SlideShare une entreprise Scribd logo
1  sur  33
Télécharger pour lire hors ligne
Internet of Things
IoT – Domain Specialist : MC_SSCQ8210_V1.0_IoT-Domain_Specialist_09.04.2019.pdf
SECTOR : IT-ITeS
SUB-SECTOR : FUTURE SKILLS
OCCUPATION : INTERNET OF THINGS
REF ID : SSC/Q8210, V1.0
NSQF LEVEL : 8
Semester V : ECE3501 – IoT Fundamentals
Semester VI : ECE3502 – IoT Domain Analyst
Syllabus is framed based on the
SSC NASSCOM Curriculum
OSI - TCP/IP - IoT
Application Layer
Physical Layer
Application Layer
Network
Layer
App. Services Platform
Network Layer
Datalink Layer
Network Layer Internet Layer
Transport Layer Transport Layer
Session Layer
Presentation Layer
Application Layer
Device Layer
App. Services Layer
App. Protocols Layer
ISO - OSI TCP/IP (Internet) IoT
TCP/IP - IoT
TCP/IP Protocol Stacks IoT Protocol Stacks
IoT
Application
Device
Management
Application Layer CoAP, MQTT, XMPP, AMQP
HTTP, DHCP, DNS, TLS/SSL
Transport Layer UDP,DTLS
TCP/UDP
IPv6/IP routing
6LoWPAN
Internet Layer
Network/Link
Layer
Ethernet(IEEE 802.3),
Wireless LAN(802.11),
Wi-Fi
IPv6, IPv4, IPSec
IEEE 802.15.4 MAC
IEEE 802.15.4 PHY
Web Application
IoT Architecture
Three Layer
Application Layer
Network Layer
Perception Layer
Four Layer
Application Layer
Middleware Layer
Network Layer
Perception Layer
Five Layer
Business Layer
Application Layer
Middleware Layer
Network Layer
Perception Layer
IoT Architecture
Three Layer Five Layer
What is IoT ?
An IoT is a network that connects uniquely identifiable ‘Things’ to the Internet. The ‘Things’ have sensing/actuation and
potential programmability capabilities. Through the exploitation of unique identification and sensing, information about
the ‘Thing’ can be collected and the state of the ‘Thing’ can be changed from anywhere, anytime, by anything.
- (IEEE)
How IoT works?
IoT devices gather data and send it through the internet for processing
Data is analyzed centrally
Instructions based on analysis are returned to the devices
3
1
2
Data Generation & Gathering Data Generation
Data Collection
Data Pre-
processing
Data Storage
Data Analytics
Information
Delivery
Pre-requisite: Computer Networks
ECE3501 - IoT Fundamentals
Course Objectives:
1. To impart knowledge on the infrastructure, sensor technologies and networking technologies
of IoT
2. To analyze, design and develop IoT solutions.
3. To explore the entrepreneurial aspect of the Internet of Things
4. To apply the concept of Internet of Things in the real world scenarios
Expected Course Outcome:
After successfully completing the course the student should be able to
1. Identify the main component of IoT
2. Program the controller and sensor as part of IoT
3. Assess different Internet of Things technologies and their applications
L T P J C
2 0 2 4 4
Module 1: Introduction: (2 Hours)
IT-ITeS/BPM Industry – An Introduction, the relevance of the IT-ITeS sector, Future Skills – An
Introduction, General overview of the Future Skills sub-sector.
Syllabus: 7 Modules; 30 Hours
Module 2: Internet of Things - An Introduction: (3 Hours)
Evolution of IoT and the trends, Impact of IoT on businesses and society, Existing IoT use
cases and applications across industries.
Module 3: IoT Security and Privacy (6 Hours)
Security and privacy risks, analyze security risks, Technologies and methods that mitigate
security, Privacy standards and regulations, Social and privacy impacts.
Module 4: IoT Solutions (6 Hours)
IoT use case development, Need and Goals for IoT solution, Adoption of IoT solutions, Planning
for IoT Solution: Evaluate costs, competition, technology challenges and internal resource
considerations, Need for stakeholder buy-in.
Module 5: Prototyping the Pilot execution (5 Hours)
Prototype developing Stages, deploy real-time UI/UX visualizations, Methods and metrics to
analyze and convey business outcomes, feedback and data obtained from execution.
Module 6: Scalability of IoT Solutions (5 Hours)
Roadmap for developing complete IoT solutions, Strategies for implementation, key Milestone,
Scalability of IoT Solutions, Methods, platforms and tools, Web and Mobile Interfaces.
Module 7: Build and Maintain Relationships at the Workplace, Team Empowerment (3 Hours)
Text Book(s)
1. Arshdeep Bahga, Vijay Madisetti, “Internet of Things: A hands-on Approach”, University Press, 2015.
2. Adrian McEwen & Hakim Cassimally, “Designing the Internet of Things”, Wiley, Nov 2013, (1 st edition)
3. Claire Rowland, Elizabeth Goodman, Martin Charlier, Ann Light, Algred Lui,” Designing Connected
Products: UX for the consumer internet of things”, O’Reilly, (1st edition),2015
Reference Books
1. Rethinking the Internet of things: A Scalable Approach to Connecting Everything by Francis daCosta,
Apress, 2014
2. Learning Internet of Things by Peter Waher, Packt Publishing, 2015
3. Designing the Internet of Things, by Adrian Mcewen, Hakin Cassimally , Wiley India Private Limited
4. Cloud Computing, Thomas Erl, Pearson Education, 2014
5. Foundations of Modern Networking: SDN, NFV, QoE, IoT, and Cloud, William Stallings, Addison-Wesley
Professional; 1 edition
6. https://nsdcindia.org/sites/default/files/MC_SSCQ8210_V1.0_IoT-Domain%20Specialist_09.04.2019.pdf
Rubrics
1. Digital Assignment I (06.09.2021) : 10 Marks
2. Quiz I (18.10.2021 - 22.10.2021) : 10 Marks
3. Quiz II (22.11.2021 - 26.11.2021) : 10 Marks
Theory – Internal Assessment
CAT II: 24.10.2021 to 30.10.2021
CAT I: 12.09.2021 to 18.09.2021
Last Instructional Day: 10.12.2021
Title Submission Review I (20 Marks) Review II (30 Marks) Review III (50 Marks)
14.08.2021 - 15.09.2021 30.08.2021 - 03.09.2021 18.10.2021 - 22.10.2021 29.11.2021 - 03.12.2021
Batch Members, Title,
Abstract, IoT
Platform/Hardware
Implementation (Google
form will be circulated)
Objectives, Problem
Statement, Block Diagram,
Devices/Components/Softw
are used
Proposed Methodology,
part of the project circuit
built, Corresponding
Results
Full project results,
Report
J Component – Internal Assessment
Batch Members: Minimum - 1; Maximum - 3
J Component - Report Format
i. Cover page containing the Title of the Project, Name of the Course, Semester, Students
Name, and Faculty Name.
ii. Declaration
iii. Certificate
iv. Abstract of the work
v. Index
vi. Chapters
1. Introduction
2. Description of the methodologies used
3. Results and discussion
4. Conclusion and Future Scope
5. References
vii. Appendix – Coding
Introduction to
IT – ITeS Industry
1
Introduction
Information and Communication Technology (ICT)
has become one of the basic requirements of the
modern society. In today’s digital era, we use mobile
devices to perform the tasks of our daily life. It is
difficult to think of any event without the use of
digital devices. Information Technology (IT) is one
of the world’s fastest growing economic activities,
which envisages easier flow of information at various
levels in the desired pattern. The Information
Technology enabled Services (ITeS) sector
has not only changed the way the world looks at our
country but has also made significant contributions
to the Indian economy. This session will introduce
the basic concepts and ideas related to Information
Technology (IT) and IT enabled Services (ITeS).
Information Technology
Information Technology (IT) means creating, managing,
storing and exchanging information. IT includes all
types of technology used to deal with information,
such as computer hardware and software technology
Unit 1.indd 1 9/6/2018 12:10:38 PM
Domestic Data Entry Operator – Class IX
2
used for creating, storing, and transferring information.
Computer takes data as input, processes it and
produces the results as output. The information is the
result of data processing. Data refers to the facts or raw
material, which are processed to get the information.
Number of boys and girls in a class is a factual data of
the classroom. This is an example of data related to the
students in the class. Some conclusion can be drawn
based on the data. This conclusion is information. The
decisions are taken on the basis of data and information.
IT is a tightly integrated part of business. Computers
and information systems are an essential part of every
businesstoday.Likeaccountingandlegal,everybusiness
needs to invest in technology to compete. IT has several
benefits for a business, such as it helps in reaching more
potential customers, developing a business relationship
with potential customers, streamlining operations,
reducing costs, improving efficiency, maximising profit,
minimising waste, providing better service to customers,
supporting better relationships with key partners, and
allowing customers to better guide the business.
Information Technology enabled Services
(ITeS)
Information Technology that enables the business
by improving the quality of service is Information
Technology enabled Services (ITeS). ITeS is also called
web-enabled services or remote services that cover the
entire operations which exploit Information Technology
for improving the efficiency of an organisation. These
servicesprovideawiderangeofcareeroptionsthatinclude
opportunities in all offices like call centres, payrolls,
logistics management, revenue claims processing,
medical billing, coding, medical transcription, legal
databases, back office operations, content development,
GIS (geographical information system), web services
and Human Resource (HR) services, etc.
ITeS is defined as outsourcing of processes that
can be enabled with information technology and
covers diverse areas like finance, HR, administration,
health care, telecommunication, manufacturing, etc.
Notes
Unit 1.indd 2 9/6/2018 12:10:38 PM
Introduction to IT–ITeS Industry 3
Notes
E-enabled services radically reduce costs and improve
service standards. In short, Internet service provider
aims to provide B2B e-commerce solutions. ITeS
offers different services integrated in a single delivery
mechanism to end users. The services may include:
Medical Transcription, Customer Relationship
Management, Data Entry and Data Processing,
Software development, Data Warehousing, IT Help
Desk Services, Enterprise Resource Planning and
Telecommunication Services.
BPO services
Business Process Outsourcing (BPO) services means
performing business operations through an outside
service provider. BPO also comes under IT services as
IT plays a very useful role in optimising the business
performance. The BPO industry is highly organised and
hence various kinds of jobs are outsourced in India.
India has the expertise in reducing costs with firm
control on the quality of the service.
Some of the BPO services are as follows:
	 (a)	 Financial and Accounting Services
	 (b)	 Taxation and Insurance Services
	 (c)	 E-Publishing and Web Promotion
	 (d)	 Legal Services and Content Writing
	 (e)	 Multimedia and Design Services
	 (f)	 Document Management Services
	 (g)	 Software Testing Services
	 (h)	 Health Care Services
BPM industry in India
The IT BPM (Business Process Management) industry
hasbeenfuelingIndia’sgrowth.Inadditiontocontributing
towards the country’s Gross Domestic Product (GDP)
and exports, the growth of the IT BPM industry has
provided India with a wide range of economic and social
benefits which includes creating employment, raising
income levels, and promoting exports. It has placed India
on the world map with an image of a technologically
advanced and knowledge‑based economy. This sector
attracts amongst the largest investments by venture
Unit 1.indd 3 9/6/2018 12:10:38 PM
Domestic Data Entry Operator – Class IX
4
Notes capitalist and has been credited with enabling the
entrepreneurial ventures of many in the country.
The IT-BPM industry has almost doubled in terms of
revenueandcontributiontoIndia’sGDPoverthelastdecade
(2008–18). BPO Service Industry is doing exceptionally
well in India because of the following advantages:
	 (a)	 BPO service providers in India invest in hi-tech
hardware and software to deliver the best of
services. They follow quality checks to ensure
error free and exceptional service.
	 (b)	 Government of India is encouraging the BPO
Industry in India by providing necessary
infrastructure and logistical support.
	 (c)	 BPO Industry in India is highly developed and
capable of delivering numerous types of BPO
services in exceptional quality.
Structure of the IT-BPM industry
The organisations within the IT‑BPM industry are
categorised along the following parameters:
•	 Sector the organisation is serving
•	 Type as well as range of offering the organisation
provides
•	 Geographic spread of operations
•	 Revenues and size of operations
	
(a)	 Multinational Companies (MNCs): MNCs have
their headquarters outside India but operate in
multiple locations worldwide including those in
India. They cater to external clients (both domestic
and/or global).
	
(b)	 Indian Service Providers (ISPs): ISPs started
with their operations in India. Most of these
organisations have their headquarters in India
while having offices in many international
locations. While most have a client base,
which is global as well as domestic, there are
some that have focussed on serving only the
Indian clients.
	
