Unit 1 Fundamentals of IoT - WordPress.com
Transcript of Unit 1 Fundamentals of IoT - WordPress.com
Unit 1: Fundamentals of IoT SNJB’s Late Sau. K. B. Jain C.O.E.
1 Prepared By: Prof. D. J. Pawar
Unit 1 Fundamentals of IoT 1.1 Introduction:
IoT systems allow users to achieve deeper automation, analysis, and integration
within a system. They improve the reach of these areas and their accuracy. IoT
utilizes existing and emerging technology for sensing, networking, and robotics.
IoT exploits recent advances in software, falling hardware prices, and modern
attitudes towards technology. Its new and advanced elements bring major changes
in the delivery of products, goods, and services; and the social, economic, and
political impact of those changes.
IoT − Key Features
The most important features of IoT include artificial intelligence, connectivity,
sensors, active
engagement, and small device use. A brief review of these features is given below:
1. AI – IoT essentially makes virtually anything ―smart‖, meaning it enhances
every aspect of life with the power of data collection, artificial intelligence
algorithms, and networks. This can mean something as simple as enhancing
your refrigerator and cabinets to detect when milk and your favorite cereal run
low, and to then place an order with your preferred grocer.
2. Connectivity – New enabling technologies for networking, and specifically
IoT networking, mean networks are no longer exclusively tied to major
providers. Networks can exist on a much smaller and cheaper scale while still
being practical. IoT creates these small networks between its system devices.
3. Sensors – IoT loses its distinction without sensors. They act as defining
instruments which transform IoT from a standard passive network of devices
into an active system capable of real-world integration.
Unit 1: Fundamentals of IoT SNJB’s Late Sau. K. B. Jain C.O.E.
Prepared By: Prof. D. J. Pawar 2
4. Active Engagement – Much of today's interaction with connected technology
happens through passive engagement. IoT introduces a new paradigm for
active content, product, or service engagement.
5. Small Devices – Devices, as predicted, have become smaller, cheaper, and
more powerful over time. IoT exploits purpose-built small devices to deliver its
precision, scalability, and versatility.
1.2 Definition of IoT:
The Internet of things refers to a type of network to connect anything with the
Internet based on stipulated protocols through information sensing
equipments to conduct information exchange and communications in order to
achieve smart recognitions, positioning, tracing, monitoring, and
administration.
A dynamic global network infrastructure with self-configuring capabilities
based on standard and interoperable communication protocols where physical
and virtual "things" have identities, physical attributes and virtual personalities,
use intelligent interfaces, are seamlessly integrated into the information
network, and often communicate data associated with users and their
environments.
1.3 Characteristics of IoT:
The fundamental characteristics of the IoT are as follows : 1. Interconnectivity: With regard to the IoT, anything can be interconnected
with the global information and communication infrastructure.
2. Things-related services: The IoT is capable of providing thing-related services within the constraints of things, such as privacy protection and semantic consistency between physical things and their associated virtual things. In order to provide thing-related services within the constraints of things, both the technologies in physical world and information world will change.
3. Heterogeneity: The devices in the IoT are heterogeneous as based on
different hardware platforms and networks. They can interact with other devices or service platforms through different networks.
4. Dynamic changes: The state of devices change dynamically, e.g., sleeping
and waking up, connected and/or disconnected as well as the context of devices including location and speed. Moreover, the number of devices can change dynamically.
5. Enormous scale: The number of devices that need to be managed and that communicate with each other will be at least an order of magnitude larger than the devices connected to the current Internet.
Unit 1: Fundamentals of IoT SNJB’s Late Sau. K. B. Jain C.O.E.
3 Prepared By: Prof. D. J. Pawar
Even more critical will be the management of the data generated and their interpretation for application purposes. This relates to semantics of data, as well as efficient data handling.
6. Safety: As we gain benefits from the IoT, we must not forget about safety. As
both the creators and recipients of the IoT, we must design for safety. This includes the safety of our personal data and the safety of our physical well-being. Securing the endpoints, the networks, and the data moving across all of it means creating a security paradigm that will scale.
7. Connectivity: Connectivity enables network accessibility and compatibility.
Accessibility is getting on a network while compatibility provides the common
ability to consume and produce data.
1.4 Architecture of IoT:
Architecture of IoT
Unit 1: Fundamentals of IoT SNJB’s Late Sau. K. B. Jain C.O.E.
Prepared By: Prof. D. J. Pawar 4
IOT architecture consists of different layers of technologies supporting IOT. It serves
to illustrate how various technologies relate to each other and to communicate the
scalability, modularity and configuration of IOT deployments in different scenarios.
Figure 4 shows detailed architecture of IOT. The functionality of each layer is
described below :
A. smart device / sensor layer:
The lowest layer is made up of smart objects integrated with sensors. The sensors
enable the interconnection of the physical and digital worlds allowing real-time
information to be collected and processed. There are various types of sensors for
different purposes. The sensors have the capacity to take measurements such as
temperature, air quality, speed, humidity, pressure, flow, movement and electricity
etc. In some cases, they may also have a degree of memory, enabling them to
record a certain number of measurements. A sensor can measure the physical
property and convert it into signal that can be understood by an instrument. Sensors
are grouped according to their unique purpose such as environmental sensors, body
sensors, home appliance sensors and vehicle telematics sensors, etc.
