ETSI

TISPAN CoN, and 3GPP2 CoN

3. M2M service capabilities:

Provide M2M functions that are to be shared by different applications

Expose functions through a set of open interfaces

Use CoN functionalities

Simplify and optimize application development and deployment through

hiding of network specificities

The ―M2M service capabilities‖ along with the ―core network‖ is known collectivelyas

the ―M2M core.‖

The applications domain is composed of the following elements:

1. M2M applications: Applications that run the service logic and use M2M

service capabilities accessible via an open interface.

There are also management functions within an overall M2M service provider

domain, as follows:

1. Network management functions: Consists of all the functions required to

manage the access and core networks; these functions include provisioning,

supervision, fault management.

2. M2Mmanagement functions: Consists of all the functions required to manage

M2Mservice capabilities in the network domain. The management of theM2M

devices and gateways uses a specific M2M service capability.

The set of M2M management functions include a function for M2M service

bootstrap. This function is called M2M service bootstrap function (MSBF) and

is realized within an appropriate server. The role of MSBF is to facilitate the

bootstrapping of permanent M2M service layer security credentials in the

M2M device (or M2M gateway) and the M2M service capabilities in the

network domain.

Permanent security credentials that are bootstrapped using MSBF are stored

in a safe location, which is called M2M authentication server (MAS). Such a

server can be an AAA server. MSBF can be included within MAS, or may

communicate the bootstrapped security credentials to MAS, through an

appropriate interface (e.g., the DIAMETER protocol defined in IETF RFC

3588) for the case where MAS is an AAA server.

The H2M portion of the IoT could theoretically make use of these same

mechanisms and capabilities, but the information flow would likely need to be

frontended by an access layer (which can also be seen as an application in the

Unit 1: Fundamentals of IoT SNJB’s Late Sau. K. B. Jain C.O.E.

17 Prepared By: Prof. D. J. Pawar

sense described above) that allows the human user to interact with the machine

using an intuitive interface. One such mechanism can be an HTML/HTTP-based

browser that interacts with a suitable software peer in the machine (naturally this

requires some higher level capabilities to be supported by the DEP/machine in order

to be able to run an embedded web server software module). (When used in

embedded devices or applications, web servers must assume they are secondary to

the essential functions the device or application must perform; as such, the web

server must minimize its resource demands and should be deterministic in the load it

places on a system.4)

1.10 IoT and M-2-M:

At the first look, it may appear that Machine-to-Machine (M2M) communications and

IoT denote the same thing. In reality, M2M is only a subset of IoT. IoT is a more

encompassing phenomenon because it also includes Human-to-Machine

communication (H2M). Radio Frequency Identification (RFID), Location-Based

Services (LBS), Lab-on-a-Chip (LOC), sensors, Augmented Reality (AR), robotics

and vehicle telematics, which are some of the technology innovations that employ

both M2M and H2M communications. Their common feature is to combine

embedded sensory objects with communication intelligence and transporting data

over a mix of wired and wireless networks.

M2M:-M2M stands for ―machine-to-machine‖ communications. Essentially, it is

the exchange of data between a remote machine and a back-end IT infrastructure.

Transfer of data can be two way:

Uplink to collect product / usage information.

Downlink to send instructions.

Machine to Machine refers to the technologies that allows wired / wireless system

to communicate with the devices of same ability. M2M uses a device (sensor, meter,

etc.) to capture an ‗event‘ (temperature, inventory level, etc.), which is relayed

through a network (wireless, wired or hybrid) to an application (software program),

that translates the captured event into meaningful information (e.g., items need to be

restocked).

Thus M2M holds a big prospect of reviving and redefining the operating models

for Telecom Equipment manufacturers and Telecom Operators alike.

With connectivity, traditional hardware makers currently earning margins on a one-

time, per-device basis can realize new recurring revenue and profit streams.

Connected device providers can also reduce or eliminate support costs by allowing

their connected machines to be serviced remotely. The ability for any device or

machine to communicate wirelessly—not just cell phones and PDAs—enables value

beyond what we can even imagine today.