(c)	
Global In-house Centers (GIC): 
GIC
organisations cater to the needs of their parent
company only and do not serve external clients.
Unit 1.indd 4 9/6/2018 12:10:38 PM
Introduction to IT–ITeS Industry 5
This model allows the organisation the option to
keep IT Operations in-house and at the same time
take advantage of expanding their global footprint
and offering opportunities for innovation in a
cost-effective manner.
IT applications
In technologically developed nations, Information
Technology has become a part of everyday life. For a
user, computer is a tool that provides the desired
information, whenever needed. The use of computer
and Information Technology can be observed at home,
workplace, in the modern service industry and in all
aspects of our life. It includes listening to music,
watching movies, playing games, doing office work,
chatting and sending messages, managing daily planner,
reading books, paying utility bills, booking ticket to
travel, bank operations, etc. Computers and ICT is used
in industries, in offices, and in house also. The various
application areas are business, banking, insurance,
education, marketing, health care, engineering design,
military, communication, animation, research, agriculture
and government.
IT in home computing
A personal computer (PC) is used to work at home, to
do household accounts, play games, surf the web, use
Fig. 1.1: IT applications
Unit 1.indd 5 9/6/2018 12:10:38 PM
Domestic Data Entry Operator – Class IX
6
e-mail, create music, and pursue a
range of other hobbies. PC is also
used to play games. It includes action
games, role playing games, puzzles
and many more. A PC with a CD-ROM
drive, sound card, and speakers can
play audio CD. A computer can be
used from home to study a wide range
of online training courses. Computers
and digital devices are now used for
online shopping and e-commerce.
IT in everyday life
In our daily life, we use washing
machines, microwave oven and many
other products using which have
embedded software. We can store all
the information about our important
work, appointments schedules and list
of contacts in a computer. Computer
is, therefore, playing a very important
role in our lives and now we cannot
imagine the world without computers.
IT in library
Nowadays many libraries are
computerised. Each book has a
barcode associated with it. This
makes it easier for the library to
a keep track of books and the
availability of a specific book.
Computer software is used to issue
and return the book. Each book
in the library has a magnetic strip
attached to it that is deactivated
before the book can be borrowed.
IT at workplace
In the office environment, computers
and computer applications are used
to perform office work more effectively.
Fig. 1.3: IT in everyday life
Fig. 1.5: IT in library
Fig. 1.2: IT in home computing
Unit 1.indd 6 9/6/2018 12:10:39 PM
Introduction to IT–ITeS Industry 7
In assembly-line industries, where
attention to detail, speed and efficiency
are important, automation is becoming
more and more common. Internet and
Office applications form the basis of
modern business.
IT in education
Computers and Information Technology are extensively
used in education for teaching-learning and assessment.
Thesoftwareandhardwaretechnology
is used for creation and transmission
of information in various forms
including still pictures, audio, video
and animation to the learners. The
learning becomes easy and accessible
through IT. A lot of teaching resources
are available for teachers to teach
in a better way. Online assessment
helps to assess the students without
any biasness. The students, teachers and educational
administrators and every stakeholder in the education
sector has benefitted with the integration of IT in
education.
(a) ICT in the classroom
There are many ways in which the ICT is used for
education in the classroom, such as
	 •	 e-learning classrooms;
	 •	 smart-board presentations;
	 •	 videos on experiments;
	 •	 creation of images and video;
	 •	 desktop publishing of magazines, letters and
documents;
	 •	 educational games;
	 •	 learning using the CD-ROM media; and
	 •	 gathering educational information on the
Internet.
(b) Education — anywhere anytime
Any student in India can access the NCERT book online
through the website www.epathshala.nic.in or mobile app.
Fig. 1.6: IT in education
Fig. 1.4: IT at workplace
Unit 1.indd 7 9/6/2018 12:10:39 PM
Domestic Data Entry Operator – Class IX
8
Apart from this there are a variety of websites and mobile
apps to access educational resources on any topic.
You can also contact a teacher or a trainer via
Internet to use WBT (Web-based Training). In this way
education has reached the far flung areas by reaching
the unreached.
(c) Teaching aids and media
ICT is used mostly as a teaching aid in schools to
	 •	 use pictures, animations and audio-visuals to
explain subjects that are difficult to explain.
	 •	 make the lessons interesting using presentations.
	 •	 organise lessons using the computer.
	 •	 obtain the information relevant to the subjects.
(d) Learning Management System (LMS)
A Learning Management System (LMS) is being used by
many countries to manage school systems. A student
or teacher can register himself/herself on the official
website to access LMS and can get many services from
LMS. The student can be benefited by using LMS, as it
can be used to
	 •	 learn lessons anytime and anywhere.
	 •	 submit queries, getting replies and submit
comments through forums.
	 •	 participate in the co-curricular activities via
video.
	 •	 monitor the progress of their children (by
parents).
IT in entertainment
Information Technology has had a major
impact on the entertainment industry.
Internetisamajorsourceofentertainment.
One can download and view movies,
play games, chat, use multimedia,
incorporate visual and sound effects using
computers, etc. Digital broadcasting has
changed the way we experience television,
with more interactive programming
and participation.
Fig 1.7: IT in entertainment
Unit 1.indd 8 9/6/2018 12:10:39 PM
Introduction to IT–ITeS Industry 9
IT in communication
Communication is used to convey
messages and ideas, pictures, or
speeches. A person who receives this
must understand clearly and correctly.
Modern communication makes use
of the computer system. We use
computers for email, chatting, FTP,
telnet and video conferencing.
IT in business
Computers are used in business organisations for payroll
calculation,budgeting,salesanalysis,financialforecasting,
managing and maintaining stocks. A lot of business
transactions happen through Internet called e-commerce.
IT facilitates marketing, customer visit, product
browsing, shopping basket checkout, tax and shopping,
receipt and process order. E-commerce offers services
pertaining to processing inventory management,
transactions, documentation, presentations, and
gathering product information. Smart cards, such as
credit cards and debit cards are used in shops. These
cards have a metallic strip on which the user’s Personal
Identification Number (PIN), and account number is
stored and can be read when it is passed through a special
reader. Airlines use large-scale computer applications
for their reservations system, both in the airports and in
central reservations call-centers. Other businesses that
have large-scale computing requirements are insurance
claims systems and online banking, which both have
large numbers of users and operators interacting across
one system.
IT in science and engineering
Scientists and engineers use computers for performing
complex scientific calculations, Computer Aided
Design (CAD) or Computer Aided Manufacturing (CAM)
applications are used for drawing, designing and
for simulating and testing the designs. Computers
are used for storing large amount of data,
performing complex calculations and for visualising
Fig. 1.8: IT in Communication
Unit 1.indd 9 9/6/2018 12:10:40 PM
Domestic Data Entry Operator – Class IX
10
3-dimensional objects. Complex scientific applications
like rocket launching, space exploration, etc., are not
possible without the computers.
IT in banking
Computer is an essential part of the modern banking
system. Every activity of a bank is now online. The
customer’s data and transactions are recorded by
computers. Recurring deposits (e-RD), Fixed deposits
(e-FD), money transfer from one account to another
(NEFT, RTGS), online transactions are done using
Internet. Capital market transactions, financial
analysis and related services are available in online
platforms. Bank customers use Automated Teller
Machines (ATM) for cash deposits and withdrawal,
or to view current balance.
IT in insurance
Insurance companies keep all records up to date
with the help of computer database. Procedures for
continuation of policies, starting date, date of next
installment, maturity date, interest dues, survival
benefits, and bonus are declared by using computers
in insurance companies. Many online policies are also
available which can be purchased by using the website
of insurance companies.
IT in marketing
In marketing, computers are used for advertising
of products, by using arts and graphics facility it is
possible to create interesting advertisements of various
products so that the goal of selling can be achieved.
Using e-commerce websites, people can purchase items
even sitting at home.
IT in health care
ICT is used in the health sector in numerous ways.
Hospital Management System is used to maintain and
manage patients’ records as well as various activities
pertaining to hospital administration. The computerised
Fig. 1.9 (a) MRI machine Fig. 1.9 (b) Detailed images
Notes
Unit 1.indd 10 9/6/2018 12:10:40 PM
Introduction to IT–ITeS Industry 11
3-dimensional objects. Complex scientific applications
like rocket launching, space exploration, etc., are not
possible without the computers.
IT in banking
Computer is an essential part of the modern banking
system. Every activity of a bank is now online. The
customer’s data and transactions are recorded by
computers. Recurring deposits (e-RD), Fixed deposits
(e-FD), money transfer from one account to another
(NEFT, RTGS), online transactions are done using
Internet. Capital market transactions, financial
analysis and related services are available in online
platforms. Bank customers use Automated Teller
Machines (ATM) for cash deposits and withdrawal,
or to view current balance.
IT in insurance
Insurance companies keep all records up to date
with the help of computer database. Procedures for
continuation of policies, starting date, date of next
installment, maturity date, interest dues, survival
benefits, and bonus are declared by using computers
in insurance companies. Many online policies are also
available which can be purchased by using the website
of insurance companies.
IT in marketing
In marketing, computers are used for advertising
of products, by using arts and graphics facility it is
possible to create interesting advertisements of various
products so that the goal of selling can be achieved.
Using e-commerce websites, people can purchase items
even sitting at home.
IT in health care
ICT is used in the health sector in numerous ways.
Hospital Management System is used to maintain and
manage patients’ records as well as various activities
pertaining to hospital administration. The computerised
Fig. 1.9 (a) MRI machine Fig. 1.9 (b) Detailed images
machines are used for ECG, EEG, Ultrasound and CT
Scan. The variety of measuring instruments and surgical
equipment are used to monitor patients’ conditions
during complex surgery. Expert system is used for
diagnosis. Health care manufacturing companies use
computers to aid the production of diagnostic tools
and instruments. Computers are an integral part
of laboratories and dispensaries. They are used in
scanning and diagnosing different diseases.
(a) Use of ICT in diagnosis
With the advancements in computer hardware and
software technology, various high-tech machines are
used in the diagnosis and treatment of critical diseases.
Using expert system, diseases can be diagnosed at the
early stages and the patients can be given treatment
accordingly. Some of these machines are:
(i)	 Computerised Axial Tomography Machine
(CAT):  Using this machine three-dimensional
(3D) images of different parts of the body can be
made. These images are helpful in the diagnosis
of diseases.
(ii)	 MRI (Magnetic Resonance Imaging Machine):
MRI machines are used to give the digital
impression of internal organs of the body by
using strong magnetic fields and radio waves. The
digital images are very helpful in the detection
and in deciding the treatment of diseases.
Unit 1.indd 11 9/6/2018 12:10:40 PM
Domestic Data Entry Operator – Class IX
12
(iii)	 Electrocardiogram (ECG) Machine: 
The
ECG machine is used to monitor the
heartbeat. When the heart pumps blood to
different parts of the body some electrical
impulses are produced. This machine
records the electrical impulses and shows
it in the form of a graph.
(iv)	
Cardiac Screening Machine: 
This
machine displays the physiology of the
heart and it displays the movements
inside the heart. Through this machine
it is possible to diagnose problems of the
heart, such as thinning of veins and then
recommend treatment.
(v) 	 EEG (Electro ‑ 
encephalography) Machine:
	 This machine is used to record the activities
of the brain. The small electrical probes
attached to the head receive the electrical
impulses of the brain and display them on
a computer screen. This device can retrieve
the data in both states where a patient is
awake or asleep.
(vi)	 Blood Sugar Testing Machine:  This device
analyses a sample of blood and determines
the blood glucose level.
(vii)	 Blood Pressure Measuring Machine:  This
device which is worn as a wrist band can
measure the blood pressure of a person at
Fig. 1.11: Cardiac Screening Machine
and Display
Fig. 1.12: EEG Machine and Display
Fig. 1.14: Measuring Blood
Pressure
Fig. 1.13: Sugar Testing Machine
Fig. 1.10 (a) ECG Machine Fig. 1.10 (b) ECG Graph
Unit 1.indd 12 9/6/2018 12:10:41 PM
Introduction to IT–ITeS Industry 13
Practical Exercise
(iii)	 Electrocardiogram (ECG) Machine: 
The
ECG machine is used to monitor the
heartbeat. When the heart pumps blood to
different parts of the body some electrical
impulses are produced. This machine
records the electrical impulses and shows
it in the form of a graph.
(iv)	
Cardiac Screening Machine: 
This
machine displays the physiology of the
heart and it displays the movements
inside the heart. Through this machine
it is possible to diagnose problems of the
heart, such as thinning of veins and then
recommend treatment.
(v) 	 EEG (Electro ‑ 
encephalography) Machine:
	 This machine is used to record the activities
of the brain. The small electrical probes
attached to the head receive the electrical
impulses of the brain and display them on
a computer screen. This device can retrieve
the data in both states where a patient is
awake or asleep.
(vi)	 Blood Sugar Testing Machine:  This device
analyses a sample of blood and determines
the blood glucose level.
(vii)	 Blood Pressure Measuring Machine:  This
device which is worn as a wrist band can
measure the blood pressure of a person at
Fig. 1.11: Cardiac Screening Machine
and Display
Fig. 1.12: EEG Machine and Display
Fig. 1.14: Measuring Blood
Pressure
Fig. 1.13: Sugar Testing Machine
rest or when he/she is involved in some
physical activity.
IT in the government and public service
The government uses large-scale computer applications
in its daily operations and is actively encouraging
e-governance practices. Digital India and e-governance
initiative of Government of India are best examples of
this. Government and Non-Governmental Organisations
(NGOs) as well as International Government Agencies
use ICT applications to communicate and provide
various services to the people and is called as
e-governance. There are various official web portals of
the Government of India for e-governance. There are
various advantages of e-governance.
The Income tax department, sales tax department,
preparations of voters list, preparation of PAN card
makes use of the computer system. Many government
services are available online. Electricity bills can now
be paid online. The government uses electronic voting
for elections, by replacing the traditional voting slip and
ballot box. People can enroll themselves in the electoral
roll through the State Election Commission portal.
Computers are common-place in modern society, and
tend to make previously laborious manual tasks of data
entry much simpler and quicker.
	 1.	 Explore the impact of IT and ITeS in various areas in
day‑to‑day life.
	 2.	 Visit Indian government websites, such as the official
web portal of Department of School Education, MHRD,
Government of India. Make a list of all the valuable
information and the services you could obtain yourself.
	 3.	 Make a list of e-government services that are provided by
other countries.
	 4.	 Visit the various websites and list the areas where ICT is used.
	 5.	 Identify the advantages of using ICT over conventional
methods in various areas.
	 6.	 Observe other instances where ICT is used in business
and manufacturing and compile a list.
Unit 1.indd 13 9/6/2018 12:10:41 PM
Domestic Data Entry Operator – Class IX
14
A.	 Give an example of the use of IT in the following areas.
Avoid already discussed examples.
Teacher Practice Example
Classroom content transaction
Assessment of students
Library management
Student record management
B.	 Short answer questions (50 words)
1.	 What do you understand by the term IT and ITeS?
2.	 What are the pros and cons of using ICT?
3.	 What precautions are required to ensure that ICT
use is safe?
4.	 What are the four main sub-sectors in the IT-BPM
industry?
5.	 Give examples of use of IT in everyday life.
6.	 How is IT used in libraries?
7.	 What are the various processes of education where
IT is used?
8.	 Which software are used in digital communication?
9.	 For what purpose is IT used in business?
10.	 Which are the prominent areas where IT is used in
science and engineering?
11.	 List the various uses of IT in a banking system.
12.	 Which are the different areas of healthcare where IT
is used? And how?
13.	 List any 5 websites of the Indian government which
provide IT enabled services to the people.
Check Your Progress
Notes
Unit 1.indd 14 9/6/2018 12:10:41 PM
Module 2
Internet of Things - An Introduction
 Evolution of IoT and the trends
 Impact of IoT on businesses and society
 Existing IoT use cases and applications across industries
Internet of Things
Connects the Physical World to the Internet
For a given IoT application
1. Define the objectives
2. Identify the devices
a) Physical things/device – which generates
data or which is to be monitored
b) Sensors
c) Actuators
3. Process the data (Data Processing)
4. Sending actuating signal to control the
physical thing/device identified in 2(a)
Example: Smart Irrigation System
1. Objectives – To measure the moisture level of
the soil and if needed have to water the plants
2. Devices Identification
a) Physical things/device – Soil
b) Sensors - Soil moisture sensors
c) Actuators – Electrical Motor
3. Data Processing: Check if the moisture level is
below the threshold value.
4. If the level is below the threshold value send the
actuating signal to turn on the motor to increase
the moisture level of the soil(watering the plants)
Internet of Things
Connects the Physical World to the Internet
Perception/
Device Layer
Example: Smart Irrigation System
(Three Layer IoT Architecture Representation)
Network Layer
Application
Layer
Data Generation, Data Collection/
Gathering, Actuation/controlling Devices
Data Transmission, Processing
(Pre-processing, Storage, Analytics)
IoT Application, API(Web and Mobile),
Visualization
Layers
Functions Example
Soil, Sensor, Electric Motor,
Microcontroller(Computing Device)
Checking the soil moisture level
IoT based Smart Irrigation System,
communicating the moisture level to the user
Internet of Things - Definition
Connects the Physical World to the Internet
“The Internet of Things (IoT) is the networking of physical devices (also referred to as "connected devices" and
"smart devices") embedded with electronics, software, sensors, actuators and network connectivity that enable
these objects to collect and exchange data”
- as defined by Wikipedia
"A global infrastructure for the information society, enabling advanced services by interconnecting (physical and
virtual) things based on existing and evolving interoperable information and communication technologies."
-as defined by 'The International Telecommunication Unit’
“The Internet of Things is a network of physical objects accessed through internet. These objects contains
embedded technology to interact with the internal states or external environment "
-as defined by ‘Cisco’
An IoT is a network that connects uniquely identifiable ‘Things’ to the Internet. The ‘Things’ have sensing/actuation
and potential programmability capabilities. Through the exploitation of unique identification and sensing, information
about the ‘Thing’ can be collected and the state of the ‘Thing’ can be changed from anywhere, anytime, by anything.
- (IEEE)
Evolution of IoT
Phases of Evolution
Network The Internet Mobile - Internet PCs + Mobile + People Internet of things
Web Web Web Web
Potential of IoT
Anything Any Device
Anyone Anybody
Any Service Any Business
Any Place Anywhere
Any Path Any Network
Anytime Any Context
History
of
IoT
History of IoT
1969-1995: Internet of Boffins
 1969 - TCP/IP
 1974 -Telenet
 1980 - Ethernet
 1994 - Full text web search engines
1995-2000: Internet of Geeks
 Started with the proposal of IP
 1995 - Amazon started its first online retail
service, followed by eBay
 1996 - Hotmail
 1998 - Google search, PayPal
 Internet penetration was low in the market until
2000
2000-2007: Internet of Masses
Many people across the globe started using
internet
 2001 - Wikipedia
 2004 - Facebook, followed by Youtube,
Twitter
2007-2011: Mobile Internet
 Access to the Internet via cellular phone
service provider. The era got a boost with
introduction of smartphones
2012 onwards: Internet of Things
 Things connected to each other using
internet
IoT Historical Timeline
IoT Trends
1. Rise in Number and Types of IoT Devices
IoT connected devices worldwide from 2015 to 2025(in billions)
Connected
devices
(in
billions)
It is not just the number of connected devices which is on a rise but also the types.
Voice Assistants
GPS Trackers
Smart Bands or Fitness Bands
Smart Locks
Smart Smoke Alarms
Smoke Detectors
Child Monitor
Doorbell Cameras
Fitness Devices
Wearables
IoT based Security Systems
Security Cameras
Different types of IoT device
2. Consumer IoT (CIoT) and Industrial IoT (IIoT)
Consumer IoT aims to improve life
quality and well-being of individual
users by automating and simplifying
day-to-day tasks. Devices often have
a short lifespan and are quickly
replaced by new versions
Industrial IoT targets complex industrial
processes and systems with distinct
network requirements. It focuses on
optimizing operational efficiency, safety
and sustainability through remote
monitoring and control capabilities
Consumer IoT VS Commercial IoT
Industrial IoT
Commercial IoT applications are
deployed in environments like
office buildings, retail, hotels,
hospitality, healthcare facilities
and entertainment venues.
Use cases: Asset Tracking,
Smart Office and Buildings,
Connected Lighting, Sensing &
Monitoring, and Location
Services
Industry 4.0: Automation of manufacturing and industrial practices, using modern smart
technology. Large-scale machine-to-machine communication (M2M) and the internet of
things (IoT) are integrated for increased automation, improved communication and self-
monitoring, and production of smart machines that can analyze and diagnose issues
without the need for human intervention.
VS
Consumer IoT Industrial IoT
VS
Number of Connected Devices
Consumer IoT Industrial IoT
VS
Key Verticals
Viable Wireless Option Major Application
Industrial IoT Consumer IoT 3. Cloud & Edge Computing
Physical Things,
Sensors, Devices,
Actuators
Physical Environment
Pre-
Processing,
Storage, Data
Analytics, API
Cloud
Most of the data is transferred to
the Cloud
 Requires more Bandwidth
 Results in High Latency
Bandwidth – It is the measure of amount of data transferred between two nodes per unit time. Measured in Bits/Sec
Latency – It is the measure of delay in transmitting the data between two nodes per unit time.
Physical Things,
Sensors, Devices,
Actuators
Physical Environment
Advanced
Data
Analytics, API
Cloud
Pre-Processing,
Storage, Basic
Analytics
Edge Node
Edge Computing
Computation takes places nearer to the devices.
Less Bandwidth, Low Latency
3. Cloud & Edge Computing
 IoT devices have been relying on the cloud for storing the data
 Instead of sending the data from IoT devices to cloud, the data can be transferred to local devices which are
closer to the edge of the network.
 The local storage helps in sorting, filtering, and calculating the data and sending a part or the whole data to
the cloud, thus reducing the traffic to network.
Edge computing offers a series of benefits
 Better management of large amount of data which every device sends
 Lowered dependency on cloud helping apps perform faster with reduced latency
 IoT based mobile apps consumes less bandwidth
4. A greater focus on IoT security
With an IoT adoption being on a rise, more and more devices are getting connected to the internet. As
the network is expanding, the volume of data is also expanding and there is more information which is
at risk.
5. Incorporation of Artificial Intelligence, Big Data, and Machine Learning
Using the data analytics tools in the connected devices, businesses will be able to decisions around
both predictive and preventive measures. If more amount of data is given as a training data set to ML,
it will be easy to predict the things.
Big Data
Structured and
unstructured
data
Artificial
Intelligence
Machine
Learning
Deep
Neural
N/w
Artificial Intelligence: Machines with seemingly
human capabilities
Machine Learning: Computational and statistical tools
Vibration Level
Indicates the average vibration data points
of the pumps that failed and those that did
not fail within a period of time.
Its clear from the indication that, vibration
level alone does not predict device failure
Vibration
level
Did not Fail Failed
Example - Prediction of Failure of Pump Vibration vs Temperature
 While adding temperature dimension
with the vibration, it is clear that high
pump vibration level coupled with high
temperature is an indicator of pump
failure.
 Similarly, low pump vibration level
coupled with low temperature is an
indicator of pump not failed
 However, it is less obvious to identify the
data points in the area corresponding to
low temperature and high vibration level
subjects to pump fail or not through only
vibration and temperature
Vibration
level
Temperature
Failed Did not Fail
Decision Tree
With vibration, time since last service and
temperature dimension, a decision tree
can be created to predict when a pump
will fail
+ value too high - Value within normal value
Vibration, Temperature
and Time since last
serviced
6. Blockchain for IoT security and BaaS will become mainstream
Blockchain:
It is a distributed ledger that is completely open to anyone. Once the data has been recorded inside a
blockchain, it becomes very difficult to change it.
Hash: ABCD
Previous Hash: -
Hash: EFGH
Previous Hash: ABCD
Hash: WXYZ
Previous Hash: EFGH
Genesis Block
1 2 3
Cloud Computing
Hash: ABCD
Previous Hash: -
Hash: EFGH
Previous Hash: ABCD
Hash: WXYZ
Previous Hash: EFGH
1 2 3
LMNO
Proof-of-work : It is the mechanism that slows down the creation of new blocks. It’s makes it very hard to
tamper with the blocks,
Because if you tamper one block, you’ll need to recalculate the proof – of – work for all the following
blocks. So the security of a blockchain comes from its creative use of hashing and the proof – of – work
mechanism.
Distributed service: Instead of using a central entity to mange the chain, blockchains use a peer-to-peer
network and anyone is allowed to join.
 IoT depends on centralized communication models to interact with the system.