Most sensors require connectivity to the sensor gateways. This can be in the form of
a Local Area Network (LAN) such as Ethernet and Wi-Fi connections or Personal
Area Network (PAN) such as ZigBee, Bluetooth and Ultra Wideband (UWB). For
sensors that do not require connectivity to sensor aggregators, their connectivity to
backend servers/applications can be provided using Wide Area Network (WAN) such
as GSM, GPRS and LTE. Sensors that use low power and low data rate
connectivity, they typically form networks commonly known as wireless sensor
networks (WSNs). WSNs are gaining popularity as they can accommodate far more
sensor nodes while retaining adequate battery life and covering large areas.
B. Gateways and Networks :
Massive volume of data will be produced by these tiny sensors and this requires a
robust and high performance wired or wireless network infrastructure as a transport
medium. Current networks, often tied with very different protocols, have been used
to support machine-to-machine (M2M) networks and their applications. With demand
needed to serve a wider range of IOT services and applications such as high speed
transactional services, context-aware applications, etc, multiple networks with
various technologies and access protocols are needed to work with each other in a
heterogeneous configuration. These networks can be in the form of a private, public
or hybrid models and are built to support the communication requirements for
latency, bandwidth or security. Various gateways (microcontroller, microprocessor...)
& gateway networks (WI-FI, GSM, GPRS…) are shown in figure 3.
C. Management Service Layer :
Unit 1: Fundamentals of IoT SNJB’s Late Sau. K. B. Jain C.O.E.
5 Prepared By: Prof. D. J. Pawar
The management service renders the processing of information possible through
analytics, security controls, process modeling and management of devices.
One of the important features of the management service layer is the business and
process rule engines. IOT brings connection and interaction of objects and systems
together providing information in the form of events or contextual data such as
temperature of goods, current location and traffic data. Some of these events require
filtering or routing to post-processing systems such as capturing of periodic sensory
data, while others require response to the immediate situations such as reacting to
emergencies on patient‘s health conditions. The rule engines support the formulation
of decision logics and trigger interactive and automated processes to enable a more
responsive IOT system.
In the area of analytics, various analytics tools are used to extract relevant
information from massive amount of raw data and to be processed at a much faster
rate. Analytics such as in-memory analytics allows large volumes of data to be
cached in random access memory (RAM) rather than stored in physical disks. In-
memory analytics reduces data query time and augments the speed of decision
making. Streaming analytics is another form of analytics where analysis of data,
considered as data-in-motion, is required to be carried out in real time so that
decisions can be made in a matter of seconds.
Data management is the ability to manage data information flow. With data
management in the management service layer, information can be accessed,
integrated and controlled. Higher layer applications can be shielded from the need to
process unnecessary data and reduce the risk of privacy disclosure of the data
source. Data filtering techniques such as data anonymisation, data integration and
data synchronization, are used to hide the details of the information while providing
only essential information that is usable for the relevant applications. With the use of
data abstraction, information can be extracted to provide a common business view of
data to gain greater agility and reuse across domains.
Security must be enforced across the whole dimension of the IOT architecture right
from the smart object layer all the way to the application layer. Security of the system
prevents system hacking and compromises by unauthorized personnel, thus
reducing the possibility of risks.
D. Application Layer :
The IoT application covers ―smart‖ environments/spaces in domains such as:
Transportation, Building, City, Lifestyle, Retail, Agriculture, Factory, Supply chain,
Emergency, Healthcare, User interaction, Culture and tourism, Environment and
Energy.
Unit 1: Fundamentals of IoT SNJB’s Late Sau. K. B. Jain C.O.E.
Prepared By: Prof. D. J. Pawar 6
1.5 ENABLING TECHNOLOGIES FOR IOT :
Internet of things (IoT) is a global infrastructure for the information society,
enabling advanced services by interconnecting (physical and virtual) things based on
existing and evolving interoperable information and communication technologies.
With the Internet of Things the communication is extended via Internet to all
the things that surround us. The Internet of Things is much more than machine to
machine communication, wireless sensor networks, sensor networks , 2G/3G/4G,
GSM, GPRS, RFID, WI-FI, GPS, microcontroller, microprocessor etc. These are
considered as being the enabling technologies that make ―Internet of Things‖
applications possible.
Enabling technologies for the Internet of Things are considered in and can be
grouped into three categories:
(1) technologies that enable ―things‖ to acquire contextual information,
(2) technologies that enable ―things‖ to process contextual information, and
(3) technologies to improve security and privacy.
The first two categories can be jointly understood as functional building blocks
required building ―intelligence‖ into ―things‖, which are indeed the features that
differentiate the IoT from the usual Internet. The third category is not a functional but
rather a de facto requirement, without which the penetration of the IoT would be
severely reduced.
The Internet of Things is not a single technology, but it is a mixture of different
hardware & software technology. The Internet of Things provides solutions based on
the integration of information technology, which refers to hardware and software
used to store, retrieve, and process data and communications technology which
includes electronic systems used for communication between individuals or groups.