Unit 1: Fundamentals of IoT SNJB’s Late Sau. K. B. Jain C.O.E.

Prepared By: Prof. D. J. Pawar 18

Through connectivity, new value, new products, and new applications that were not

possible even a few years ago are being brought to market as manufacturers realize

enormous benefits from their ability to:

Create new recurring revenues from ongoing services.

Develop whole new product lines that rely on real-time two-way

connectivity

Perform diagnostics and repairs remotely

Monitor machine status and usage in real time

Increase profitability by lowering service costs and improving product

performance

M2M network :-In the past, the high cost of deploying M2M technology made it the

exclusive domain of large organizations that could afford to build and maintain their

own dedicated data networks. Today, the widespread adoption of cellular technology

has made wireless M2M technology available to manufacturers all over the world. As

shown below in figure-3*, wireless M2M applications include connectivity-enabled

devices that use a cellular data link to communicate with the computer server. A

database to store collected data and a software application that allows the data to be

analyzed, reported, and acted upon are also key components of a successful end-to-

end solution.

Capillary Network: - The sensors, communication and processing units act as

endpoints of M2M applications and together constitute the capillary network. The

devices will interconnect amongst themselves over various PAN and LAN

technologies in both Wireless and Wireline domain. Their primary components are

sensors, processors, and radio transceivers. The primary WPAN technology

enablers in this space are ZigBee and Bluetooth. The sensors also known as smart

nodes form Bluetooth piconets or ZigBee networks used for coordination and

transmission of the collected data to the Gateway.

Unit 1: Fundamentals of IoT SNJB’s Late Sau. K. B. Jain C.O.E.

19 Prepared By: Prof. D. J. Pawar

M2M Gateways:-The Gateway module provides control and localization services for

data collection. The gateways also double up in concentrating traffic to the operator‘s

core.It supports Bluetooth, Zig Bee, GPRS capabilities. It supports wireless

communication standards like GSM/GPRS, IEEE 802.11, Bluetooth/IEEE 802.15.1

(supports communication links between devices on short distances) and ZigBee

/IEEE 802.15.4 (used for low speed data transfer between low-power consumer

devices).

M2M applications:-M2M applications as per industry are given below :-

S.No.

Industry / Vertical M2M applications

1. Automotive Passenger vehicle anti theft / recovery, monitoring /maintenance, safety/control, entertainment.

2. Transportation Fleet management, asset tracking, telematics, manufacturing and logistics.

3. Utilities / Energy Smart metering, smart grid, Electric line monitoring, gas / oil / water pipeline monitoring.

4. Security Commercial and home security monitoring, Surveillance applications, Fire alarm, Police / medical alert

5. Financial /Retail Point of sale (POS), ATM, Kiosk, Vending machines, digital signage and handheld terminals.

6. Health care Remote monitoring of patient after surgery (e-health), remote diagnostics, medication reminders, Tele-medicine

7. Public Safety Highway, bridge, traffic management, homeland security, police, fire and emergency services.

Unit 1: Fundamentals of IoT SNJB’s Late Sau. K. B. Jain C.O.E.