 It can also be said that all the devices in IoT setup are identified, connected and validated via
centralized cloud servers.
 However, centralized clouds and networking equipment used in the existing IoT solutions have high
maintenance and infrastructure cost.
 As IoT systems are connected through these services, scalability can become a significant issue.
 As the number of IoT devices increases, the number of interactions between the server and devices
increases the cost.
 That is the reason why current systems cannot support large IoT networks.
 Also, cloud servers are vulnerable to a single point of failure which means the failure at one point can
affect the entire ecosystem.
 Therefore, using a peer-to-peer model instead of a client/server model can be the right solution that
IoT industry needs today.
 With decentralization in place, storage needs and computation can be distributed across millions of
IoT devices and central failure cannot have an impact on the whole network.
 Use of blockchain in IoT can help the IoT devices to scale up and improve the security
7. IoT based Smart Projects
Improve the quality of living and sustainability
8. Location tracking and wireless sensing
Efficient tracking of location and wireless sensing
9. Better Workforce Management
 IoT devices can be used to monitor personnel and schedule tasks. All the data from all these
systems can readily be used to populate the solutions of performance management.
 IoT devices can also be widely used to monitor the safety of the employee.
Example: Smart cities
10. IoT for Territory Monitoring
Smart tools do a loT in agriculture. They can measure soil moisture and control water supplies, or
monitor the state of ripe fruits and vegetables and inform the farmer of the time to harvest. These
smart methods can reduce costs, improve forecasting, planning, and harvesting.
Another use case is a forest fire. Devices like infrared cameras and air filters can save our forests in
the summer. It is already used in countries where summer forest fires are well known.
11. Voice will become the new mode of communication
Voice based-search, instructions or commands, and dominate the IoT markets. More and more
languages are being incorporated and their databases are being prepared to allow even a child or
uneducated person to use the IoT system.
Impact of IoT on Businesses
 Proven safe operating model
 Hierarchical organization structure
 Established market place
 Compete on price and service
 Consolidated and repeatable business rules
 Annual business planning
Traditional Business - Rigid & Rule Driven
IoT provides companies a digital interface to the physical world
 Digital businesses are Agile & Data Driven
Products Suppliers
Logistics Operations
Marketing
Sales
&
Distribution
Procurem
ent
Customer
Services
Innovation
Process
Monitoring
Access
from
anywhere
Accurate
Prediction
Cost
Savings(T
(Time,
resource,
money)
Information
Management
Preventive
Measures
Control &
Automati
on
Artificial
Intelligence
Cloud
Computing
Mobility
Open API
& Micro
Services
Big Data
Faster
Revenue
Growth
Social
Collabora
tion
Impact of IoT on business
Traditional
Business
IoT
Impacts of IoT on
Business
Channel
Integration
Improved
Business
Model
 Access from Anywhere
The definition of IoT says that the devices are connected over a network, virtually.
An example of this is August smart lock where the IoT user has access to the smart lock via the
technology and this makes it easy for the user. Any person with access to this technology, who
wishes to manage this lock sitting miles away can easily do so by connecting the personal electronic
device (be it a mobile phone or any electronic device) to the smart lock. This lets us access a device
remotely also.
 Process Monitoring
Another use of IoT, which is highly beneficial for businesses in manufacturing and production of
goods, is the monitoring of processes. Manufacturing processes that follow assembly lines are
currently also highly monitored. But with the addition of IoT, these processes can be monitored in
greater detail.
A lot of data that is recorded can be analyzed to improve processes, make them more efficient and
also help cut down costs.
 Accurate Prediction
As an environmental sensor, IoT helps predict natural disasters. This technology is used in sensors, for
a real-time prediction of natural disasters.
Not only in businesses, but also for the world as a whole, predicting natural disaster and analyzing what
all can occur in the near future is possible with the help of technological advancement, one of them
being the IOT. A real-time example of this is smart sensors used in Dublin, Ireland. They are already
creating a real-time picture of what is happening and can help predict any natural disasters, which will
be of great help to their city in the time of crisis.
 Transfer of Data
In IoT, where devices are connected virtually, transfer of data packets is an easy task. This is beneficial
for both businesses and people living in this society. With the IoT, various devices connected to the
internet can collect, receive, communicate with each other via IP. To increase the efficiency and to
simplify the processes, IoT can be of great help for the businesses.
 Cost Savings (time, resources, money)
The connectivity and fast communication among devices reduces response time and human labor,
thus increase productivity and efficiency. Many of the appliances that make our homes “smart” save
electricity, resources and money. Nowadays a lot of investments are made for predictive maintenance
that will help to predict and avoid failures in IoT ecosystem
 Control and Automation
All Internet of Things consumers (users and businesses) through applications installed on their
mobile devices such as phones, tablets, etc. can remotely control smart devices, adjust different
metrics, and choose specific options. In many cases, systems send automatic messages and
warnings or take actions. For example, the fridge can order food from the supermarket if some of
the products are down, the car can send a request for the spoiled part that needs to be replaced,
and the user can adjust the temperature at their homes while they are away.
 More Data Gathering
 Improved Business Model
Problem
Traditional
Solution
IoT
Solution
IoT
Business
Solution
Luggage lost in air transit
The airline would try to find the lost luggage using manual processes which are costly, timing
consuming and generates customer dissatisfaction
A tracking device is placed inside the luggage and transmits its location using internet. The
user can track the luggage using a smartphone app
The airline charges a fee to its customer for using the luggage tracking service, or offers the
service for no charge to premium customers. A share of the revenue generated is paid to the
IoT company, which maintains the IoT solution.
Impact of IoT on Society
 Cost Saving
Smart homes and offices can save energy costs.
 Security
Offers better security by constant surveillance
 Quick transfer of data
Takes active action, such as alerting the local police body in case of a security breach
 Improved health care
Remote monitoring of patients and providing medication for them
 Automation
Reminders of daily tasks such as payment of utility bills
Smart lighting of streets and auto-sensing as well as control of traffic signal
 Remote Monitoring of assembly line and production system to maximize efficiency, safety, and
reliability in a manufacturing firm
 Smart automobiles that can provide assistance if required, assist in controlling vehicle speed on the
basis of traffic and environmental conditions
IoT Solution Architecture - Stages IoT Solution Architecture - Stages
No matter the use case and number of layers, the key building blocks of any IoT structure are always the same, namely:
 Smart things
 Networks and gateways enabling low-power devices (which is often the case in IoT) to enter the big Internet;
 Middleware or IoT platforms providing data storage spaces and advanced computing engines along with analytical capabilities
 Applications, allowing end users to benefit from IoT and manipulate the physical world.
These elements make up the backbone of any IoT system upon which effective, multi-layered architecture can be developed. Most
commonly, these layers are:
 Perception layer - hosting smart things
 Connectivity or transport layer - transferring data from the physical layer to the cloud and vice versa via networks and gateways;
 Processing layer- employing IoT platforms to accumulate and manage all data streams; and
 Application layer - delivering solutions like analytics, reporting, and device control to end users.
Perception layer: Converting analog signals into digital data and vice versa
The initial stage of any IoT system embraces a wide range of “things” or endpoint devices that act as a bridge between the real and digital
worlds. They vary in form and size, from tiny silicon chips to large vehicles. By their functions, IoT things can be divided into the following
large groups.
 Sensors such as probes, gauges, meters, and others. They collect physical parameters like temperature or humidity, turn them into
electrical signals, and send them to the IoT system. IoT sensors are typically small and consume little power.
 Actuators, translating electrical signals from the IoT system into physical actions. Actuators are used in motor controllers, lasers,
robotic arms.
 Machines and devices connected to sensors and actuators or having them as integral parts.
The edge-side layer includes just a few “things” physically placed in one room or myriads of sensors and devices distributed across the
world
Connectivity layer: Enabling data transmission
Server Side Cloud
NFC
Bluetooth Low
Energy
LPWAN Zigbee
The second level is in charge of all communications across devices, networks, and cloud services that
make up the IoT infrastructure. The connectivity between the physical layer and the cloud is achieved
directly using TCP or UDP/IP stack or via gateways — hardware or software modules performing
translation between different protocols as well as encryption and decryption of IoT data.
Ethernet connects stationary or fixed IoT devices like security and video cameras, permanently installed
industrial equipment, and gaming consoles.
WiFi, the most popular technology of wireless networking, is a great fit for data-intensive IoT solutions
that are easy to recharge and operate within a small area. A good example of use is smart home devices
connected to the electrical grid.
NFC (Near Field Communication) enables simple and safe data sharing between two devices over a
distance of 4 inches (10 cm) or less.
Bluetooth is widely used by wearables for short-range communications. To meet the needs of low-power
IoT devices, the Bluetooth Low-Energy (BLE) standard was designed. It transfers only small portions of
data and doesn’t work for large files.
LPWAN (Low-power Wide-area Network) was created specifically for IoT devices. It provides long-range wireless connectivity on low
power consumption with a battery life of 10+ years. Sending data periodically in small portions, the technology meets the requirements of
smart cities, smart buildings, and smart agriculture (field monitoring).
ZigBee is a low-power wireless network for carrying small data packages over short distances. The outstanding thing about ZigBee is
that it can handle up to 65,000 nodes. Created specifically for home automation, it also works for low-power devices in industrial,
scientific, and medical sites.
Cellular networks offer reliable data transfer and nearly global coverage. There are two cellular standards developed specifically for IoT
things. LTE-M (Long Term Evolution for Machines) enables devices to communicate directly with the cloud and exchange high volumes
of data. NB-IoT or Narrowband IoT uses low-frequency channels to send small data packages.
Network Connectivity Pros Cons Popular use cases
Ethernet Wired, Short-range
High speed
Security
Range limited to wire length
Limited Mobility
Stationary IoT-Video Camera, game
consoles, fixed equipment
WiFi
Wireless, Short-
range
High Speed
Great Compatibility
Smart home, devices that can be
easily recharged
NFC
Wireless, ultra-short-
range
Reliability
Low power Consumption
Limited range
Lack of availability
Payment systems, Smart Home
Bluetooth Low-
Energy
Wireless, Short-
range
High Speed
Low power Consumption
Limited range
Low bandwidth
Smart home devices, wearables,
beacons
LPWAN
Wireless, long-range Long range
Low power Consumption
Low bandwidth
High Latency
Smart home, smart city, smart
agriculture(Field monitoring)
Zigbee
Wireless, Short-
range
Low power Consumption
Scalability
Limited range
Compliance Issues
Home automation, healthcare and
industrial sites
Cellular
Networks
Wireless, long-range
Nearly global coverage
High Speed
Reliability
High Cost
High power Consumption Drones sending video and images
Once parts of the IoT solution are networked, they still need messaging protocols to share data across devices and with the cloud. The
most popular protocols used in the IoT ecosystems are:
AMQP (the Advanced Message Queuing Protocol) aiming at peer-to-peer data exchange between servers;
CoAP (the Constrained Application Protocol), a software protocol designed for constrained devices — end nodes limited in memory and
power (for example, wireless sensors). It feels much like HTTP but uses fewer resources;
MQTT (the Message Queue Telemetry Transport), a lightweight messaging protocol built on top of TCP/IP stack for centralized data
collection from low-powered devices.
Edge or fog computing layer: reducing system latency
This level is essential for enabling IoT systems to meet the speed,
security, and scale requirements of the 5th generation mobile
network or 5G. The new wireless standard promises faster speeds,
lower latency, and the ability to handle many more connected
devices, than the current 4G standard.
The idea behind edge or fog computing is to process and store
information as early and as close to its sources as possible. This
approach allows for analyzing and transforming high volumes of
real-time data locally, at the edge of the networks. Thus, you save the
time and other resources that otherwise would be needed to send all
data to cloud services. The result is reduced system latency that
leads to real-time responses and enhanced performance.
Edge computing occurs on gateways, local servers, or other edge nodes scattered across the network. At this level, data can be:
 evaluated to determine if it needs further processing at higher levels,
 formatted for further processing
 decoded
 filtered and
 redirected to an additional destination
To sum up, the first three layers see data in motion, as it is constantly moving and altering. Only on hitting the next level, is data finally at
rest and available for use by consumer applications.
Processing layer: making raw data useful
The processing layer accumulates, stores, and processes data that comes from the previous layer. All these tasks are commonly handled
via IoT platforms and include two major stages.
Data accumulation stage
The real-time data is captured via an API and put at rest to meet the requirements of non-real-time applications. The data accumulation
component stage works as a transit hub between event-based data generation and query-based data consumption.
Among other things, the stage defines whether data is relevant to the business requirements and where it should be placed. It saves data
to a wide range of storage solutions, from data lakes capable of holding unstructured data like images and video streams to event stores
and telemetry databases. The total goal is to sort out a large amount of diverse data and store it in the most efficient way.
Data abstraction stage
Here, data preparation is finalized so that consumer applications can use it to generate insights. The entire process involves the following
steps:
combining data from different sources, both IoT and non-IoT, including ERM, ERP, and CRM systems;
reconciling multiple data formats; and
aggregating data in one place or making it accessible regardless of location through data virtualization.
Similarly, data collected at the application layer is reformatted here for sending to the physical level so that devices can “understand” it.
Together, the data accumulation and abstraction stages veil details of the hardware, enhancing the interoperability of smart devices.
What’s more, they let software developers focus on solving particular business tasks — rather than on delving into the specifications of
devices from different vendors.
Application layer: addressing business requirements
At this layer, information is analyzed by software to give answers to key business questions. There are hundreds of IoT applications that
vary in complexity and function, using different technology stacks and operating systems. Some examples are:
device monitoring and control software,
mobile apps for simple interactions,
business intelligence services, and
analytic solutions using machine learning.
Currently, applications can be built right on top of IoT platforms that offer software development infrastructure with ready-to-use
instruments for data mining, advanced analytics, and data visualization. Otherwise, IoT applications use APIs to integrate with
middleware.
Business layer: implementing data-driven solutions
The information generated at the previous layers brings value if only it results in problem-solving solution and achieving business goals.
New data must initiate collaboration between stakeholders who in turn introduce new processes to enhance productivity.
The decision-making usually involves more than one person working with more than one software solution. For this reason, the business
layer is defined as a separate stage, higher than a single application layer.
Security layer: preventing data breaches
It goes without saying that there should be a security layer covering all the above-mentioned layers. IoT security is a broad topic worthy of
a separate article. Here we’ll only point out the basic features of the safe architecture across different levels.
Device security - Modern manufacturers of IoT devices typically integrate security features both in the hardware and firmware installed on
it. This includes
embedded TPM (Trusted Platform Module) chips with cryptographic keys for authentication and protection of endpoint devices;
a secure boot process that prevents unauthorized code from running on a powered-up device;
updating security patches on a regular basis; and
physical protection like metal shields to block physical access to the device.
Connection security – Whether data is being sent over devices, networks, or applications, it should be encrypted. Otherwise, sensitive
information can be read by anybody who intercepts information in transit. IoT-centric messaging protocols like MQTT, AMQP, and DDS may
use standard Transport Layer Security (TSL) cryptographic protocol to ensure end-to-end data protection.
Cloud security - Data at rest stored in the cloud must be encrypted as well to mitigate risks of exposing sensitive information to intruders.
Cloud security also involves authentication and authorization mechanisms to limit access to the IoT applications. Another important
security method is device identity management to verify the device’s credibility before allowing it to connect to the cloud.
How IoT Works
Mobile App
Sensor
i. Sensors/Devices
First, sensors or devices help in collecting very minute data from the surrounding environment. All of
this collected data can have various degrees of complexities ranging from a simple temperature
monitoring sensor or a complex full video feed.
ii. Connectivity
Next, that collected data is sent to a cloud infrastructure but it needs a medium for transport.
The sensors can be connected to the cloud through various mediums of communication and transports
such as cellular networks, satellite networks, Wi-Fi, Bluetooth, wide-area networks (WAN), low power
wide area network and many more.
iii. Data Processing
Once the data is collected and it gets to the cloud, the software performs processing on the acquired
data.
This can range from something very simple, such as checking that the temperature reading on devices
such as AC or heaters is within an acceptable range. It can sometimes also be very complex, such as
identifying objects (such as intruders in your house) using computer vision on video.
iv. User Interface
Next, the information made available to the end-user in some way. This can achieve by triggering alarms
on their phones or notifying through texts or emails.
Also, a user sometimes might also have an interface through which they can actively check in on their
IOT system. For example, a user has a camera installed in his house, he might want to check the video
recordings and all the feeds through a web server.
How IoT Works
Principal Technologies that Drive IoT System
 Wireless Sensor Networks
 Embedded Systems
 Communication Protocols
 Cloud Computing
 Big Data Analytics
A Wireless Sensor Network (WSN)
It is a network formed by a large number of sensor nodes where each node is equipped with a sensor to
detect physical phenomenon such as light, heat, pressure, etc. With the rapid technological development
of sensors, WSNs will become the key technology for IoT.
A sensor has the ability to capture anything from location to the device orientation. Collectively, these
sensors produce a huge amount of data, both in unstructured form (such as picture or videos) as well as
structured (such as GPS or acceleration data). These “devices” are perpetually connected to the Internet
over WiFi, 3G or 4G.
Embedded Systems
Embedded hardware devices, micro controllers etc, are the ones that process the data. The data from the
sensors are not directly usable and a process for using them is implemented by the embedded system.
Their main function is to process the data from the sensors according to an algorithm to extract the
valuable information like status, parameter values, alerts etc., and control actuators in some cases in the
system
Cloud computing
Cloud computing is the on-demand delivery of compute power,
database, storage, applications, and other IT resources via the
internet with pay-as-you-go pricing. These resources run on server
computers that are located in large data centers in different locations
around the world. When you use a cloud service provider like AWS,
that service provider owns the computers that you are using. These
resources can be used together like building blocks to build solutions
that help meet business goals and satisfy technology requirements.
Infrastructure as a service (IaaS): Services in this category eliminate the need
for you to procure and maintain the hardware related to networking, storage,
servers, etc. Services in this category are the basic building blocks for cloud
IT and typically provide you with access to networking features, computers
(virtual or on dedicated hardware), and data storage space.
Platform as a service (PaaS): Services in this category
reduce the need for you to manage the underlying
infrastructure (usually hardware and operating
systems) and enable you to focus on the deployment
and management of your applications.
Software as a service (SaaS): Services in this category provide you with a
completed product that the service provider runs and manages. In most
cases, software as a service refers to end-user applications. With a SaaS
offering, you do not have to think about how the service is maintained or how
the underlying infrastructure is managed. You need to think only about how
you plan to use that particular piece of software. A common example of a
SaaS application is web-based email
On-premises
Big Data analytics
Big data analytics is the process of examining large and varied data sets i.e., big data to uncover hidden
patterns, unknown correlations, market trends, customer preferences and other useful information that
can help organizations make more-informed business decisions. Big data analysis and cloud computing
go hand in hand, particularly in IoT applications.
Analysis of the data coming from a device or other sources can be used to send information to a
remote/local user regarding the device operation, or this analysis can be translated into commands sent to
the device to influence its operation. For example, the connected lamp can be turned on from the Cloud
when analysis shows that it is dark in the lamp's location and a remote lock shows that someone has
entered the house.
Communication Protocols
OSI MODEL
Bits, Frames, Packet and Segment
MAC, IP and Port Address
MAC: Physical Address of the device(system/Laptop). Does not change. Unique for the given device
IP: Address provided by the internet service providers when the device is connected to internet. Address changes w,r.t
to the service providers.
Port Address: Final destination address. Indicates which process to be carried out.
Example: 1880 is for Node-RED
Physical Address: F1-E3-C8-77-40-12
DHCP Enabled: Yes
IPv4 Address: 172.15.221.207
IPv4 Subnet Mask: 255.255.248.0
IPv4 Default Gateway: 172.15.215.1
Iv4 DHCP Server: 172.15.215.1
IPv4 DNS Server: 172.15.215.1
OSI MODEL
OSI Model Function
IoT
Host
Layers
7 Application
Human-computer interaction layer, where
applications can access the network services
Application
6 Presentation
Ensure that data is in a usable format where data
encryption occurs
5 Session
Maintain connections and is responsible for
controlling ports and sessions
4 Transport
Transmits data using transmission protocols
including TCP and UDP
Transport
Media
Layers
3 Network Decides which physical path the data will take Network/Internet
2 Data Link Defines the format of data on the network
Link
1 Physical Transmits raw bit stream over the physical medium
Communication Protocols
IoT connects various devices through Internet and devices talk to each other through a communication channel. The
defined communication channel is called as Communication Protocol
802.3 - Ethernet
 Coaxial cables, twisted pair wire or optical fibre as
a medium
 10Mbps to 40Gbps+ data rate
802.11 – Wi-Fi
 Wireless LAN; 802.11 b/g/n
 2.4GHz / 5GHz band
 1 Mbps to up to 6.75 Gbps data rate
802.16 – WiMax
 Collection of wireless broadband standards
 1.5Mbps to 1Gbps data rate
802.15.4 – LR-WPAN
IEEE 802.15.4 is a standard which specifies the physical layer and
media access control for Low-rate wireless personal area networks
(LR-WPANs)
 Example: LoRa
40bps to 250Kbps data rate
Provides low-cost, low-speed communication for low-power devices
2G/3G/4G - Mobile Communication
 Date rates - 9.6 Kbps to 100 Mbps
 2G - GSM and CDMA
 3G - UMTS and CDMA2000
 4G - LTE
Link Layer Protocols
Wireless IoT Connectivity Technologies have a range from a few centimeters to many kilometers:
Wireless Personal and Local Area Network technologies (WPANLAN) such as Bluetooth, ZigBee, 6LowPAN, RFID and Wi-Fi are ideal for
short to medium range communication like home or indoor applications.
Wireless Wide Area Network technologies (WWAN) are divided into two types: Cellular (3G/4G and 5G) and Low-Power Wide Area
Networks (LPWANs), themselves split into licensed (LTE-M, NB-IoT EC-GSM) or unlicensed long-range technologies (LPWA LoRa, Sigfox
and other). They are best suited for long-range communication such as smart meters, animal or assets tracking.
Wireless Personal Area Network (WPAN)
WPAN does not exceed a maximum range of 100m. Devices include Bluetooth-connected headsets for example, but also Zigbee and Z-
wave connected devices mostly used in home applications such as building control systems, smart alarms, or smart thermostats also
Industry 4.0 applications.
ZigBee and 6LoWPAN protocols are designed for low power consumption applications such as low power wireless sensor networks.
However, the transmission time for those protocols is longer than the low power Wi-Fi, due to its low data rate (250 Kb/s). The average
consumption profile is therefore considered as low to medium depending on the application and the module used.
Wireless Local Area Networks (WLAN)
WLAN, a network that enables connectivity of up to 1 kilometer. In this category, Wi-Fi is the most common standard. The technology is