Unit 1: Fundamentals of IoT SNJB’s Late Sau. K. B. Jain C.O.E.
7 Prepared By: Prof. D. J. Pawar
There is a heterogeneous mix of communication technologies, which need to be
adapted in order to address the needs of IoT applications such as energy efficiency,
speed, security, and reliability. In this context, it is possible that the level of diversity
will be scaled to a number a manageable connectivity technologies that address the
needs of the IoT applications, are adopted by the market, they have already proved
to be serviceable, supported by a strong technology alliance. Examples of standards
in these categories include wired and wireless technologies like Ethernet, WI-FI,
Bluetooth, ZigBee, GSM, and GPRS.
The key enabling technologies for the Internet of Things is presented in
Figure.
1.6 HISTORY OF IoT:
IoT was originally introduced by the Auto-ID research center at the MIT
(Massachusetts Institute) where an important effort was made to uniquely identify
products. The result was termed EPC (electronic product code), which was then
commercialized by EPCglobal. EPCglobal was created to follow the AutoID
objectives in the industry, with the EAN.UCC (European Article Numbering Uniform
Code Council), now called GS1, as a partner to commercialize Auto-ID research,
mainly the EPC.
A ―thing‖ or ―object‖ is any possible item in the real world that might join the
communication chain. the initial main objective of the IoT was to combine the
communication capabilities characterized by data transmission. This was viewed as
the Internet, also known as the network of bits representing the ―digital world‖. The
process of automation was viewed as connecting the real or physical world, named
the ―network of atoms‖ characterized by the smallest component, which is the atom,
to the digital world, named the ―network of bits‖, characterized by the smallest
component, which is the bit.
Unit 1: Fundamentals of IoT SNJB’s Late Sau. K. B. Jain C.O.E.
Prepared By: Prof. D. J. Pawar 8
Figure 1.1. Origin of IoT [HOD 01]
In 2005, the ITU (International Telecommunication Unit) showed interest in
new telecommunication business possibilities that could be built into services around
the new connectivity of environment objects to the network.
The ITU produced a comprehensive report on the IoT from technical,
economical and ethical views. It introduced a new axis in the ubiquitous networking
path to complete the existing ―anywhere‖ and ―anytime‖ connectivity. It is the
―anything‖ connectivity axes where the thing-to-thing or machine-to-machine
interaction is added to complete the existing person-to-person and person-to-
machine interaction in the possible connectivity framework. This clearly opens new
service opportunities.
Unit 1: Fundamentals of IoT SNJB’s Late Sau. K. B. Jain C.O.E.
9 Prepared By: Prof. D. J. Pawar
Figure 1.2 presents the ITU view of ubiquitous networking, adding the
―anything connection‖ to the connectivity anywhere and anytime.
Figure 1.2. ITU any place, any time and any thing vision [IoT 05]
By adding the ―any thing‖ connection axis, new sources of information are
introduced in the connected network and this enables new services exploiting the
newly-introduced information in the network. These services will be designed to offer
the expected ubiquitous networking, where the real-world environment might react
and adapt to different situations in order to make human life easier and more
comfortable. Connecting these new objects will obviously raise many questions such
as:
the connecting technology of the so-called objects;
the interoperability between objects;
the communication model of these connected objects;
the possible interaction with the existing models, such as the Internet;
the choice of the transport model;
the addressing, identifying and naming;
the security and privacy;
the economic impact and the telecommunication value chain evolution.
Unit 1: Fundamentals of IoT SNJB’s Late Sau. K. B. Jain C.O.E.
Prepared By: Prof. D. J. Pawar 10
1.7 about objects/Things in the IoT
What exactly is a connecting or connected object or a thing? In close-to-
market IoT applications, RFID tags and sensors are connecting inanimate objects
and are building the actual things enabling the first IoT services.
Following the American Auto ID research center description of the IoT and the
European CASAGRAS research project terminology [CAS 08], ―things‖ or ―objects‖
are described as a set of atoms. The atom is the smallest object in the IoT; as could
be seen by nanotechnology, which is one of the enabling technologies of the IoT. A
network of atoms combined with a network of bits falls into what is named the IoT. It
will gather a set of objects connected to the network to help in the execution of new
services enabling the smart world. So with the atom, being the smallest possible
object, it is possible to classify objects based on their size and complexity, their
moveable aspect and whether they are animate or inanimate, as shown in Figure 1.4
In this terminology, classic devices such as PCs and mobile phones are already
connected objects using wired or wireless communication. IoT will extend the
connectivity and interworking of these currently existing objects with new objects
connected through radio sensing or identifying technologies, such as sensor or RFID
Unit 1: Fundamentals of IoT SNJB’s Late Sau. K. B. Jain C.O.E.
11 Prepared By: Prof. D. J. Pawar
networks, allowing the development of new services involving information from the
environment. This information could be either a simple identifier, as with RFID, or
captured information, as with sensors. In other terminologies, common networking
devices such as PCs, laptops and mobile phones are not considered to be objects.
Only small devices, such as sensors, actuators and RFID added to objects
are considered as connected things or objects. Also, machines identified in home
networking (connected consumer electronic devices, such as smart TVs, fridges,
lights, etc.) are also connected objects. In this book, by ―thing‖ or ―object‖ we refer to
daily life and surrounding items connected using radio connectivity, such as sensors,
RFIDs or wired communication such as PLC. These technologies are enabling the
development of new services, orchestrating real-world information via the connected
objects.