Prepared By: Prof. D. J. Pawar 20

1.11 About the Internet in IoT: Connecting objects with different technologies and different communication models raises the question of end-to-end communication between heterogenous systems. IP has in the past answered this question when it interconnected heterogenous networks with different physical and link layers, transporting different types of traffic through the network/IP layer by introducing the new addressing space; the IP addressing and routing schema that allows us to reach any node connected to the IP network as long as it has a routable IP address. In the IoT there are more issues than heterogenity in connecting the new objects and interconnecting the network of objects to the existing network. For this reason, we need to: 1) design or adapt an appropriate communication model to set up the network of objects 2) design or adapt the connectivity of this network of objects to the current Internet where some of the IoT functionalities will be hosted, such as information databases, applications, actuation commands, etc. For the communication model to set up the network of objects, several issues need to be considered. An important issue is the available resources offered by objects, such as battery, memory and processing capability. For instance, tiny objects such as sensors or RFIDs have limited resources. However, other objects in home networking applications, such as a smart TV or smart fridge, might have enough resources. Usually when there are enough resources, the IP addressing and routing model could be considered as the communication model for setting up a network of objects, as long as it respects the application traffic requirement. Another issue is the heterogenity of the connecting objects. Again, the IP model could be considered to handle the connectivity of heterogenous nodes and networks, but this will only be possible if there are enough resources. Tiny objects, such as sensors, RFID, etc. clearly show the limitations of the current IP model, especially with energy consumption. A new adaptation of this model has therefore already been devised in the IETF where the IP model might be used to connect some objects in the IoT, such as sensors under certain parameters. In fact, the IETF 6LoWPAN working group has produced an IPv6-based model to satisfy the sensor environment requirement over IEEE 802.15.4 [IET 08]. ROLL working group has looked at how to adapt the routing process to these new environments and come up with the RPL (remote program load) protocol [IET 08b]. The IP for Smart Objects (IPSO) Alliance, which is a group of more than 100 industrials, is also looking at the adaptation of IP to these smart and tiny devices [IPS]. Note that sensor networks are gaining increasing attention from industry since they can help in building new services and applications in different domains, such as health, agriculture and transport, in anyplace, therefore creating new revenues. It is the same with RFID technology. Before developing more applications and considering more and more objects, however, it is necessary to avoid problems such as scalability, complexity and heterogenity in communication. Internet (current/future) model is considered to be a possible communication framework for the emerging IoT-based services, at least in the short and medium term. To be more generic, we should consider the word Internet in the ―IoT‖ as INTERNETworking of objects, meaning:

transport capability;

heterogenity management;

easy object network management;

easy services development; and

deployment capability.

Unit 1: Fundamentals of IoT SNJB’s Late Sau. K. B. Jain C.O.E.

21 Prepared By: Prof. D. J. Pawar

This could be realized by an adapted version of the IP model or a totally new

communication model, which is expected by the Future Internet/Network worldwide

initiative [EUR 08, FIN 10]. The interconnection of the network of objects to other

networks, such as existing Internet, will depend on the purpose of the

interconnection. We know that IoT applications will orchestrate functionalities from

the current Internet network to allow the transport of traffic generated on IoT nodes

and also allow the local and remote service access.

Another functionality is related to the management of the network of objects with

simple and known tools locally or remotely. Consequently, a network of objects using

the IP model or any other communication model within an objects network has to be

connected to the Internet through some specific gateways, as shown in Figure 1.12.

This allows communication between the network of objects and the worldwide

Internet and enables us to benefit from existing tools, data transport and

management. The gateway will be close to the tag reading or the sensor to handle

the transport of this information on the IP side. For instance, some commands can

be sent from an Internet node towards the network of objects.

In this case, the Internet model should be adapted to support the properties of

this new traffic coming from, and going to, this network of objects. In order to

understand the new traffic properties, it is important to look at the functionalities

required by the IoT service. These emerging services intend to introduce information

from the real-world environment in the network to be processed and then automate

some tasks in the real world; identifying, sensing and actuating are the major

building blocks of an IoT-based service. All these functionalities will generate traffic

that needs to be transported from one point to another on the network. For instance,

the identifying process will generate the identifier information using current identifier

technology; the RFID will be used by the application service located in the network.

The RFID reader can be directly connected to the network or multi-hop away from it.

When using sensors, sensing information is generated by the sensor and has to

be transported to the application process through other sensors; multi-hop transport

model or one hop away from the node running the application. The actuation process

might be triggered locally or remotely through a network and will need efficient

network transport to satisfy the traffic requirement of the actuation service. In any

case, there is a need for efficient information transfer taking into account the limited

resources of current object technologies, such as RFID tags and wireless sensors.