supporting devices such as home assistants, smart TVs, and smart speakers and is sometimes used in industrial settings like factories.
Wi-Fi was historically designed for laptops or PCs, where the power requirements were not so important. It was deemed too power
hungry for battery-powered smart objects which led manufacturers to develop new standards for the Internet of Things. New generation,
low power Wi-Fi operates at much higher data rates ranging from 1 Mb/s to 54 Mb/s. This allows Wi-Fi enabled sensors to spend very
little time with actual transmission or reception. The chips ‘sleep mode’ power consumption was also greatly reduced (convenient for
IoT applications since these devices are mostly in the sleep state) thus reducing the modules overall power consumption.
Low Power Wide Area Networks (LPWAN)
IoT applications’ requirements have driven the emergence of LPWAN.
The technology offers low power, long range (up to 10–50 km in rural zones and 1–10 km in urban zones) together with low-cost
specifications. Four main competing standards are currently sharing the market: Sigfox, LoRaWAN, LTE-M and NB-IoT. They are
presently being rolled-out worldwide with more than 25 million devices already connected, the majority of which are smart meters.
These protocols may be based on cellular technology, such as LTE-M and NB-IoT or radio-based (LoRa, Sigfox),they can be licensed
(NB-IoT, LTE-M) or unlicensed (LoRa, Sigfox) which also differentiates their availability and prices.
In long range connectivity, LoRaWAN requires more transmission time compared to small range connectivity protocols because of its
low rate data rate. However, the optimizations brought to power savings mode, small data maximization, and flexible sleep all reduce the
power consumption of devices which makes LoRaWAN a good candidate for numerous IoT applications.
Cellular technology (2G, 3G, 4G and 5G)
Before the advent of LPWAN, cellular technology (2G, 3G, and 4G) was the only option for long-range remote device connectivity (up to
100km). The new, much talked about, 5G technology that is currently being deployed, promises a massive bandwidth and extremely
low latency which could favor its adoption. Cellular connectivity has historically been focused on range and bandwidth at the expense
of power consumption. The high amount of data produced by devices was hard to process quickly and the amount of time between
when data is sent from a connected device to when it returns to the same device—the latency—was high. However, new cellular
technologies like 5G transmit data about 10 times faster than 4G, promising ultra-low latency and lower power consumption.
Wireless Neighborhood Area Networks (WNAN)
WNAN lies between WLAN and long-range technologies. A medium range technology that covers areas between 5-10 km with its typical
proponents, Mesh networks (Wi-Sun (6LoWPAN), JupiterMesh or ZigBee-NAN). The technology can be used as an alternative for
LPWA/Cellular (e.g, in Utilities Field Area Networks) or as a complimentary element (e.g., for remote metering where other protocols do
not have sufficient range to be implemented) such as gas metering applications).
WNAN networks are generally deemed as high-energy consumers but mesh technologies such as Wi-SUN can provide high data rates
and low latency. Additionally, Wi-SUN modules use less power for listening which enable customers to configure devices to listen
frequently and still maintain a long-life.
Cellular
There are a lot of IoT
applications that may call
for operation over a
longer remoteness. These
IoT applications can take
the help of Cellular
communication
capabilities like
GSM/3G/4G. Cellular is
one of the IoT
Communication Protocols
which can send or
transfer a high amount of
data. The fee for sending
a high quantity of data
will be high too. Cellular
does need not only high
cost but also to need high
power consumption for
several applications. This
Internet of Things
Protocol is amazing for
sensor-based data
projects of low-
bandwidth. This is
because they can send a
very insignificant amount
of data or information on
the Internet.
RFID
The Radio Frequency Identification uses the electromagnetic fields to identify objects.
NFC
The NFC or Near Field Communication allows the clients to connect to the electronic devices, to use digital contents
and to do the contactless payment transaction. The essential work of NFC is to expand the “contactless” card
technology. It works within 4cm (between devices) by enabling the devices for sharing information.
SigFox
Sigfox is known as one of the best alternative technologies which bear the attributes of both Cellular and WiFi. As
Sigfox IoT Protocol was developed and designed for the M2M applications, it can only send data of low-level. By
taking the help of Ultra Narrow Band(UNB), Sigfox can hold speeds of 10 to 1000 bits per second for transferring low-
data. It only consumes 50 microwatts of the power.
The frequency of the IoT Connectivity Protocols Sigfox is 900MHz, and it has Could-access. In rural environments,
Sigfox IoT Protocol covers a range of 30 km to 50 km. In the urban areas, the range of this protocol is 3-10 km.
Internet Protocol (IPv4 and IPv6)
6LowPAN
Network Layer Protocols
The Internet Protocol is the protocol that defines and enables internetworking at the internet layer of the Internet
Protocol Suite. It uses a logical addressing system and performs routing, which is the forwarding of packets from a
source host to the next router that is one hop closer to the intended destination host on another network.
IPv4 IPv6
Address Size 32-bit 128-bit
Address format
Dot Decimal Notation
12.244.233.165
Hexadecimal Notation
2001:0db8:0000:0000:0000:ff00:0042:7879
Number of addresses 4.29×109 3.4×1038
Enable IPv6 standards to be used in low-power wireless networks, specifically with IEEE 802.15.4
6LowPAN protocol is an adaptation layer allowing to transport IPv6 packets over 802.15.4 links
Transmission Control Protocol (TCP) User Datagram Protocol (UDP)
Transport Layer Protocols
TCP UDP
A connection-oriented protocol A connectionless protocol
Uses specific handshake protocols (generally, SYN, SYN-ACK, ACK) No handshake
Guarantees the delivery of data to the destination router, thus making it reliable. Doesn’t guarantee the delivery of data to the destination
Packet sequence is verified Data is processed in order of arrival
Slower speed of transmission due to reordering and retransmission Faster because integrity is checked at the arrival time using checksum
Performs error checking and attempts error recovery.
Performs basic error checking and discards erroneous packets without
attempting error recovery.
TCP is heavy. It needs three packets to set up a socket connection before data
can be sent.
UDP is lightweight. There is no tracking of connections, ordering of
messages, etc.
Applications: File Transfer, Web Browsing, Email Live Streaming, online games, VoIP
Request Data
Response
UDP
 UDP is a connectionless protocol which means the sender just transmits the data without waiting for the connection with the receiver. It
is an unreliable protocol when compared with TCP.
 There is no error checking mechanism or correcting mechanism involved in data transmission which results in using less bandwidth.
UDP protocol just sends the packets (or datagram). There is no acknowledgement guarantee of packet received by the other end.
 It allows for less data overhead and delays.
 To achieve higher performance, the protocol allows individual packets to be dropped (with no retries) and UDP packets to be received in
a different order than they were sent, as dictated by the application.
Features of UDP
 UDP can be used when acknowledgement of data does not hold any significance.
 It is great for data flowing in one direction.
 It is connectionless protocol.
 It does not provide any congestion control mechanism.
 It is a suitable protocol for streaming applications such as video conference applications, computer games etc.
UDP Datagrams
UDP traffic works through packets called datagram, with every datagram consisting of a single message unit. The header details are stored
in the first eight bytes, but the rest is what holds onto the actual message. The UDP datagram header can be divided into four parts: 1)
Source Port – 2) Destination Port – 3) Length – 4) Checksum –In UDP, checksum is optional, as opposed to TCP where checksum is
mandatory.
Advantages of UDP over TCP/IP Stack
It is better than TCP for applications that require constant data flow, bulk data and which require more swiftness than reliability.
For multicast and broadcast purposes, UDP is best suited because it supports point to multipoint transmission method. The sender does
not need to keep track of retransmission of data for multiple receivers in contrast with the TCP/IP where sender needs to take care of each
packet.
Both TCP and UDP run on the top of Internet Protocol (IP) that is why they are referred as TCP/IP and UDP/IP.
Multicast
Unicast
Broadcast
Hyper Text Transfer Protocol (HTTP)
Application Layer Protocols
Message Queuing Telemetry Transport (MQTT)
HTTP Request
HTTP Response
(Web Page, Image, PDF)
MQTT
MQTT HTTP
It works on publish/subscribe model It works on request/response model
It runs over Transmission Control Protocol It runs over Transmission Control Protocol
It has less complexity It is more complex
This protocol’s design is Data centric This protocol’s design is Document centric
The message size generated is less as it uses
binary format
The message size generated is more as it
uses ASCII format
It provides data security with SSL/TLS
It does not provide security but Https is built
for that
 CoAP is a specialized Internet Application Protocol for constrained devices
 It is intended for use in resource-constrained internet devices, such as wireless sensor network
nodes
 It enables those constrained devices (nodes) to communicate with the wider Internet using similar
protocols.
 CoAP is designed for use between devices on the same constrained network (e.g., low-power,
lossy networks), between devices and general nodes on the Internet, and between devices on
different constrained networks both joined by an internet
 CoAP is designed to easily translate to HTTP for simplified integration with the web, while also
meeting specialized requirements such as multicast support, very low overhead, and simplicity.
Multicast, low overhead, and simplicity are extremely important for Internet of Things (IoT) and
Machine-to-Machine (M2M) devices.
 CoAP can run on most devices that support UDP
 It uses ACK messages so that it will become reliable like TCP. It has low latency and consumes
lesser power compare to HTTP
Constrained Application Protocol (CoAP)
Reliable Transmission Unreliable Transmission
Confirmable Request & Response Non-Confirmable Request & Response
Extensible Messaging and Presence
Protocol (XMPP)
Advanced Message Queuing
Protocol (AMQP)
Designed for instant messaging (IM),
presence information, and contact list
maintenance. Based on XML (Extensible
Markup Language), it enables the near-
real-time exchange of structured data
between two or more network entities.
The defining features of AMQP are message orientation,
queuing, routing (including point-to-point and publish-and-
subscribe)
Features CoAP HTTP
Protocol It uses UDP It uses TCP
Network layer It uses IPv6 along with 6LoWPAN It uses IP layer
Multicast support It supports It does not support
Architecture model
CoAP uses both client-Server &
Publish-Subscribe models
HTTP uses client and server
architecture
Synchronous communication CoAP does not need this HTTP needs this
Overhead Less overhead and it is simple
More overhead compare to
CoAP and it is complex
Application
Designed for resource constrained
networking devices such as
WSN/IoT/M2M
Designed for internet devices
where there is no issue of any
resources
MQTT CoAP XMPP AMQP
TCP UDP TCP TCP
Publish-Subscribe
Request-Response
Publish-Subscribe
Request-Response
Publish-Subscribe
Request-Response
Publish-Subscribe
Power Consumption -
Less
Power Consumption -
Medium
Power Consumption -High
Power Consumption -
Medium
A parking lot where
there are a number of
parking sensors
installed to identify the
number and location of
empty or vacant
parking spots.
Constrained devices
A smart thermostat that
can be accessed from a
smartphone via a web
server
AMQP is mostly used in
business messaging. It
usually defines devices
like mobile handsets,
communicating with
back-office data centers
IoT Communication Protocol Stack
IoT Protocols Stacks Communication protocols
IoT Layered Architecture
(3 Layer)
Application HTTP CoAP MQTT AMQP Application Layer
Transport TCP UDP TCP TCP
Network Layer
Network IP IP IP IP
Link Ethernet Link
Constrained
Link
WiFi Hart LR-WPAN Perception Layer
Existing IoT Use Cases
Financial Services Government and
Non-profit
Utilities and Resources Banking
Travel and Transportation
Healthcare and
Life Science
Manufacturing Retail and CPG
Insurance Telecom, Media and
Entertainment
Financial Services
 Fraud detection
 Protect trading data
 Smart algorithm trading
Government and Non-profit
 Public Safety
 National Defence
 Smart Cities
 Asset Tracking
 Flood monitoring
 Infrastructure maintenance
 Military personnel safety
Utilities and Resources
 Energy Conservation
 Water management
 Smart metering
 Smart Lighting
 Power grid optimization
 Waste management
 Pipeline monitoring
Travel and Transportation
 Delivery status monitoring
 Fleet availability
 Fuel indicators
 Auto toll debits
 Vehicle safety
 Route optimization
 Vehicle to vehicle communication
Healthcare and Life Science
 Remote Patient monitoring
 Hospital Asset management
 Drug management
 Workflow optimization
 Virtual care
Manufacturing
 Predictive maintenance
 Asset Tracking
 Supply Chain Management
 Asset Tracking
 Flood monitoring
 Infrastructure maintenance
 Military personnel safety
Retail
 Theft Prevention
 Indoor Navigation
 Inventory monitoring
 Product Recommendation
 Power grid optimization
 Smart Ordering & Payment
 Vending Machines
Insurance
 Claim management
Telecom, Media and Entertainment
 Smart TV
Natural Resources
 Agriculture
 Mining
 Oil and Gas
IoT in Transportation Smart Parking System
Every wireless node on a IEEE 802.15.4e mesh network has routing capabilities,
so data can travel to the network gateway via any combination of nodes. If one
path is blocked the network will simply find another. This means that network
gateway doesn’t need to be within range of every node on the network, making
the network incredibly scalable.
The most useful network
gateways can connect to
your computer, or to your
cloud applications on the
Internet, via both wired
and cellular data
connections. That means
you can put your gateways
just about anywhere.
Parking system network
gateways are often placed
at locations like entrances
and exits. There they can
connect to the wireless
mesh network as well as
nearby wired devices like
security cameras, card
readers and digital
signage. The gateway then
connects the entire system
to your controlling
software, whether your
software is on your
computer or up in the
cloud.
Smart Home System
IoT in an Integrated Smart Energy System
Energy
Democratization
Virtual Power
Plant
Smart Mobility
Energy Efficiency
Smart Building
Demand &
Response
Energy
Management
Distributed Energy
System
Optimized Energy
Grid
Preventive & Fault
Maintenance
Digitalized Energy
Generation
Utilities & Generation
Transmission & Distribution
Demand Side Services
Energy Supply
Regulation and Market
Regulation & market
Application Sector Description Benefits
Energy democratization Regulation
Providing access to the grid
for many small end users for peer to peer
electricity trade and choosing the
supplier freely.
Alleviating the hierarchy in the energy supply chain, market
power, and centralized supply; liquefying the energy market and
reducing the prices for consumers; and creating awareness on
energy use and efficiency
Aggregation of small
prosumers (virtual power
plants
Energy market
Aggregating load and generation of a group of
end users to offer to electricity, balancing, or
reserve markets
Mobilizing small loads to participate in competitive markets;
helping the grid by reducing load in peak times; Hedging the risk
of high electricity bills at peak hours; and improving flexibility of
the grid and reducing the need for balancing assets; Offering
profitability to consumers
Energy supply
Application Sector Description Benefits
Preventive maintenance
Upstream oil and
gas industry/utility
companies
Fault, leakage, and fatigue monitoring by
analyzing of big data collected through static
and mobile sensors or cameras
Reducing the risk of failure, production loss and maintenance
downtime; reducing the cost of O&M; and preventing accidents
and increasing safety.
Fault maintenance Energy market
Identifying failures and problems in energy
networks and possibly fixing them virtually
Improving reliability of a service; improving speed in fixing
leakage in district heating or failures in electricity grids; and
reducing maintenance time and risk of health/safety
Energy storage and
analytics
Industrial suppliers
or utility companies
Analyzing market data and possibilities for
activating flexibility options such as energy
storage in the systems
Reducing the risk of supply and demand imbalance; increasing
profitability in energy trade by optimal use of flexible and storage
options; and ensuring an optimal strategy for storage assets.
Digitalized power
generation
Utility companies &
system operator
Analyzing big data of and controlling many
generation units at different time scales
Improving security of supply; improving asset usage and
management; reducing the cost of provision of backup capacity;
accelerating the response to the loss of load; and reducing the
risk of blackout.
Transmission and Distribution (T&D) grid
Application Sector Description Benefits
Smart grids
Electric grid
management
A platform for operating the grid using big data and
ICT technologies as opposed to traditional grids.
Improving energy efficiency and integration of distributed generation
and load; improving security of supply; and reducing the need for
backup supply capacity and costs
Network management
Electric grid
operation
&management
Using big data at different points of the grid to
manage the grid more optimally
Identifying weak points and reinforcing the grid accordingly and
reducing the risk of blackout
Integrated control of electric
vehicle fleet (EV)
Electric grid
operation &
management
Analyzing data of charging stations and
charge/discharge cycles of EVs.
Improving the response to charging demand at peak times;
analyzing and forecasting the impact of EVs on load; and identifying
areas for installing new charging stations and reinforcement of the
distribution grid.
Control and management of
vehicle to grid (V2G)
residential/comme
rcial &industry
Central control (i.e., by shedding, shifting, or
leveling; load of many consumers by analyzing the
load and operation of appliances
Reducing demand at peak time, which itself reduces the grid
congestion; reducing consumer electricity bills; and reducing the
need for investment in grid backup capacity.
Microgrids Electricity grid
Platforms for managing a grid independent from
the central grid
Improving security of supply; creating interoperability and flexibility
between microgrids and the main grid; and offering stable electricity
prices for the consumers connected to the microgrid.
Demand side
Application Sector Description Benefits
Demand response
Residential/comm
ercial &industry
Central control (i.e., by shedding, shifting, or
leveling.
Reducing demand at peak time, which itself reduces the grid
congestion
Demand response(demand
side management
Residential/comm
ercial &industry
Central control (i.e., by shedding, shifting, or
leveling; load of many consumers by analyzing the
load and operation of appliances
Reducing demand at peak time, which itself reduces the grid
congestion; reducing consumer electricity bills; and reducing the
need for investment in grid backup capacity
Advanced metering
infrastructure
End users
Using sensors and devices to collect and analyze
the load and temperature data in a consumer site
Having access to detailed load variations indifferent time scale;
identifying areas for improving energy efficiency (for example overly
air-conditioned rooms or extra lights when there is no occupants);
and reducing the cost of energy use
Battery energy management End users
Data analytics for activating battery at the most
suitable time
Optimal strategy for charge/discharge of battery in different time
scale; improving energy efficiency and helping the grid at peak
times; and reducing the cost of energy use
Smart buildings End users
Centralized and remote control of appliances and
device
Improving comfort by optimal control of appliances and HVAC
systems; reducing manual intervention, saving time and energy;
increasing knowledge on energy use and environmental impact;
improving readiness for joining a smart grid or virtual power plant;
and improved integration of distributed generation and storage
systems
https://iot-analytics.com/top-10-iot-applications-in-2020/
Top Ten IoT Application Areas in 2020
Existing IoT Use Cases
Module 3
IoT Security and Privacy
 Security and Privacy Risks
 Analyze Security Risks
 Technologies and Methods that Mitigate Security
 Privacy Standards and Regulations
 Social and Privacy impacts
IoT Applications
Vehicles
Devices (Medical,
Security, Data
Collection)
Smart office
Smart Tracking
Smart
Advertisement
Smart Appliances
Smart Kitchen
Security System
Smart Phone
Tablets
Wearable Objects
Smart Grid
Smart Road
Smart Traffic
Smart Parking
Smart Transport
Smart Agriculture
Smart Energy
Human Objects Homes Cities Trades Industries
IoT Solution Architecture - Stages Level 1-Edge Nodes: This level is composed of computing nodes such as sensors, micro-controllers, RFID readers, and several
types of RFID tags. Several security goals like integrity, confidentiality, and privacy should be taken into consideration from this level
upwards.
Level 2-Communication: This level consists of all enabler technologies (e.g., connectivity and communication protocols ) which
allow transportation of commands and data between objects in the first level and objects located at the third level.
Level 3-Edge Computing: The main objective of this level is to perform simple data processing which in turn decreases the
computation load in the higher level and offers a quick response. It is wise for real-time applications to process data closer to the
edge of the network, rather than to process data in the cloud. Many factors (e.g., service providers and computing nodes) can be used
to define the amount of data processing at this level.
Level 4-Data Accumulation: As most of IoT applications may not require immediate data processing, this level converts data in
motion to data at rest. It provides several functions, the most popular of which are changing packets to database tables, deciding if
data is of importance to higher levels, and minimizing data via filtering process.
Level 5- Data Abstraction: This level is used to store data for further processing. In general, this level provides several functions
such as normalization/denormalization, indexing, and access control to different data centers.
Level 6-Applications: The list of IoT applications operated at this level is almost endless in both sectors ( industries and markets).
Information interpretation can be provided as a result of cooperation between different applications, which in turn depends on data
either at rest or in motion at this level.
Level 7- Data Centers (DC) and Users: In this level, only authorized users should be allowed to communicate with IoT
applications to make use of their data. Such data may be stored remotely in DCs for further processing.
CIA Security Model
IoT Generic Model with Privacy and
Security Policies
Privacy and Security Policies
CIA
Confidentiality
Integrity
Availability
Confidentiality measures protect information, data, system, resources etc., from unauthorized view, access and misuse
Confidentiality
Passwords, access control lists and authentication procedures use software to control access to resources. These access control
methods are complemented by the use encryption to protect information that can be accessed despite the controls, such as emails that
are in transit. Additional confidentiality countermeasures include administrative solutions such as policies and training, as well as
physical controls that prevent people from accessing facilities and equipment.
Countermeasures:
Integrity measures protect information/data from unauthorized alteration. These measures provide assurance in the accuracy and
completeness of data.
Integrity
Countermeasures:
Access control and rigorous authentication can help prevent authorized users from making unauthorized changes. Hash verifications
and digital signatures can help ensure that transactions are authentic.
Aims to provide data for users whenever needed. User should be able to access data not only in normal conditions but also in
disastrous conditions. Some of the most fundamental threats to availability are non-malicious in nature and include hardware failures,
unscheduled software downtime and network bandwidth issues.
Availability
Countermeasures:
Backup servers and Data storage
Countermeasures to protect against DoS attacks include firewalls and routers.
External
Internal
Agent IoT Layers(3 Layers
Architecture)
Threats
Physical Layer
Network Layer
Data Process
Application
Layer
DoS
Tampering Jamming
Eavesdropping
De- synchronization
MITM Spoofing
Selective forwarding
Collision
Exhaustion Malware
System integrity
Client application Communication
Modifications
Unfairness Wormhole
Flooding
Multi-user access
Data access
IoT Threats
Tampering
Eavesdropping
Physical Layer - Threats
The hardware or software features of IoT objects are modified by the attackers via physical or cyber
methods.
Jamming
Fundamental security policies violation: Tampering targets the integrity of IoT systems.
It is the type of attack in which the data integrity is damaged by interfering the network traffic during the
communication of the objects. The jammer positioned between the sender and the receiver transmits a
high-power signal across the sensitive band range to disrupt the communication medium between the
objects.
Fundamental security policies violation: Integrity and Accessibility.
A passive listening attack. It is a technique that is used to access and retrieve the communication traffic
between IoT objects
Fundamental security policies violation: Confidentiality.
Denial-of-service(DoS)
Jamming
Eavesdropping
Physical Layer - Threats
DoS attacks are being made to disrupt the services of IoT platforms. In detail, the communication network
between IoT objects is blocked resulting in being non-communicating. IoT has a weakness against
attacks that disrupt its functioning, occupy resources and consume the energy of devices. The most
important type of attack affected by such weaknesses is the DoS attacks. Likewise, DoS attacks can
target all of the physical, data link, network, transmission and application layers of TCP/IP. The attacker
gets control of the target system by sending a continuous data request to the target IoT platform from
different locations
Fundamental security policies violation: Dos targets the accessibility of IoT systems.
Denial-of-service(DoS)
Denial-of-service attacks are characterized by an explicit attempt by attackers to prevent legitimate use
of a service.
Distributed DoS(DDoS) (Form of DoS attacks)
A distributed denial-of-service (DDoS) attack occurs when multiple systems flood the bandwidth or
resources of a targeted system, usually one or more web servers. A DDoS attack uses more than one
unique IP address or machines, often from thousands of hosts infected with malware. A distributed
denial of service attack typically involves more than around 3–5 nodes on different networks; fewer
nodes may qualify as a DoS attack but is not a DDoS attack
Iot vijaya priya r cat1
Iot vijaya priya r cat1
Iot vijaya priya r cat1