Different technologies can be used to interconnect objects. Note that
connecting objects, such as consumer electronics, e.g. a smart fridge or a smart
heater, has started with home networking where consumer appliances are
connected through wired technology, such as PLC, allowing communication through
the power line. A number of standardization and industry organizations are
addressing different issues of the home networking puzzle.
Current home networking applications do not suffer from any resource
limitations. The connected objects (smart fridge, smart TV, etc.) can easily deploy an
existing communication model, such as the TCP/IP model, to allow data
transmission. They are affected more by interoperability problems. This is different
from the issues of new applications of IoT, which rely on sensors and RFIDs where
the resources of the connected objects via radio are limited by energy, memory and
processing capability.
Another concern is how to support the connectivity of heterogenous objects,
when a huge number of these objects/things will be connected by tags or sensors.
Sensor networks have been used in industrial process control. They have allowed
automation of the sense and actuate processes in order to perform automatic
control, maintenance and data collection operations. A large number of potential
environment monitoring applications for RFID and sensor networks are still to come.
In home networking, new applications using sensor and RFID technologies will allow
the automatic control of certain processes, hence minimizing human intervention.
1.8 THE IDENTIFIER IN THE IoT
IP addresses identify nodes in the Internet and serve as locators for routing.
IPv6 allows larger address space than IPv4. In the IoT a large identification space
will be needed to cover the identification of the tremendous number of connected
objects. A specific semantic of these identifiers will follow the application‘s need. In
the IoT, where objects are addressed via identifiers stored into tags and interrogated
by networked readers, the question of unifying and standardizing the identifier‘s size
and structure is critical in order to allow large deployment of services relying on
Unit 1: Fundamentals of IoT SNJB’s Late Sau. K. B. Jain C.O.E.
Prepared By: Prof. D. J. Pawar 12
these new connected objects. Since RFID technology is naturally used for
identification, the standardization of the identifier stored in the RFID is the current IoT
concern. The same question is raised for any addressing schemes used in the
network of objects. In the IP based case, the problem will be more about the
semantics of the identifier, scalability of the addressing space and memory size
limitation of the devices addressed by the chosen address/identifier space.
The term ―identifier‖ is similar to the term ―name‖. A name does not change
with location, in contrast to an ―address‖, which is intended to be used to refer to the
location of a thing. IP addresses are used to route packets between end-systems.
Emerging IoT service providers expect to rely on a convenient identifier space for the
envisioned service, knowing that anything can be assigned an identifier – a physical
object, person, place or logical object. A wide variety of services and applications
can be envisaged once it becomes possible to provide information associated with a
tag identifier in different forms (text, audio or image). For example, in a museum, an
identifier on a tag attached to a painting could be used to find further information on
the painting and the artist. In a grocery store, an identifier on a food package could
be used to check that the food is safe to eat and not a member of a sample that has
been found to be contaminated in some way. Other areas in which identifier-
triggered information access could be valuable are in:
medicine/pharmaceuticals;
agriculture;
libraries;
the retail trade;
the tourist industry;
logistics; and
supply chain management
For example, if we use IP address space for identification, and if a
device/thing has enough memory, we can consider IPv6 address space to be used
as an identifier space of objects, since IPv6 address space is supposed to be large
enough to offer up to 223 addresses in a square meter. Unfortunately, defining an
identifier is not only about the scalability of the identifier space but is also about the
structure and meaning/semantic of the identifier. It is important that an identifier only
plays the role of identification, so that even if the objects identified are mobile, the
identifier remains the same. In the IP communication model, IP addresses play two
roles: from a network point of view, they act as a locator for routing and from an
application point of view they identify hosts for the duration of a communication
session. This dual role is seen to be problematic due to increasing demands for
mobility and the multi-homing of end-systems.
1.9 IoT FRAMEWORKS:
A high levelM2Msystem architecture (HLSA) (see Figure 2.8) is defined in the ETSI
TS 102 690 V1.1.1 (2011–10) specification that is useful to the present discussion.
Unit 1: Fundamentals of IoT SNJB’s Late Sau. K. B. Jain C.O.E.
13 Prepared By: Prof. D. J. Pawar
We describe the HLSA next, summarized from Reference 23. The HLSA comprises
the device and gateway domain, the network domain, and the applications domain.
The device and gateway domain is composed of the following elements:
1. M2Mdevice: A device that runs M2M application(s) using M2M service
capabilities. M2M devices connect to network domain in the following manners:
Case 1 ―Direct Connectivity‖:M2Mdevices connect to the network domain via
the access network. The M2M device performs the procedures such as
Unit 1: Fundamentals of IoT SNJB’s Late Sau. K. B. Jain C.O.E.
Prepared By: Prof. D. J. Pawar 14
registration, authentication, authorization, management, and provisioning with the
network domain. The M2M device may provide service to other devices (e.g., legacy
devices) connected to it that are hidden from the network domain.