The first proposed architecture by the ITU is shown in Figure 1.6 where the IP

network is selected to transport the identification or sensing information at the edge

of the Internet. It shows a need for an interface for the transport and service planes

of the Internet or NGN (next generation network). The IP network will not be the only

possibility for supporting the transport of information generated by these new IoT-

based services. This is a short- and medium-term view of the IoT applications that

are close to the market. A future network model might emerge to handle the new

Unit 1: Fundamentals of IoT SNJB’s Late Sau. K. B. Jain C.O.E.

Prepared By: Prof. D. J. Pawar 22

requirement of the IoT services and traffic transport based on these tiny devices

suffering from lack of energy, memory and processing resources. More adaptation

and autonomic behavior will be included in the new communication model.

As mentioned by the ITU in Figure 1.6, the industry‘s is considering IP and NGNs

in the short and medium term as the network support for IoT services. This is seen

as a natural step forward to the convergence process in telecommunications seeking

the all IP model. Based on this fact, certain IoT services might be deployed very

quickly as soon as security-related issues are solved, such as privacy related to

RFID deployment. These close-to-market services are using the Internet to run the

application that orchestrates the objects connected to the existing network nodes. In

this context, the user interface to these new services will either be related to fixed or

mobile networks. The actuation process might be triggered locally if it is programmed

to do so, or remotely through a given network based on a certain terminal. For

instance, actuation may be through a mobile phone connected to the emerging 4G

network or any other wireless or mobile network. This has attracted particular

interest from mobile network operators and mobile device manufacturers designing

smart phones with RFID reader capability. In fact, emerging mobile phones could be

used to trigger some IoT services remotely, and also interact locally through a new

reading interface with the objects added to the real environment.

Following the industry approach where the convergence to all IP continues with

the new IoT services, it is important to remind readers of the convergence path to all

IP. As summarized in Figure 1.7, the convergence in telecommunications can be

seen from different angles. The value chain participants; initially telecommunications,

Internet and broadcasting operators offer specific voice, data, and media services

respectively. The convergence will cause these specific operators to offer all three

services at the same time on the same network. In fact, the convergence in

telecommunications will end in the design of a container, named an IP packet, to

Unit 1: Fundamentals of IoT SNJB’s Late Sau. K. B. Jain C.O.E.

23 Prepared By: Prof. D. J. Pawar

transport different information (voice, data and media) in the same network, today

known as the IP network. This transported information has specific properties

satisfied by the corresponding network before convergence and by the IP network

after convergence. This is because IP with quality of service architecture can offer

these multiple services in the same packet-switched network.

Consequently, the convergence also impacts the corresponding communication,

information and entertainment markets. Finally, convergence impacts the design of

devices or interfaces to the corresponding services – terminal (telephone), computer,

and home consumer electronic appliances (e.g. TV). It will push the industries to

design an all-in-one device to access all these services, no matter which physical

network we are connected to, fixed or mobile.

This also has an impact on service management from the network side. The

convergence in telecommunications came with a service-oriented approach, where a

service abstraction layer is introduced and access to a service has to be transparent

from the physical transport of the information generated by this service. IP

multimedia subsystem (IMS) and fixed mobile convergence is a good example of a

service abstraction layer. It is possible to get a service (e.g. telephony) no matter

which physical network the user is connected to thanks to SIP (session initiation

protocol) signaling that introduces a new user identifier to be mapped with the

location of the user at anytime and anywhere.

All IP, which is one concrete answer to the need to converge in

telecommunications, started with the need to optimize network resources of a fixed

telephony network based on a circuit switching model. Initially, there were specific

and dedicated networks with specific nodes and linking technologies to offer one

specific service. In fact, the first network designed was only meant to be used for

telephony. It is the fixed telecommunication network. The data transport network

came mainly with the Internet network and finally the television application was

deployed in another specific network, the TV broadcast network. Designing a specific

network for a specific service is definitely not optimizing resource usage. Using an

end-to-end physical circuit for only one communication, even if there is no voice

transported, is not optimizing resource utilization.