Contenu connexe

Tendances

Privacy in cloud computing
Privacy in cloud computingPrivacy in cloud computing
Privacy in cloud computing
Ahmed Nour
 
Cloud Analytics Ability to Design, Build, Secure, and Maintain Analytics Solu...
Cloud Analytics Ability to Design, Build, Secure, and Maintain Analytics Solu...Cloud Analytics Ability to Design, Build, Secure, and Maintain Analytics Solu...
Cloud Analytics Ability to Design, Build, Secure, and Maintain Analytics Solu...
YogeshIJTSRD
 
Introduction to cloud security
Introduction to cloud securityIntroduction to cloud security
Introduction to cloud security
IAEME Publication
 

Tendances (20)

Watson AI platform for business - IBM Cloud
Watson AI platform for business - IBM CloudWatson AI platform for business - IBM Cloud
Watson AI platform for business - IBM Cloud
 
B1802041217
B1802041217B1802041217
B1802041217
 
Ey35869874
Ey35869874Ey35869874
Ey35869874
 
Thailand Business with the Cloud Service
Thailand Business with  the Cloud ServiceThailand Business with  the Cloud Service
Thailand Business with the Cloud Service
 
Libera la potenza del Machine Learning
Libera la potenza del Machine LearningLibera la potenza del Machine Learning
Libera la potenza del Machine Learning
 
Cloud Computing Direction in Thailand
Cloud Computing  Direction in ThailandCloud Computing  Direction in Thailand
Cloud Computing Direction in Thailand
 
Internet of Things application platforms
Internet of Things application platformsInternet of Things application platforms
Internet of Things application platforms
 
Ad4502189193
Ad4502189193Ad4502189193
Ad4502189193
 
HP Iot platform and solution plans
HP Iot platform and solution plansHP Iot platform and solution plans
HP Iot platform and solution plans
 
Improve network safety through better visibility – Netmagic
Improve network safety through better visibility – NetmagicImprove network safety through better visibility – Netmagic
Improve network safety through better visibility – Netmagic
 
VMware pulse IoT center, an IoT management suite
VMware pulse IoT center, an IoT management suiteVMware pulse IoT center, an IoT management suite
VMware pulse IoT center, an IoT management suite
 
Dynamic network services whitepaper external final
Dynamic network services whitepaper external finalDynamic network services whitepaper external final
Dynamic network services whitepaper external final
 
Privacy in cloud computing
Privacy in cloud computingPrivacy in cloud computing
Privacy in cloud computing
 
Cloud Analytics Ability to Design, Build, Secure, and Maintain Analytics Solu...
Cloud Analytics Ability to Design, Build, Secure, and Maintain Analytics Solu...Cloud Analytics Ability to Design, Build, Secure, and Maintain Analytics Solu...
Cloud Analytics Ability to Design, Build, Secure, and Maintain Analytics Solu...
 
cloudcomputing(bashu).ppt
cloudcomputing(bashu).pptcloudcomputing(bashu).ppt
cloudcomputing(bashu).ppt
 
Applicazioni per mobile e cloud sviluppate in maniera rapida ed efficace
Applicazioni per mobile e cloud sviluppate in maniera rapida ed efficaceApplicazioni per mobile e cloud sviluppate in maniera rapida ed efficace
Applicazioni per mobile e cloud sviluppate in maniera rapida ed efficace
 
IRJET- Authentication and Access Control for Cloud Computing Comparing Proble...
IRJET- Authentication and Access Control for Cloud Computing Comparing Proble...IRJET- Authentication and Access Control for Cloud Computing Comparing Proble...
IRJET- Authentication and Access Control for Cloud Computing Comparing Proble...
 