Case 2 ―Gateway as a Network Proxy‖: The M2M device connects to the
network domain via an M2M gateway. M2M devices connect to the M2M
gateway using the M2M area network. The M2M gateway acts as a proxy for
the network domain toward the M2M devices that are connected to it.
Examples of procedures that are proxied include authentication, authorization,
management, and provisioning. (M2M devices may be connected to the network
domain via multiple M2M gateways.)
Unit 1: Fundamentals of IoT SNJB’s Late Sau. K. B. Jain C.O.E.
15 Prepared By: Prof. D. J. Pawar
2. M2M area network: It provides connectivity betweenM2Mdevices andM2M
gateways. Examples of M2M area networks include personal area network (PAN)
technologies such as IEEE 802.15.1, Zigbee, Bluetooth, IETF ROLL, ISA100.11a,
among others, or local networks such as power line communication (PLC), M-BUS,
Wireless M-BUS, and KNX.3
3. M2M gateway: A gateway that runs M2M application(s) using M2M service
capabilities. The gateway acts as a proxy betweenM2Mdevices and the network
domain. The M2M gateway may provide service to other devices (e.g., legacy
devices) connected to it that are hidden from the network domain. As an example, an
M2M gateway may run an application that collects and treats various information
(e.g., from sensors and contextual parameters). The network domain is composed of
the following elements:
1. Access network: A network that allows the M2M device and gateway domain to
communicate with the core network. Access networks include (but are not limited to)
digital subscriber line (xDSL), hybrid fiber coax (HFC), satellite, GSM/EDGE radio
access network (GERAN), UMTS terrestrial radio access network (UTRAN), evolved
UMTS terrestrial radio access network (eUTRAN), W-LAN, and worldwide
interoperability for microwave access (WiMAX).
2. Core network: A network that provides the following capabilities (different core
networks offer different features sets):
Unit 1: Fundamentals of IoT SNJB’s Late Sau. K. B. Jain C.O.E.
Prepared By: Prof. D. J. Pawar 16
IP connectivity at a minimum, and possibly other connectivity means
Service and network control functions
Interconnection (with other networks)
Roaming
Core networks (CoNs) include (but are not limited to) 3GPP CoNs, ETSI
TISPAN CoN, and 3GPP2 CoN
3. M2M service capabilities:
Provide M2M functions that are to be shared by different applications
Expose functions through a set of open interfaces
Use CoN functionalities
Simplify and optimize application development and deployment through
hiding of network specificities
The ―M2M service capabilities‖ along with the ―core network‖ is known collectivelyas
the ―M2M core.‖
The applications domain is composed of the following elements:
1. M2M applications: Applications that run the service logic and use M2M
service capabilities accessible via an open interface.
There are also management functions within an overall M2M service provider
domain, as follows:
1. Network management functions: Consists of all the functions required to
manage the access and core networks; these functions include provisioning,
supervision, fault management.
2. M2Mmanagement functions: Consists of all the functions required to manage
M2Mservice capabilities in the network domain. The management of theM2M
devices and gateways uses a specific M2M service capability.
The set of M2M management functions include a function for M2M service
bootstrap. This function is called M2M service bootstrap function (MSBF) and
is realized within an appropriate server. The role of MSBF is to facilitate the
bootstrapping of permanent M2M service layer security credentials in the
M2M device (or M2M gateway) and the M2M service capabilities in the
network domain.
Permanent security credentials that are bootstrapped using MSBF are stored
in a safe location, which is called M2M authentication server (MAS). Such a
server can be an AAA server. MSBF can be included within MAS, or may
communicate the bootstrapped security credentials to MAS, through an
appropriate interface (e.g., the DIAMETER protocol defined in IETF RFC
3588) for the case where MAS is an AAA server.
The H2M portion of the IoT could theoretically make use of these same
mechanisms and capabilities, but the information flow would likely need to be
frontended by an access layer (which can also be seen as an application in the
Unit 1: Fundamentals of IoT SNJB’s Late Sau. K. B. Jain C.O.E.
17 Prepared By: Prof. D. J. Pawar
sense described above) that allows the human user to interact with the machine
using an intuitive interface. One such mechanism can be an HTML/HTTP-based
browser that interacts with a suitable software peer in the machine (naturally this
requires some higher level capabilities to be supported by the DEP/machine in order
to be able to run an embedded web server software module). (When used in
embedded devices or applications, web servers must assume they are secondary to
the essential functions the device or application must perform; as such, the web
server must minimize its resource demands and should be deterministic in the load it
places on a system.4)
1.10 IoT and M-2-M:
At the first look, it may appear that Machine-to-Machine (M2M) communications and
IoT denote the same thing. In reality, M2M is only a subset of IoT. IoT is a more
encompassing phenomenon because it also includes Human-to-Machine
communication (H2M). Radio Frequency Identification (RFID), Location-Based
Services (LBS), Lab-on-a-Chip (LOC), sensors, Augmented Reality (AR), robotics
and vehicle telematics, which are some of the technology innovations that employ
both M2M and H2M communications. Their common feature is to combine
embedded sensory objects with communication intelligence and transporting data
over a mix of wired and wireless networks.
M2M:-M2M stands for ―machine-to-machine‖ communications. Essentially, it is
the exchange of data between a remote machine and a back-end IT infrastructure.