One of the major revolutions in networking is the move from circuit switched

networking to packet switched networking, also known as the IP network, Internet,

TCP/IP network, data network or packet network. IP being the de facto protocol for

interconnecting heterogenous networks, with an additional set of other protocols for

control and management, makes it the convergence vector in the evolving

telecommunication systems. IP was threatened at different times, first by ATM, a

packet-switching network that was too complex and expensive, then switched

Ethernet but was not scalable. IP won due to its simplicity, lower investment

requirements, scalability and ability to carry different services relying on the virtual

circuit switching over packet-switching network. Convergence to what is called all IP

Unit 1: Fundamentals of IoT SNJB’s Late Sau. K. B. Jain C.O.E.

Prepared By: Prof. D. J. Pawar 24

can then be seen at different layers: the transport, management, control and

application development. This has enabled all IP to maximize the revenues of the

telecom companies in the value chain.

Unit 1: Fundamentals of IoT SNJB’s Late Sau. K. B. Jain C.O.E.

25 Prepared By: Prof. D. J. Pawar

1.12 Physical Design of IoT:

Unit 1: Fundamentals of IoT SNJB’s Late Sau. K. B. Jain C.O.E.

Prepared By: Prof. D. J. Pawar 26

IoT Device

IoT Protocols

Unit 1: Fundamentals of IoT SNJB’s Late Sau. K. B. Jain C.O.E.

27 Prepared By: Prof. D. J. Pawar

Unit 1: Fundamentals of IoT SNJB’s Late Sau. K. B. Jain C.O.E.

Prepared By: Prof. D. J. Pawar 28

Unit 1: Fundamentals of IoT SNJB’s Late Sau. K. B. Jain C.O.E.

29 Prepared By: Prof. D. J. Pawar

Unit 1: Fundamentals of IoT SNJB’s Late Sau. K. B. Jain C.O.E.

Prepared By: Prof. D. J. Pawar 30

1.13 Logical Design of IoT:

Unit 1: Fundamentals of IoT SNJB’s Late Sau. K. B. Jain C.O.E.

31 Prepared By: Prof. D. J. Pawar

IOT Communication Models

Request–Response Communication Model

• Request–Response is a communication model in which the client sends

requests to the server and the server responds to the requests.

• When the server receives a request, it decides how to respond, fetches the

data, retrieves resource representations, prepares the response and then

sends the response to the client.

Publish–Subscribe Communication Model

• Publish–Subscribe is a communication model that involves publishers,

brokers and consumers.

• Publishers are the source of data. Publishers send the data to the topics

which are managed by the broker. Publishers are not aware of the

consumers.

• Consumers subscribe to the topics which are managed by the broker.

• When the broker receives data for a topic from the publisher, it sends the data

to all the subscribed consumers.

Unit 1: Fundamentals of IoT SNJB’s Late Sau. K. B. Jain C.O.E.

Prepared By: Prof. D. J. Pawar 32

Push–Pull Communication Model:

• Push–Pull is a communication model in which the data producers push the

data to queues and the consumers pull the data from the queues. Producers

do not need to be aware of the consumers.

• Queues help in decoupling the messaging between the producers and

consumers.

• Queues also act as a buffer which helps in situations when there is a

mismatch between the rate at which the producers push data and the rate at

which the consumers pull data.

Unit 1: Fundamentals of IoT SNJB’s Late Sau. K. B. Jain C.O.E.

33 Prepared By: Prof. D. J. Pawar

Unit 1: Fundamentals of IoT SNJB’s Late Sau. K. B. Jain C.O.E.

Prepared By: Prof. D. J. Pawar 34

Unit 1: Fundamentals of IoT SNJB’s Late Sau. K. B. Jain C.O.E.

35 Prepared By: Prof. D. J. Pawar

Unit 1: Fundamentals of IoT SNJB’s Late Sau. K. B. Jain C.O.E.

Prepared By: Prof. D. J. Pawar 36