Effect of Mixing and Compaction Temperatures on the Indirect Tensile Strength...
Effect of Mixing and Compaction Temperatures on the Indirect Tensile Strength...Effect of Mixing and Compaction Temperatures on the Indirect Tensile Strength...
Effect of Mixing and Compaction Temperatures on the Indirect Tensile Strength...
 
Introduction to cloud security
Introduction to cloud securityIntroduction to cloud security
Introduction to cloud security
 
IRJET - Cloud Computing Application
IRJET -  	  Cloud Computing ApplicationIRJET -  	  Cloud Computing Application
IRJET - Cloud Computing Application
 

Similaire à Iot vijaya priya r cat1

summaryg.pdffgdfgdfgfgfgfgfgffgfdfgfgffg
summaryg.pdffgdfgdfgfgfgfgfgffgfdfgfgffgsummaryg.pdffgdfgdfgfgfgfgfgffgfdfgfgffg
summaryg.pdffgdfgdfgfgfgfgfgffgfdfgfgffg
HakkemB
 
Internet of Things ( IoT ) Training
Internet of Things ( IoT ) TrainingInternet of Things ( IoT ) Training
Internet of Things ( IoT ) Training
Tonex
 
IoT & Applications Digital Notes.pdf
IoT & Applications Digital Notes.pdfIoT & Applications Digital Notes.pdf
IoT & Applications Digital Notes.pdf
raja118355
 
IoT & Applications Digital Notes (1).pdf
IoT & Applications Digital Notes (1).pdfIoT & Applications Digital Notes (1).pdf
IoT & Applications Digital Notes (1).pdf
ssusere169ea1
 
IoT & Applications Digital Notes.pdf
IoT & Applications Digital Notes.pdfIoT & Applications Digital Notes.pdf
IoT & Applications Digital Notes.pdf
MaaheenKashish
 
Information technology for management (6th edition)
Information technology for management (6th edition)Information technology for management (6th edition)
Information technology for management (6th edition)
MShuibMJ
 
Information technology for management (6th edition)
Information technology for management (6th edition)Information technology for management (6th edition)
Information technology for management (6th edition)
MShuibMJ
 
Information Technology
Information TechnologyInformation Technology
Information Technology
Divyank Jindal
 

Similaire à Iot vijaya priya r cat1 (20)

Towards Internet of Things: Survey and Future Vision
Towards Internet of Things: Survey and Future VisionTowards Internet of Things: Survey and Future Vision
Towards Internet of Things: Survey and Future Vision
 
FUTURE AND CHALLENGES OF INTERNET OF THINGS
FUTURE AND CHALLENGES OF INTERNET OF THINGS FUTURE AND CHALLENGES OF INTERNET OF THINGS
FUTURE AND CHALLENGES OF INTERNET OF THINGS
 
FUTURE AND CHALLENGES OF INTERNET OF THINGS
FUTURE AND CHALLENGES OF INTERNET OF THINGS FUTURE AND CHALLENGES OF INTERNET OF THINGS
FUTURE AND CHALLENGES OF INTERNET OF THINGS
 
internet-of-things-iot-concepts-and-applications-9783030374686-3030374688_com...
internet-of-things-iot-concepts-and-applications-9783030374686-3030374688_com...internet-of-things-iot-concepts-and-applications-9783030374686-3030374688_com...
internet-of-things-iot-concepts-and-applications-9783030374686-3030374688_com...
 
summaryg.pdffgdfgdfgfgfgfgfgffgfdfgfgffg
summaryg.pdffgdfgdfgfgfgfgfgffgfdfgfgffgsummaryg.pdffgdfgdfgfgfgfgfgffgfdfgfgffg
summaryg.pdffgdfgdfgfgfgfgfgffgfdfgfgffg
 
Internet of Things ( IoT ) Training
Internet of Things ( IoT ) TrainingInternet of Things ( IoT ) Training
Internet of Things ( IoT ) Training
 
Internet of Things -Overview
Internet of Things -OverviewInternet of Things -Overview
Internet of Things -Overview
 
E-Toll Payment Using Azure Cloud
E-Toll Payment Using Azure CloudE-Toll Payment Using Azure Cloud
E-Toll Payment Using Azure Cloud
 
IRJET-A Review: IoT and Cloud Computing for Future Internet
IRJET-A Review: IoT and Cloud Computing for Future InternetIRJET-A Review: IoT and Cloud Computing for Future Internet
IRJET-A Review: IoT and Cloud Computing for Future Internet
 
IoT & Applications Digital Notes.pdf
IoT & Applications Digital Notes.pdfIoT & Applications Digital Notes.pdf
IoT & Applications Digital Notes.pdf
 
IoT & Applications Digital Notes.pdf
IoT & Applications Digital Notes.pdfIoT & Applications Digital Notes.pdf
IoT & Applications Digital Notes.pdf
 
IoT & Applications Digital Notes (1).pdf
IoT & Applications Digital Notes (1).pdfIoT & Applications Digital Notes (1).pdf
IoT & Applications Digital Notes (1).pdf
 
IoT & Applications Digital Notes.pdf
IoT & Applications Digital Notes.pdfIoT & Applications Digital Notes.pdf
IoT & Applications Digital Notes.pdf
 
Information technology for management (6th edition)
Information technology for management (6th edition)Information technology for management (6th edition)
Information technology for management (6th edition)
 
Information technology for management (6th edition)
Information technology for management (6th edition)Information technology for management (6th edition)
Information technology for management (6th edition)
 
The Best IoT Embedded Course: A Comprehensive Guide 2024
The Best IoT Embedded Course: A Comprehensive Guide 2024The Best IoT Embedded Course: A Comprehensive Guide 2024
The Best IoT Embedded Course: A Comprehensive Guide 2024
 
Information Technology
Information TechnologyInformation Technology
Information Technology
 
Internet of Things (IoT): Readme
Internet of Things (IoT): ReadmeInternet of Things (IoT): Readme
Internet of Things (IoT): Readme
 
IoT - Technical Regulatory Aspects and Key Challenges
IoT - Technical Regulatory Aspects and Key Challenges IoT - Technical Regulatory Aspects and Key Challenges
IoT - Technical Regulatory Aspects and Key Challenges
 
IRJET- Fourth Coming Internet: The Internet of Things
IRJET- Fourth Coming Internet: The Internet of ThingsIRJET- Fourth Coming Internet: The Internet of Things
IRJET- Fourth Coming Internet: The Internet of Things
 

Plus de ChetanShahukari (13)

Presentation1 copy (4)
Presentation1   copy (4)Presentation1   copy (4)
Presentation1 copy (4)
 
Presentation1 copy (3)
Presentation1   copy (3)Presentation1   copy (3)
Presentation1 copy (3)
 
Dsp review
Dsp reviewDsp review
Dsp review
 
Dsp review 1,2,3
Dsp review 1,2,3Dsp review 1,2,3
Dsp review 1,2,3
 
Dsp lab task1 ganesh
Dsp lab task1 ganeshDsp lab task1 ganesh
Dsp lab task1 ganesh
 
Urbanplanning cat1
Urbanplanning cat1Urbanplanning cat1
Urbanplanning cat1
 
Micro task1
Micro task1Micro task1
Micro task1
 
Presentation1
Presentation1Presentation1
Presentation1
 
Dsp lab task 2
Dsp lab task 2Dsp lab task 2
Dsp lab task 2
 
19bec0855 project review 1-converted
19bec0855 project review 1-converted19bec0855 project review 1-converted
19bec0855 project review 1-converted
 
Ppt 2
Ppt 2Ppt 2
Ppt 2
 
Presentation1 copy (2)
Presentation1   copy (2)Presentation1   copy (2)
Presentation1 copy (2)
 
Presentation1 copy
Presentation1   copyPresentation1   copy
Presentation1 copy
 

Dernier

Integrated Test Rig For HTFE-25 - Neometrix
Integrated Test Rig For HTFE-25 - NeometrixIntegrated Test Rig For HTFE-25 - Neometrix
Integrated Test Rig For HTFE-25 - Neometrix
Neometrix_Engineering_Pvt_Ltd
 
"Lesotho Leaps Forward: A Chronicle of Transformative Developments"
"Lesotho Leaps Forward: A Chronicle of Transformative Developments""Lesotho Leaps Forward: A Chronicle of Transformative Developments"
"Lesotho Leaps Forward: A Chronicle of Transformative Developments"
mphochane1998
 
Standard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power PlayStandard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power Play
Epec Engineered Technologies
 
scipt v1.pptxcxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx...
scipt v1.pptxcxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx...scipt v1.pptxcxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx...
scipt v1.pptxcxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx...
HenryBriggs2
 

Dernier (20)

Air Compressor reciprocating single stage
Air Compressor reciprocating single stageAir Compressor reciprocating single stage
Air Compressor reciprocating single stage
 
Work-Permit-Receiver-in-Saudi-Aramco.pptx
Work-Permit-Receiver-in-Saudi-Aramco.pptxWork-Permit-Receiver-in-Saudi-Aramco.pptx
Work-Permit-Receiver-in-Saudi-Aramco.pptx
 
HAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKAR
HAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKARHAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKAR
HAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKAR
 
A Study of Urban Area Plan for Pabna Municipality
A Study of Urban Area Plan for Pabna MunicipalityA Study of Urban Area Plan for Pabna Municipality
A Study of Urban Area Plan for Pabna Municipality
 
Thermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - VThermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - V
 
School management system project Report.pdf
School management system project Report.pdfSchool management system project Report.pdf
School management system project Report.pdf
 
Integrated Test Rig For HTFE-25 - Neometrix
Integrated Test Rig For HTFE-25 - NeometrixIntegrated Test Rig For HTFE-25 - Neometrix
Integrated Test Rig For HTFE-25 - Neometrix
 
"Lesotho Leaps Forward: A Chronicle of Transformative Developments"
"Lesotho Leaps Forward: A Chronicle of Transformative Developments""Lesotho Leaps Forward: A Chronicle of Transformative Developments"
"Lesotho Leaps Forward: A Chronicle of Transformative Developments"
 
Standard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power PlayStandard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power Play
 
scipt v1.pptxcxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx...
scipt v1.pptxcxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx...scipt v1.pptxcxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx...
scipt v1.pptxcxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx...
 
Rums floating Omkareshwar FSPV IM_16112021.pdf
Rums floating Omkareshwar FSPV IM_16112021.pdfRums floating Omkareshwar FSPV IM_16112021.pdf
Rums floating Omkareshwar FSPV IM_16112021.pdf
 
kiln thermal load.pptx kiln tgermal load
kiln thermal load.pptx kiln tgermal loadkiln thermal load.pptx kiln tgermal load
kiln thermal load.pptx kiln tgermal load
 
Engineering Drawing focus on projection of planes
Engineering Drawing focus on projection of planesEngineering Drawing focus on projection of planes
Engineering Drawing focus on projection of planes
 
Generative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPTGenerative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPT
 
Hazard Identification (HAZID) vs. Hazard and Operability (HAZOP): A Comparati...
Hazard Identification (HAZID) vs. Hazard and Operability (HAZOP): A Comparati...Hazard Identification (HAZID) vs. Hazard and Operability (HAZOP): A Comparati...
Hazard Identification (HAZID) vs. Hazard and Operability (HAZOP): A Comparati...
 
Minimum and Maximum Modes of microprocessor 8086
Minimum and Maximum Modes of microprocessor 8086Minimum and Maximum Modes of microprocessor 8086
Minimum and Maximum Modes of microprocessor 8086
 
2016EF22_0 solar project report rooftop projects
2016EF22_0 solar project report rooftop projects2016EF22_0 solar project report rooftop projects
2016EF22_0 solar project report rooftop projects
 
Double Revolving field theory-how the rotor develops torque
Double Revolving field theory-how the rotor develops torqueDouble Revolving field theory-how the rotor develops torque
Double Revolving field theory-how the rotor develops torque
 
Unleashing the Power of the SORA AI lastest leap
Unleashing the Power of the SORA AI lastest leapUnleashing the Power of the SORA AI lastest leap
Unleashing the Power of the SORA AI lastest leap
 
FEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced Loads
FEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced LoadsFEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced Loads
FEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced Loads
 