Transfer of data can be two way:
Uplink to collect product / usage information.
Downlink to send instructions.
Machine to Machine refers to the technologies that allows wired / wireless system
to communicate with the devices of same ability. M2M uses a device (sensor, meter,
etc.) to capture an ‗event‘ (temperature, inventory level, etc.), which is relayed
through a network (wireless, wired or hybrid) to an application (software program),
that translates the captured event into meaningful information (e.g., items need to be
restocked).
Thus M2M holds a big prospect of reviving and redefining the operating models
for Telecom Equipment manufacturers and Telecom Operators alike.
With connectivity, traditional hardware makers currently earning margins on a one-
time, per-device basis can realize new recurring revenue and profit streams.
Connected device providers can also reduce or eliminate support costs by allowing
their connected machines to be serviced remotely. The ability for any device or
machine to communicate wirelessly—not just cell phones and PDAs—enables value
beyond what we can even imagine today.
Unit 1: Fundamentals of IoT SNJB’s Late Sau. K. B. Jain C.O.E.
Prepared By: Prof. D. J. Pawar 18
Through connectivity, new value, new products, and new applications that were not
possible even a few years ago are being brought to market as manufacturers realize
enormous benefits from their ability to:
Create new recurring revenues from ongoing services.
Develop whole new product lines that rely on real-time two-way
connectivity
Perform diagnostics and repairs remotely
Monitor machine status and usage in real time
Increase profitability by lowering service costs and improving product
performance
M2M network :-In the past, the high cost of deploying M2M technology made it the
exclusive domain of large organizations that could afford to build and maintain their
own dedicated data networks. Today, the widespread adoption of cellular technology
has made wireless M2M technology available to manufacturers all over the world. As
shown below in figure-3*, wireless M2M applications include connectivity-enabled
devices that use a cellular data link to communicate with the computer server. A
database to store collected data and a software application that allows the data to be
analyzed, reported, and acted upon are also key components of a successful end-to-
end solution.
Capillary Network: - The sensors, communication and processing units act as
endpoints of M2M applications and together constitute the capillary network. The
devices will interconnect amongst themselves over various PAN and LAN
technologies in both Wireless and Wireline domain. Their primary components are
sensors, processors, and radio transceivers. The primary WPAN technology
enablers in this space are ZigBee and Bluetooth. The sensors also known as smart
nodes form Bluetooth piconets or ZigBee networks used for coordination and
transmission of the collected data to the Gateway.
Unit 1: Fundamentals of IoT SNJB’s Late Sau. K. B. Jain C.O.E.
19 Prepared By: Prof. D. J. Pawar
M2M Gateways:-The Gateway module provides control and localization services for
data collection. The gateways also double up in concentrating traffic to the operator‘s
core.It supports Bluetooth, Zig Bee, GPRS capabilities. It supports wireless
communication standards like GSM/GPRS, IEEE 802.11, Bluetooth/IEEE 802.15.1
(supports communication links between devices on short distances) and ZigBee
/IEEE 802.15.4 (used for low speed data transfer between low-power consumer
devices).
M2M applications:-M2M applications as per industry are given below :-
S.No.
Industry / Vertical M2M applications
1. Automotive Passenger vehicle anti theft / recovery, monitoring /maintenance, safety/control, entertainment.
2. Transportation Fleet management, asset tracking, telematics, manufacturing and logistics.
3. Utilities / Energy Smart metering, smart grid, Electric line monitoring, gas / oil / water pipeline monitoring.
4. Security Commercial and home security monitoring, Surveillance applications, Fire alarm, Police / medical alert
5. Financial /Retail Point of sale (POS), ATM, Kiosk, Vending machines, digital signage and handheld terminals.
6. Health care Remote monitoring of patient after surgery (e-health), remote diagnostics, medication reminders, Tele-medicine
7. Public Safety Highway, bridge, traffic management, homeland security, police, fire and emergency services.
Unit 1: Fundamentals of IoT SNJB’s Late Sau. K. B. Jain C.O.E.