Iot vijaya priya r cat1

  • 1. Internet of Things IoT – Domain Specialist : MC_SSCQ8210_V1.0_IoT-Domain_Specialist_09.04.2019.pdf SECTOR : IT-ITeS SUB-SECTOR : FUTURE SKILLS OCCUPATION : INTERNET OF THINGS REF ID : SSC/Q8210, V1.0 NSQF LEVEL : 8 Semester V : ECE3501 – IoT Fundamentals Semester VI : ECE3502 – IoT Domain Analyst Syllabus is framed based on the SSC NASSCOM Curriculum OSI - TCP/IP - IoT Application Layer Physical Layer Application Layer Network Layer App. Services Platform Network Layer Datalink Layer Network Layer Internet Layer Transport Layer Transport Layer Session Layer Presentation Layer Application Layer Device Layer App. Services Layer App. Protocols Layer ISO - OSI TCP/IP (Internet) IoT TCP/IP - IoT TCP/IP Protocol Stacks IoT Protocol Stacks IoT Application Device Management Application Layer CoAP, MQTT, XMPP, AMQP HTTP, DHCP, DNS, TLS/SSL Transport Layer UDP,DTLS TCP/UDP IPv6/IP routing 6LoWPAN Internet Layer Network/Link Layer Ethernet(IEEE 802.3), Wireless LAN(802.11), Wi-Fi IPv6, IPv4, IPSec IEEE 802.15.4 MAC IEEE 802.15.4 PHY Web Application IoT Architecture Three Layer Application Layer Network Layer Perception Layer Four Layer Application Layer Middleware Layer Network Layer Perception Layer Five Layer Business Layer Application Layer Middleware Layer Network Layer Perception Layer
  • 2. IoT Architecture Three Layer Five Layer What is IoT ? An IoT is a network that connects uniquely identifiable ‘Things’ to the Internet. The ‘Things’ have sensing/actuation and potential programmability capabilities. Through the exploitation of unique identification and sensing, information about the ‘Thing’ can be collected and the state of the ‘Thing’ can be changed from anywhere, anytime, by anything. - (IEEE) How IoT works? IoT devices gather data and send it through the internet for processing Data is analyzed centrally Instructions based on analysis are returned to the devices 3 1 2 Data Generation & Gathering Data Generation Data Collection Data Pre- processing Data Storage Data Analytics Information Delivery Pre-requisite: Computer Networks ECE3501 - IoT Fundamentals Course Objectives: 1. To impart knowledge on the infrastructure, sensor technologies and networking technologies of IoT 2. To analyze, design and develop IoT solutions. 3. To explore the entrepreneurial aspect of the Internet of Things 4. To apply the concept of Internet of Things in the real world scenarios Expected Course Outcome: After successfully completing the course the student should be able to 1. Identify the main component of IoT 2. Program the controller and sensor as part of IoT 3. Assess different Internet of Things technologies and their applications L T P J C 2 0 2 4 4
  • 3. Module 1: Introduction: (2 Hours) IT-ITeS/BPM Industry – An Introduction, the relevance of the IT-ITeS sector, Future Skills – An Introduction, General overview of the Future Skills sub-sector. Syllabus: 7 Modules; 30 Hours Module 2: Internet of Things - An Introduction: (3 Hours) Evolution of IoT and the trends, Impact of IoT on businesses and society, Existing IoT use cases and applications across industries. Module 3: IoT Security and Privacy (6 Hours) Security and privacy risks, analyze security risks, Technologies and methods that mitigate security, Privacy standards and regulations, Social and privacy impacts. Module 4: IoT Solutions (6 Hours) IoT use case development, Need and Goals for IoT solution, Adoption of IoT solutions, Planning for IoT Solution: Evaluate costs, competition, technology challenges and internal resource considerations, Need for stakeholder buy-in. Module 5: Prototyping the Pilot execution (5 Hours) Prototype developing Stages, deploy real-time UI/UX visualizations, Methods and metrics to analyze and convey business outcomes, feedback and data obtained from execution. Module 6: Scalability of IoT Solutions (5 Hours) Roadmap for developing complete IoT solutions, Strategies for implementation, key Milestone, Scalability of IoT Solutions, Methods, platforms and tools, Web and Mobile Interfaces. Module 7: Build and Maintain Relationships at the Workplace, Team Empowerment (3 Hours) Text Book(s) 1. Arshdeep Bahga, Vijay Madisetti, “Internet of Things: A hands-on Approach”, University Press, 2015. 2. Adrian McEwen & Hakim Cassimally, “Designing the Internet of Things”, Wiley, Nov 2013, (1 st edition) 3. Claire Rowland, Elizabeth Goodman, Martin Charlier, Ann Light, Algred Lui,” Designing Connected Products: UX for the consumer internet of things”, O’Reilly, (1st edition),2015 Reference Books 1. Rethinking the Internet of things: A Scalable Approach to Connecting Everything by Francis daCosta, Apress, 2014 2. Learning Internet of Things by Peter Waher, Packt Publishing, 2015 3. Designing the Internet of Things, by Adrian Mcewen, Hakin Cassimally , Wiley India Private Limited 4. Cloud Computing, Thomas Erl, Pearson Education, 2014 5. Foundations of Modern Networking: SDN, NFV, QoE, IoT, and Cloud, William Stallings, Addison-Wesley Professional; 1 edition 6. https://nsdcindia.org/sites/default/files/MC_SSCQ8210_V1.0_IoT-Domain%20Specialist_09.04.2019.pdf Rubrics 1. Digital Assignment I (06.09.2021) : 10 Marks 2. Quiz I (18.10.2021 - 22.10.2021) : 10 Marks 3. Quiz II (22.11.2021 - 26.11.2021) : 10 Marks Theory – Internal Assessment CAT II: 24.10.2021 to 30.10.2021 CAT I: 12.09.2021 to 18.09.2021 Last Instructional Day: 10.12.2021 Title Submission Review I (20 Marks) Review II (30 Marks) Review III (50 Marks) 14.08.2021 - 15.09.2021 30.08.2021 - 03.09.2021 18.10.2021 - 22.10.2021 29.11.2021 - 03.12.2021 Batch Members, Title, Abstract, IoT Platform/Hardware Implementation (Google form will be circulated) Objectives, Problem Statement, Block Diagram, Devices/Components/Softw are used Proposed Methodology, part of the project circuit built, Corresponding Results Full project results, Report J Component – Internal Assessment Batch Members: Minimum - 1; Maximum - 3
  • 4. J Component - Report Format i. Cover page containing the Title of the Project, Name of the Course, Semester, Students Name, and Faculty Name. ii. Declaration iii. Certificate iv. Abstract of the work v. Index vi. Chapters 1. Introduction 2. Description of the methodologies used 3. Results and discussion 4. Conclusion and Future Scope 5. References vii. Appendix – Coding Introduction to IT – ITeS Industry 1 Introduction Information and Communication Technology (ICT) has become one of the basic requirements of the modern society. In today’s digital era, we use mobile devices to perform the tasks of our daily life. It is difficult to think of any event without the use of digital devices. Information Technology (IT) is one of the world’s fastest growing economic activities, which envisages easier flow of information at various levels in the desired pattern. The Information Technology enabled Services (ITeS) sector has not only changed the way the world looks at our country but has also made significant contributions to the Indian economy. This session will introduce the basic concepts and ideas related to Information Technology (IT) and IT enabled Services (ITeS). Information Technology Information Technology (IT) means creating, managing, storing and exchanging information. IT includes all types of technology used to deal with information, such as computer hardware and software technology Unit 1.indd 1 9/6/2018 12:10:38 PM Domestic Data Entry Operator – Class IX 2 used for creating, storing, and transferring information. Computer takes data as input, processes it and produces the results as output. The information is the result of data processing. Data refers to the facts or raw material, which are processed to get the information. Number of boys and girls in a class is a factual data of the classroom. This is an example of data related to the students in the class. Some conclusion can be drawn based on the data. This conclusion is information. The decisions are taken on the basis of data and information. IT is a tightly integrated part of business. Computers and information systems are an essential part of every businesstoday.Likeaccountingandlegal,everybusiness needs to invest in technology to compete. IT has several benefits for a business, such as it helps in reaching more potential customers, developing a business relationship with potential customers, streamlining operations, reducing costs, improving efficiency, maximising profit, minimising waste, providing better service to customers, supporting better relationships with key partners, and allowing customers to better guide the business. Information Technology enabled Services (ITeS) Information Technology that enables the business by improving the quality of service is Information Technology enabled Services (ITeS). ITeS is also called web-enabled services or remote services that cover the entire operations which exploit Information Technology for improving the efficiency of an organisation. These servicesprovideawiderangeofcareeroptionsthatinclude opportunities in all offices like call centres, payrolls, logistics management, revenue claims processing, medical billing, coding, medical transcription, legal databases, back office operations, content development, GIS (geographical information system), web services and Human Resource (HR) services, etc. ITeS is defined as outsourcing of processes that can be enabled with information technology and covers diverse areas like finance, HR, administration, health care, telecommunication, manufacturing, etc. Notes Unit 1.indd 2 9/6/2018 12:10:38 PM Introduction to IT–ITeS Industry 3 Notes E-enabled services radically reduce costs and improve service standards. In short, Internet service provider aims to provide B2B e-commerce solutions. ITeS offers different services integrated in a single delivery mechanism to end users. The services may include: Medical Transcription, Customer Relationship Management, Data Entry and Data Processing, Software development, Data Warehousing, IT Help Desk Services, Enterprise Resource Planning and Telecommunication Services. BPO services Business Process Outsourcing (BPO) services means performing business operations through an outside service provider. BPO also comes under IT services as IT plays a very useful role in optimising the business performance. The BPO industry is highly organised and hence various kinds of jobs are outsourced in India. India has the expertise in reducing costs with firm control on the quality of the service. Some of the BPO services are as follows: (a) Financial and Accounting Services (b) Taxation and Insurance Services (c) E-Publishing and Web Promotion (d) Legal Services and Content Writing (e) Multimedia and Design Services (f) Document Management Services (g) Software Testing Services (h) Health Care Services BPM industry in India The IT BPM (Business Process Management) industry hasbeenfuelingIndia’sgrowth.Inadditiontocontributing towards the country’s Gross Domestic Product (GDP) and exports, the growth of the IT BPM industry has provided India with a wide range of economic and social benefits which includes creating employment, raising income levels, and promoting exports. It has placed India on the world map with an image of a technologically advanced and knowledge‑based economy. This sector attracts amongst the largest investments by venture Unit 1.indd 3 9/6/2018 12:10:38 PM
  • 5. Domestic Data Entry Operator – Class IX 4 Notes capitalist and has been credited with enabling the entrepreneurial ventures of many in the country. The IT-BPM industry has almost doubled in terms of revenueandcontributiontoIndia’sGDPoverthelastdecade (2008–18). BPO Service Industry is doing exceptionally well in India because of the following advantages: (a) BPO service providers in India invest in hi-tech hardware and software to deliver the best of services. They follow quality checks to ensure error free and exceptional service. (b) Government of India is encouraging the BPO Industry in India by providing necessary infrastructure and logistical support. (c) BPO Industry in India is highly developed and capable of delivering numerous types of BPO services in exceptional quality. Structure of the IT-BPM industry The organisations within the IT‑BPM industry are categorised along the following parameters: • Sector the organisation is serving • Type as well as range of offering the organisation provides • Geographic spread of operations • Revenues and size of operations (a) Multinational Companies (MNCs): MNCs have their headquarters outside India but operate in multiple locations worldwide including those in India. They cater to external clients (both domestic and/or global). (b) Indian Service Providers (ISPs): ISPs started with their operations in India. Most of these organisations have their headquarters in India while having offices in many international locations. While most have a client base, which is global as well as domestic, there are some that have focussed on serving only the Indian clients. (c) Global In-house Centers (GIC):  GIC organisations cater to the needs of their parent company only and do not serve external clients. Unit 1.indd 4 9/6/2018 12:10:38 PM Introduction to IT–ITeS Industry 5 This model allows the organisation the option to keep IT Operations in-house and at the same time take advantage of expanding their global footprint and offering opportunities for innovation in a cost-effective manner. IT applications In technologically developed nations, Information Technology has become a part of everyday life. For a user, computer is a tool that provides the desired information, whenever needed. The use of computer and Information Technology can be observed at home, workplace, in the modern service industry and in all aspects of our life. It includes listening to music, watching movies, playing games, doing office work, chatting and sending messages, managing daily planner, reading books, paying utility bills, booking ticket to travel, bank operations, etc. Computers and ICT is used in industries, in offices, and in house also. The various application areas are business, banking, insurance, education, marketing, health care, engineering design, military, communication, animation, research, agriculture and government. IT in home computing A personal computer (PC) is used to work at home, to do household accounts, play games, surf the web, use Fig. 1.1: IT applications Unit 1.indd 5 9/6/2018 12:10:38 PM Domestic Data Entry Operator – Class IX 6 e-mail, create music, and pursue a range of other hobbies. PC is also used to play games. It includes action games, role playing games, puzzles and many more. A PC with a CD-ROM drive, sound card, and speakers can play audio CD. A computer can be used from home to study a wide range of online training courses. Computers and digital devices are now used for online shopping and e-commerce. IT in everyday life In our daily life, we use washing machines, microwave oven and many other products using which have embedded software. We can store all the information about our important work, appointments schedules and list of contacts in a computer. Computer is, therefore, playing a very important role in our lives and now we cannot imagine the world without computers. IT in library Nowadays many libraries are computerised. Each book has a barcode associated with it. This makes it easier for the library to a keep track of books and the availability of a specific book. Computer software is used to issue and return the book. Each book in the library has a magnetic strip attached to it that is deactivated before the book can be borrowed. IT at workplace In the office environment, computers and computer applications are used to perform office work more effectively. Fig. 1.3: IT in everyday life Fig. 1.5: IT in library Fig. 1.2: IT in home computing Unit 1.indd 6 9/6/2018 12:10:39 PM Introduction to IT–ITeS Industry 7 In assembly-line industries, where attention to detail, speed and efficiency are important, automation is becoming more and more common. Internet and Office applications form the basis of modern business. IT in education Computers and Information Technology are extensively used in education for teaching-learning and assessment. Thesoftwareandhardwaretechnology is used for creation and transmission of information in various forms including still pictures, audio, video and animation to the learners. The learning becomes easy and accessible through IT. A lot of teaching resources are available for teachers to teach in a better way. Online assessment helps to assess the students without any biasness. The students, teachers and educational administrators and every stakeholder in the education sector has benefitted with the integration of IT in education. (a) ICT in the classroom There are many ways in which the ICT is used for education in the classroom, such as • e-learning classrooms; • smart-board presentations; • videos on experiments; • creation of images and video; • desktop publishing of magazines, letters and documents; • educational games; • learning using the CD-ROM media; and • gathering educational information on the Internet. (b) Education — anywhere anytime Any student in India can access the NCERT book online through the website www.epathshala.nic.in or mobile app. Fig. 1.6: IT in education Fig. 1.4: IT at workplace Unit 1.indd 7 9/6/2018 12:10:39 PM
  • 6. Domestic Data Entry Operator – Class IX 8 Apart from this there are a variety of websites and mobile apps to access educational resources on any topic. You can also contact a teacher or a trainer via Internet to use WBT (Web-based Training). In this way education has reached the far flung areas by reaching the unreached. (c) Teaching aids and media ICT is used mostly as a teaching aid in schools to • use pictures, animations and audio-visuals to explain subjects that are difficult to explain. • make the lessons interesting using presentations. • organise lessons using the computer. • obtain the information relevant to the subjects. (d) Learning Management System (LMS) A Learning Management System (LMS) is being used by many countries to manage school systems. A student or teacher can register himself/herself on the official website to access LMS and can get many services from LMS. The student can be benefited by using LMS, as it can be used to • learn lessons anytime and anywhere. • submit queries, getting replies and submit comments through forums. • participate in the co-curricular activities via video. • monitor the progress of their children (by parents). IT in entertainment Information Technology has had a major impact on the entertainment industry. Internetisamajorsourceofentertainment. One can download and view movies, play games, chat, use multimedia, incorporate visual and sound effects using computers, etc. Digital broadcasting has changed the way we experience television, with more interactive programming and participation. Fig 1.7: IT in entertainment Unit 1.indd 8 9/6/2018 12:10:39 PM Introduction to IT–ITeS Industry 9 IT in communication Communication is used to convey messages and ideas, pictures, or speeches. A person who receives this must understand clearly and correctly. Modern communication makes use of the computer system. We use computers for email, chatting, FTP, telnet and video conferencing. IT in business Computers are used in business organisations for payroll calculation,budgeting,salesanalysis,financialforecasting, managing and maintaining stocks. A lot of business transactions happen through Internet called e-commerce. IT facilitates marketing, customer visit, product browsing, shopping basket checkout, tax and shopping, receipt and process order. E-commerce offers services pertaining to processing inventory management, transactions, documentation, presentations, and gathering product information. Smart cards, such as credit cards and debit cards are used in shops. These cards have a metallic strip on which the user’s Personal Identification Number (PIN), and account number is stored and can be read when it is passed through a special reader. Airlines use large-scale computer applications for their reservations system, both in the airports and in central reservations call-centers. Other businesses that have large-scale computing requirements are insurance claims systems and online banking, which both have large numbers of users and operators interacting across one system. IT in science and engineering Scientists and engineers use computers for performing complex scientific calculations, Computer Aided Design (CAD) or Computer Aided Manufacturing (CAM) applications are used for drawing, designing and for simulating and testing the designs. Computers are used for storing large amount of data, performing complex calculations and for visualising Fig. 1.8: IT in Communication Unit 1.indd 9 9/6/2018 12:10:40 PM Domestic Data Entry Operator – Class IX 10 3-dimensional objects. Complex scientific applications like rocket launching, space exploration, etc., are not possible without the computers. IT in banking Computer is an essential part of the modern banking system. Every activity of a bank is now online. The customer’s data and transactions are recorded by computers. Recurring deposits (e-RD), Fixed deposits (e-FD), money transfer from one account to another (NEFT, RTGS), online transactions are done using Internet. Capital market transactions, financial analysis and related services are available in online platforms. Bank customers use Automated Teller Machines (ATM) for cash deposits and withdrawal, or to view current balance. IT in insurance Insurance companies keep all records up to date with the help of computer database. Procedures for continuation of policies, starting date, date of next installment, maturity date, interest dues, survival benefits, and bonus are declared by using computers in insurance companies. Many online policies are also available which can be purchased by using the website of insurance companies. IT in marketing In marketing, computers are used for advertising of products, by using arts and graphics facility it is possible to create interesting advertisements of various products so that the goal of selling can be achieved. Using e-commerce websites, people can purchase items even sitting at home. IT in health care ICT is used in the health sector in numerous ways. Hospital Management System is used to maintain and manage patients’ records as well as various activities pertaining to hospital administration. The computerised Fig. 1.9 (a) MRI machine Fig. 1.9 (b) Detailed images Notes Unit 1.indd 10 9/6/2018 12:10:40 PM Introduction to IT–ITeS Industry 11 3-dimensional objects. Complex scientific applications like rocket launching, space exploration, etc., are not possible without the computers. IT in banking Computer is an essential part of the modern banking system. Every activity of a bank is now online. The customer’s data and transactions are recorded by computers. Recurring deposits (e-RD), Fixed deposits (e-FD), money transfer from one account to another (NEFT, RTGS), online transactions are done using Internet. Capital market transactions, financial analysis and related services are available in online platforms. Bank customers use Automated Teller Machines (ATM) for cash deposits and withdrawal, or to view current balance. IT in insurance Insurance companies keep all records up to date with the help of computer database. Procedures for continuation of policies, starting date, date of next installment, maturity date, interest dues, survival benefits, and bonus are declared by using computers in insurance companies. Many online policies are also available which can be purchased by using the website of insurance companies. IT in marketing In marketing, computers are used for advertising of products, by using arts and graphics facility it is possible to create interesting advertisements of various products so that the goal of selling can be achieved. Using e-commerce websites, people can purchase items even sitting at home. IT in health care ICT is used in the health sector in numerous ways. Hospital Management System is used to maintain and manage patients’ records as well as various activities pertaining to hospital administration. The computerised Fig. 1.9 (a) MRI machine Fig. 1.9 (b) Detailed images machines are used for ECG, EEG, Ultrasound and CT Scan. The variety of measuring instruments and surgical equipment are used to monitor patients’ conditions during complex surgery. Expert system is used for diagnosis. Health care manufacturing companies use computers to aid the production of diagnostic tools and instruments. Computers are an integral part of laboratories and dispensaries. They are used in scanning and diagnosing different diseases. (a) Use of ICT in diagnosis With the advancements in computer hardware and software technology, various high-tech machines are used in the diagnosis and treatment of critical diseases. Using expert system, diseases can be diagnosed at the early stages and the patients can be given treatment accordingly. Some of these machines are: (i) Computerised Axial Tomography Machine (CAT):  Using this machine three-dimensional (3D) images of different parts of the body can be made. These images are helpful in the diagnosis of diseases. (ii) MRI (Magnetic Resonance Imaging Machine): MRI machines are used to give the digital impression of internal organs of the body by using strong magnetic fields and radio waves. The digital images are very helpful in the detection and in deciding the treatment of diseases. Unit 1.indd 11 9/6/2018 12:10:40 PM