Prepared By: Prof. D. J. Pawar 20
1.11 About the Internet in IoT: Connecting objects with different technologies and different communication models raises the question of end-to-end communication between heterogenous systems. IP has in the past answered this question when it interconnected heterogenous networks with different physical and link layers, transporting different types of traffic through the network/IP layer by introducing the new addressing space; the IP addressing and routing schema that allows us to reach any node connected to the IP network as long as it has a routable IP address. In the IoT there are more issues than heterogenity in connecting the new objects and interconnecting the network of objects to the existing network. For this reason, we need to: 1) design or adapt an appropriate communication model to set up the network of objects 2) design or adapt the connectivity of this network of objects to the current Internet where some of the IoT functionalities will be hosted, such as information databases, applications, actuation commands, etc. For the communication model to set up the network of objects, several issues need to be considered. An important issue is the available resources offered by objects, such as battery, memory and processing capability. For instance, tiny objects such as sensors or RFIDs have limited resources. However, other objects in home networking applications, such as a smart TV or smart fridge, might have enough resources. Usually when there are enough resources, the IP addressing and routing model could be considered as the communication model for setting up a network of objects, as long as it respects the application traffic requirement. Another issue is the heterogenity of the connecting objects. Again, the IP model could be considered to handle the connectivity of heterogenous nodes and networks, but this will only be possible if there are enough resources. Tiny objects, such as sensors, RFID, etc. clearly show the limitations of the current IP model, especially with energy consumption. A new adaptation of this model has therefore already been devised in the IETF where the IP model might be used to connect some objects in the IoT, such as sensors under certain parameters. In fact, the IETF 6LoWPAN working group has produced an IPv6-based model to satisfy the sensor environment requirement over IEEE 802.15.4 [IET 08]. ROLL working group has looked at how to adapt the routing process to these new environments and come up with the RPL (remote program load) protocol [IET 08b]. The IP for Smart Objects (IPSO) Alliance, which is a group of more than 100 industrials, is also looking at the adaptation of IP to these smart and tiny devices [IPS]. Note that sensor networks are gaining increasing attention from industry since they can help in building new services and applications in different domains, such as health, agriculture and transport, in anyplace, therefore creating new revenues. It is the same with RFID technology. Before developing more applications and considering more and more objects, however, it is necessary to avoid problems such as scalability, complexity and heterogenity in communication. Internet (current/future) model is considered to be a possible communication framework for the emerging IoT-based services, at least in the short and medium term. To be more generic, we should consider the word Internet in the ―IoT‖ as INTERNETworking of objects, meaning:
transport capability;
heterogenity management;
easy object network management;
easy services development; and
deployment capability.
Unit 1: Fundamentals of IoT SNJB’s Late Sau. K. B. Jain C.O.E.
21 Prepared By: Prof. D. J. Pawar
This could be realized by an adapted version of the IP model or a totally new
communication model, which is expected by the Future Internet/Network worldwide
initiative [EUR 08, FIN 10]. The interconnection of the network of objects to other
networks, such as existing Internet, will depend on the purpose of the
interconnection. We know that IoT applications will orchestrate functionalities from
the current Internet network to allow the transport of traffic generated on IoT nodes
and also allow the local and remote service access.
Another functionality is related to the management of the network of objects with
simple and known tools locally or remotely. Consequently, a network of objects using
the IP model or any other communication model within an objects network has to be
connected to the Internet through some specific gateways, as shown in Figure 1.12.
This allows communication between the network of objects and the worldwide
Internet and enables us to benefit from existing tools, data transport and
management. The gateway will be close to the tag reading or the sensor to handle
the transport of this information on the IP side. For instance, some commands can
be sent from an Internet node towards the network of objects.
In this case, the Internet model should be adapted to support the properties of
this new traffic coming from, and going to, this network of objects. In order to
understand the new traffic properties, it is important to look at the functionalities
required by the IoT service. These emerging services intend to introduce information
from the real-world environment in the network to be processed and then automate
some tasks in the real world; identifying, sensing and actuating are the major
building blocks of an IoT-based service. All these functionalities will generate traffic
that needs to be transported from one point to another on the network. For instance,
the identifying process will generate the identifier information using current identifier
technology; the RFID will be used by the application service located in the network.
The RFID reader can be directly connected to the network or multi-hop away from it.
When using sensors, sensing information is generated by the sensor and has to
be transported to the application process through other sensors; multi-hop transport
model or one hop away from the node running the application. The actuation process
might be triggered locally or remotely through a network and will need efficient
network transport to satisfy the traffic requirement of the actuation service. In any
case, there is a need for efficient information transfer taking into account the limited
resources of current object technologies, such as RFID tags and wireless sensors.
The first proposed architecture by the ITU is shown in Figure 1.6 where the IP
network is selected to transport the identification or sensing information at the edge
of the Internet. It shows a need for an interface for the transport and service planes
of the Internet or NGN (next generation network). The IP network will not be the only
possibility for supporting the transport of information generated by these new IoT-
based services. This is a short- and medium-term view of the IoT applications that
are close to the market. A future network model might emerge to handle the new
Unit 1: Fundamentals of IoT SNJB’s Late Sau. K. B. Jain C.O.E.
Prepared By: Prof. D. J. Pawar 22
requirement of the IoT services and traffic transport based on these tiny devices
suffering from lack of energy, memory and processing resources. More adaptation
and autonomic behavior will be included in the new communication model.
As mentioned by the ITU in Figure 1.6, the industry‘s is considering IP and NGNs
in the short and medium term as the network support for IoT services. This is seen
as a natural step forward to the convergence process in telecommunications seeking
the all IP model. Based on this fact, certain IoT services might be deployed very
quickly as soon as security-related issues are solved, such as privacy related to
RFID deployment. These close-to-market services are using the Internet to run the
application that orchestrates the objects connected to the existing network nodes. In
this context, the user interface to these new services will either be related to fixed or
mobile networks. The actuation process might be triggered locally if it is programmed
to do so, or remotely through a given network based on a certain terminal. For
instance, actuation may be through a mobile phone connected to the emerging 4G
network or any other wireless or mobile network. This has attracted particular
interest from mobile network operators and mobile device manufacturers designing
smart phones with RFID reader capability. In fact, emerging mobile phones could be
used to trigger some IoT services remotely, and also interact locally through a new
reading interface with the objects added to the real environment.
Following the industry approach where the convergence to all IP continues with
the new IoT services, it is important to remind readers of the convergence path to all
IP. As summarized in Figure 1.7, the convergence in telecommunications can be
seen from different angles. The value chain participants; initially telecommunications,
Internet and broadcasting operators offer specific voice, data, and media services
respectively. The convergence will cause these specific operators to offer all three
services at the same time on the same network. In fact, the convergence in
telecommunications will end in the design of a container, named an IP packet, to
Unit 1: Fundamentals of IoT SNJB’s Late Sau. K. B. Jain C.O.E.
23 Prepared By: Prof. D. J. Pawar
transport different information (voice, data and media) in the same network, today
known as the IP network. This transported information has specific properties
satisfied by the corresponding network before convergence and by the IP network
after convergence. This is because IP with quality of service architecture can offer
these multiple services in the same packet-switched network.
Consequently, the convergence also impacts the corresponding communication,
information and entertainment markets. Finally, convergence impacts the design of
devices or interfaces to the corresponding services – terminal (telephone), computer,
and home consumer electronic appliances (e.g. TV). It will push the industries to
design an all-in-one device to access all these services, no matter which physical
network we are connected to, fixed or mobile.
This also has an impact on service management from the network side. The
convergence in telecommunications came with a service-oriented approach, where a
service abstraction layer is introduced and access to a service has to be transparent
from the physical transport of the information generated by this service. IP
multimedia subsystem (IMS) and fixed mobile convergence is a good example of a
service abstraction layer. It is possible to get a service (e.g. telephony) no matter
which physical network the user is connected to thanks to SIP (session initiation
protocol) signaling that introduces a new user identifier to be mapped with the
location of the user at anytime and anywhere.
All IP, which is one concrete answer to the need to converge in
telecommunications, started with the need to optimize network resources of a fixed
telephony network based on a circuit switching model. Initially, there were specific
and dedicated networks with specific nodes and linking technologies to offer one
specific service. In fact, the first network designed was only meant to be used for
telephony. It is the fixed telecommunication network. The data transport network
came mainly with the Internet network and finally the television application was
deployed in another specific network, the TV broadcast network. Designing a specific
network for a specific service is definitely not optimizing resource usage. Using an
end-to-end physical circuit for only one communication, even if there is no voice
transported, is not optimizing resource utilization.
One of the major revolutions in networking is the move from circuit switched
networking to packet switched networking, also known as the IP network, Internet,
TCP/IP network, data network or packet network. IP being the de facto protocol for
interconnecting heterogenous networks, with an additional set of other protocols for
control and management, makes it the convergence vector in the evolving
telecommunication systems. IP was threatened at different times, first by ATM, a
packet-switching network that was too complex and expensive, then switched
Ethernet but was not scalable. IP won due to its simplicity, lower investment
requirements, scalability and ability to carry different services relying on the virtual
circuit switching over packet-switching network. Convergence to what is called all IP
Unit 1: Fundamentals of IoT SNJB’s Late Sau. K. B. Jain C.O.E.
Prepared By: Prof. D. J. Pawar 24
can then be seen at different layers: the transport, management, control and
application development. This has enabled all IP to maximize the revenues of the
telecom companies in the value chain.
Unit 1: Fundamentals of IoT SNJB’s Late Sau. K. B. Jain C.O.E.
25 Prepared By: Prof. D. J. Pawar
1.12 Physical Design of IoT:
Unit 1: Fundamentals of IoT SNJB’s Late Sau. K. B. Jain C.O.E.
Prepared By: Prof. D. J. Pawar 26
IoT Device
IoT Protocols
Unit 1: Fundamentals of IoT SNJB’s Late Sau. K. B. Jain C.O.E.
Prepared By: Prof. D. J. Pawar 30
1.13 Logical Design of IoT:
Unit 1: Fundamentals of IoT SNJB’s Late Sau. K. B. Jain C.O.E.
31 Prepared By: Prof. D. J. Pawar
IOT Communication Models
Request–Response Communication Model
• Request–Response is a communication model in which the client sends
requests to the server and the server responds to the requests.
• When the server receives a request, it decides how to respond, fetches the
data, retrieves resource representations, prepares the response and then
sends the response to the client.
Publish–Subscribe Communication Model
• Publish–Subscribe is a communication model that involves publishers,
brokers and consumers.
• Publishers are the source of data. Publishers send the data to the topics
which are managed by the broker. Publishers are not aware of the
consumers.
• Consumers subscribe to the topics which are managed by the broker.
• When the broker receives data for a topic from the publisher, it sends the data
to all the subscribed consumers.
Unit 1: Fundamentals of IoT SNJB’s Late Sau. K. B. Jain C.O.E.
Prepared By: Prof. D. J. Pawar 32
Push–Pull Communication Model:
• Push–Pull is a communication model in which the data producers push the
data to queues and the consumers pull the data from the queues. Producers
do not need to be aware of the consumers.
• Queues help in decoupling the messaging between the producers and
consumers.
• Queues also act as a buffer which helps in situations when there is a
mismatch between the rate at which the producers push data and the rate at
which the consumers pull data.