  • 7. Domestic Data Entry Operator – Class IX 12 (iii) Electrocardiogram (ECG) Machine:  The ECG machine is used to monitor the heartbeat. When the heart pumps blood to different parts of the body some electrical impulses are produced. This machine records the electrical impulses and shows it in the form of a graph. (iv) Cardiac Screening Machine:  This machine displays the physiology of the heart and it displays the movements inside the heart. Through this machine it is possible to diagnose problems of the heart, such as thinning of veins and then recommend treatment. (v) EEG (Electro ‑  encephalography) Machine: This machine is used to record the activities of the brain. The small electrical probes attached to the head receive the electrical impulses of the brain and display them on a computer screen. This device can retrieve the data in both states where a patient is awake or asleep. (vi) Blood Sugar Testing Machine:  This device analyses a sample of blood and determines the blood glucose level. (vii) Blood Pressure Measuring Machine:  This device which is worn as a wrist band can measure the blood pressure of a person at Fig. 1.11: Cardiac Screening Machine and Display Fig. 1.12: EEG Machine and Display Fig. 1.14: Measuring Blood Pressure Fig. 1.13: Sugar Testing Machine Fig. 1.10 (a) ECG Machine Fig. 1.10 (b) ECG Graph Unit 1.indd 12 9/6/2018 12:10:41 PM Introduction to IT–ITeS Industry 13 Practical Exercise (iii) Electrocardiogram (ECG) Machine:  The ECG machine is used to monitor the heartbeat. When the heart pumps blood to different parts of the body some electrical impulses are produced. This machine records the electrical impulses and shows it in the form of a graph. (iv) Cardiac Screening Machine:  This machine displays the physiology of the heart and it displays the movements inside the heart. Through this machine it is possible to diagnose problems of the heart, such as thinning of veins and then recommend treatment. (v) EEG (Electro ‑  encephalography) Machine: This machine is used to record the activities of the brain. The small electrical probes attached to the head receive the electrical impulses of the brain and display them on a computer screen. This device can retrieve the data in both states where a patient is awake or asleep. (vi) Blood Sugar Testing Machine:  This device analyses a sample of blood and determines the blood glucose level. (vii) Blood Pressure Measuring Machine:  This device which is worn as a wrist band can measure the blood pressure of a person at Fig. 1.11: Cardiac Screening Machine and Display Fig. 1.12: EEG Machine and Display Fig. 1.14: Measuring Blood Pressure Fig. 1.13: Sugar Testing Machine rest or when he/she is involved in some physical activity. IT in the government and public service The government uses large-scale computer applications in its daily operations and is actively encouraging e-governance practices. Digital India and e-governance initiative of Government of India are best examples of this. Government and Non-Governmental Organisations (NGOs) as well as International Government Agencies use ICT applications to communicate and provide various services to the people and is called as e-governance. There are various official web portals of the Government of India for e-governance. There are various advantages of e-governance. The Income tax department, sales tax department, preparations of voters list, preparation of PAN card makes use of the computer system. Many government services are available online. Electricity bills can now be paid online. The government uses electronic voting for elections, by replacing the traditional voting slip and ballot box. People can enroll themselves in the electoral roll through the State Election Commission portal. Computers are common-place in modern society, and tend to make previously laborious manual tasks of data entry much simpler and quicker. 1. Explore the impact of IT and ITeS in various areas in day‑to‑day life. 2. Visit Indian government websites, such as the official web portal of Department of School Education, MHRD, Government of India. Make a list of all the valuable information and the services you could obtain yourself. 3. Make a list of e-government services that are provided by other countries. 4. Visit the various websites and list the areas where ICT is used. 5. Identify the advantages of using ICT over conventional methods in various areas. 6. Observe other instances where ICT is used in business and manufacturing and compile a list. Unit 1.indd 13 9/6/2018 12:10:41 PM Domestic Data Entry Operator – Class IX 14 A. Give an example of the use of IT in the following areas. Avoid already discussed examples. Teacher Practice Example Classroom content transaction Assessment of students Library management Student record management B. Short answer questions (50 words) 1. What do you understand by the term IT and ITeS? 2. What are the pros and cons of using ICT? 3. What precautions are required to ensure that ICT use is safe? 4. What are the four main sub-sectors in the IT-BPM industry? 5. Give examples of use of IT in everyday life. 6. How is IT used in libraries? 7. What are the various processes of education where IT is used? 8. Which software are used in digital communication? 9. For what purpose is IT used in business? 10. Which are the prominent areas where IT is used in science and engineering? 11. List the various uses of IT in a banking system. 12. Which are the different areas of healthcare where IT is used? And how? 13. List any 5 websites of the Indian government which provide IT enabled services to the people. Check Your Progress Notes Unit 1.indd 14 9/6/2018 12:10:41 PM Module 2 Internet of Things - An Introduction  Evolution of IoT and the trends  Impact of IoT on businesses and society  Existing IoT use cases and applications across industries
  • 8. Internet of Things Connects the Physical World to the Internet For a given IoT application 1. Define the objectives 2. Identify the devices a) Physical things/device – which generates data or which is to be monitored b) Sensors c) Actuators 3. Process the data (Data Processing) 4. Sending actuating signal to control the physical thing/device identified in 2(a) Example: Smart Irrigation System 1. Objectives – To measure the moisture level of the soil and if needed have to water the plants 2. Devices Identification a) Physical things/device – Soil b) Sensors - Soil moisture sensors c) Actuators – Electrical Motor 3. Data Processing: Check if the moisture level is below the threshold value. 4. If the level is below the threshold value send the actuating signal to turn on the motor to increase the moisture level of the soil(watering the plants) Internet of Things Connects the Physical World to the Internet Perception/ Device Layer Example: Smart Irrigation System (Three Layer IoT Architecture Representation) Network Layer Application Layer Data Generation, Data Collection/ Gathering, Actuation/controlling Devices Data Transmission, Processing (Pre-processing, Storage, Analytics) IoT Application, API(Web and Mobile), Visualization Layers Functions Example Soil, Sensor, Electric Motor, Microcontroller(Computing Device) Checking the soil moisture level IoT based Smart Irrigation System, communicating the moisture level to the user Internet of Things - Definition Connects the Physical World to the Internet “The Internet of Things (IoT) is the networking of physical devices (also referred to as "connected devices" and "smart devices") embedded with electronics, software, sensors, actuators and network connectivity that enable these objects to collect and exchange data” - as defined by Wikipedia "A global infrastructure for the information society, enabling advanced services by interconnecting (physical and virtual) things based on existing and evolving interoperable information and communication technologies." -as defined by 'The International Telecommunication Unit’ “The Internet of Things is a network of physical objects accessed through internet. These objects contains embedded technology to interact with the internal states or external environment " -as defined by ‘Cisco’ An IoT is a network that connects uniquely identifiable ‘Things’ to the Internet. The ‘Things’ have sensing/actuation and potential programmability capabilities. Through the exploitation of unique identification and sensing, information about the ‘Thing’ can be collected and the state of the ‘Thing’ can be changed from anywhere, anytime, by anything. - (IEEE) Evolution of IoT Phases of Evolution Network The Internet Mobile - Internet PCs + Mobile + People Internet of things Web Web Web Web
  • 9. Potential of IoT Anything Any Device Anyone Anybody Any Service Any Business Any Place Anywhere Any Path Any Network Anytime Any Context History of IoT History of IoT 1969-1995: Internet of Boffins  1969 - TCP/IP  1974 -Telenet  1980 - Ethernet  1994 - Full text web search engines 1995-2000: Internet of Geeks  Started with the proposal of IP  1995 - Amazon started its first online retail service, followed by eBay  1996 - Hotmail  1998 - Google search, PayPal  Internet penetration was low in the market until 2000 2000-2007: Internet of Masses Many people across the globe started using internet  2001 - Wikipedia  2004 - Facebook, followed by Youtube, Twitter 2007-2011: Mobile Internet  Access to the Internet via cellular phone service provider. The era got a boost with introduction of smartphones 2012 onwards: Internet of Things  Things connected to each other using internet IoT Historical Timeline
  • 10. IoT Trends 1. Rise in Number and Types of IoT Devices IoT connected devices worldwide from 2015 to 2025(in billions) Connected devices (in billions) It is not just the number of connected devices which is on a rise but also the types. Voice Assistants GPS Trackers Smart Bands or Fitness Bands Smart Locks Smart Smoke Alarms Smoke Detectors Child Monitor Doorbell Cameras Fitness Devices Wearables IoT based Security Systems Security Cameras Different types of IoT device 2. Consumer IoT (CIoT) and Industrial IoT (IIoT) Consumer IoT aims to improve life quality and well-being of individual users by automating and simplifying day-to-day tasks. Devices often have a short lifespan and are quickly replaced by new versions Industrial IoT targets complex industrial processes and systems with distinct network requirements. It focuses on optimizing operational efficiency, safety and sustainability through remote monitoring and control capabilities Consumer IoT VS Commercial IoT Industrial IoT Commercial IoT applications are deployed in environments like office buildings, retail, hotels, hospitality, healthcare facilities and entertainment venues. Use cases: Asset Tracking, Smart Office and Buildings, Connected Lighting, Sensing & Monitoring, and Location Services Industry 4.0: Automation of manufacturing and industrial practices, using modern smart technology. Large-scale machine-to-machine communication (M2M) and the internet of things (IoT) are integrated for increased automation, improved communication and self- monitoring, and production of smart machines that can analyze and diagnose issues without the need for human intervention. VS Consumer IoT Industrial IoT VS Number of Connected Devices Consumer IoT Industrial IoT VS Key Verticals Viable Wireless Option Major Application
  • 11. Industrial IoT Consumer IoT 3. Cloud & Edge Computing Physical Things, Sensors, Devices, Actuators Physical Environment Pre- Processing, Storage, Data Analytics, API Cloud Most of the data is transferred to the Cloud  Requires more Bandwidth  Results in High Latency Bandwidth – It is the measure of amount of data transferred between two nodes per unit time. Measured in Bits/Sec Latency – It is the measure of delay in transmitting the data between two nodes per unit time. Physical Things, Sensors, Devices, Actuators Physical Environment Advanced Data Analytics, API Cloud Pre-Processing, Storage, Basic Analytics Edge Node Edge Computing Computation takes places nearer to the devices. Less Bandwidth, Low Latency 3. Cloud & Edge Computing  IoT devices have been relying on the cloud for storing the data  Instead of sending the data from IoT devices to cloud, the data can be transferred to local devices which are closer to the edge of the network.  The local storage helps in sorting, filtering, and calculating the data and sending a part or the whole data to the cloud, thus reducing the traffic to network. Edge computing offers a series of benefits  Better management of large amount of data which every device sends  Lowered dependency on cloud helping apps perform faster with reduced latency  IoT based mobile apps consumes less bandwidth 4. A greater focus on IoT security With an IoT adoption being on a rise, more and more devices are getting connected to the internet. As the network is expanding, the volume of data is also expanding and there is more information which is at risk. 5. Incorporation of Artificial Intelligence, Big Data, and Machine Learning Using the data analytics tools in the connected devices, businesses will be able to decisions around both predictive and preventive measures. If more amount of data is given as a training data set to ML, it will be easy to predict the things. Big Data Structured and unstructured data Artificial Intelligence Machine Learning Deep Neural N/w Artificial Intelligence: Machines with seemingly human capabilities Machine Learning: Computational and statistical tools
  • 12. Vibration Level Indicates the average vibration data points of the pumps that failed and those that did not fail within a period of time. Its clear from the indication that, vibration level alone does not predict device failure Vibration level Did not Fail Failed Example - Prediction of Failure of Pump Vibration vs Temperature  While adding temperature dimension with the vibration, it is clear that high pump vibration level coupled with high temperature is an indicator of pump failure.  Similarly, low pump vibration level coupled with low temperature is an indicator of pump not failed  However, it is less obvious to identify the data points in the area corresponding to low temperature and high vibration level subjects to pump fail or not through only vibration and temperature Vibration level Temperature Failed Did not Fail Decision Tree With vibration, time since last service and temperature dimension, a decision tree can be created to predict when a pump will fail + value too high - Value within normal value Vibration, Temperature and Time since last serviced 6. Blockchain for IoT security and BaaS will become mainstream Blockchain: It is a distributed ledger that is completely open to anyone. Once the data has been recorded inside a blockchain, it becomes very difficult to change it. Hash: ABCD Previous Hash: - Hash: EFGH Previous Hash: ABCD Hash: WXYZ Previous Hash: EFGH Genesis Block 1 2 3 Cloud Computing
  • 13. Hash: ABCD Previous Hash: - Hash: EFGH Previous Hash: ABCD Hash: WXYZ Previous Hash: EFGH 1 2 3 LMNO Proof-of-work : It is the mechanism that slows down the creation of new blocks. It’s makes it very hard to tamper with the blocks, Because if you tamper one block, you’ll need to recalculate the proof – of – work for all the following blocks. So the security of a blockchain comes from its creative use of hashing and the proof – of – work mechanism. Distributed service: Instead of using a central entity to mange the chain, blockchains use a peer-to-peer network and anyone is allowed to join.  IoT depends on centralized communication models to interact with the system.  It can also be said that all the devices in IoT setup are identified, connected and validated via centralized cloud servers.  However, centralized clouds and networking equipment used in the existing IoT solutions have high maintenance and infrastructure cost.  As IoT systems are connected through these services, scalability can become a significant issue.  As the number of IoT devices increases, the number of interactions between the server and devices increases the cost.  That is the reason why current systems cannot support large IoT networks.  Also, cloud servers are vulnerable to a single point of failure which means the failure at one point can affect the entire ecosystem.  Therefore, using a peer-to-peer model instead of a client/server model can be the right solution that IoT industry needs today.  With decentralization in place, storage needs and computation can be distributed across millions of IoT devices and central failure cannot have an impact on the whole network.  Use of blockchain in IoT can help the IoT devices to scale up and improve the security 7. IoT based Smart Projects Improve the quality of living and sustainability 8. Location tracking and wireless sensing Efficient tracking of location and wireless sensing 9. Better Workforce Management  IoT devices can be used to monitor personnel and schedule tasks. All the data from all these systems can readily be used to populate the solutions of performance management.  IoT devices can also be widely used to monitor the safety of the employee. Example: Smart cities
  • 14. 10. IoT for Territory Monitoring Smart tools do a loT in agriculture. They can measure soil moisture and control water supplies, or monitor the state of ripe fruits and vegetables and inform the farmer of the time to harvest. These smart methods can reduce costs, improve forecasting, planning, and harvesting. Another use case is a forest fire. Devices like infrared cameras and air filters can save our forests in the summer. It is already used in countries where summer forest fires are well known. 11. Voice will become the new mode of communication Voice based-search, instructions or commands, and dominate the IoT markets. More and more languages are being incorporated and their databases are being prepared to allow even a child or uneducated person to use the IoT system. Impact of IoT on Businesses  Proven safe operating model  Hierarchical organization structure  Established market place  Compete on price and service  Consolidated and repeatable business rules  Annual business planning Traditional Business - Rigid & Rule Driven IoT provides companies a digital interface to the physical world  Digital businesses are Agile & Data Driven Products Suppliers Logistics Operations Marketing Sales & Distribution Procurem ent Customer Services Innovation Process Monitoring Access from anywhere Accurate Prediction Cost Savings(T (Time, resource, money) Information Management Preventive Measures Control & Automati on Artificial Intelligence Cloud Computing Mobility Open API & Micro Services Big Data Faster Revenue Growth Social Collabora tion Impact of IoT on business Traditional Business IoT Impacts of IoT on Business Channel Integration Improved Business Model  Access from Anywhere The definition of IoT says that the devices are connected over a network, virtually. An example of this is August smart lock where the IoT user has access to the smart lock via the technology and this makes it easy for the user. Any person with access to this technology, who wishes to manage this lock sitting miles away can easily do so by connecting the personal electronic device (be it a mobile phone or any electronic device) to the smart lock. This lets us access a device remotely also.  Process Monitoring Another use of IoT, which is highly beneficial for businesses in manufacturing and production of goods, is the monitoring of processes. Manufacturing processes that follow assembly lines are currently also highly monitored. But with the addition of IoT, these processes can be monitored in greater detail. A lot of data that is recorded can be analyzed to improve processes, make them more efficient and also help cut down costs.
  • 15.  Accurate Prediction As an environmental sensor, IoT helps predict natural disasters. This technology is used in sensors, for a real-time prediction of natural disasters. Not only in businesses, but also for the world as a whole, predicting natural disaster and analyzing what all can occur in the near future is possible with the help of technological advancement, one of them being the IOT. A real-time example of this is smart sensors used in Dublin, Ireland. They are already creating a real-time picture of what is happening and can help predict any natural disasters, which will be of great help to their city in the time of crisis.  Transfer of Data In IoT, where devices are connected virtually, transfer of data packets is an easy task. This is beneficial for both businesses and people living in this society. With the IoT, various devices connected to the internet can collect, receive, communicate with each other via IP. To increase the efficiency and to simplify the processes, IoT can be of great help for the businesses.  Cost Savings (time, resources, money) The connectivity and fast communication among devices reduces response time and human labor, thus increase productivity and efficiency. Many of the appliances that make our homes “smart” save electricity, resources and money. Nowadays a lot of investments are made for predictive maintenance that will help to predict and avoid failures in IoT ecosystem  Control and Automation All Internet of Things consumers (users and businesses) through applications installed on their mobile devices such as phones, tablets, etc. can remotely control smart devices, adjust different metrics, and choose specific options. In many cases, systems send automatic messages and warnings or take actions. For example, the fridge can order food from the supermarket if some of the products are down, the car can send a request for the spoiled part that needs to be replaced, and the user can adjust the temperature at their homes while they are away.  More Data Gathering  Improved Business Model Problem Traditional Solution IoT Solution IoT Business Solution Luggage lost in air transit The airline would try to find the lost luggage using manual processes which are costly, timing consuming and generates customer dissatisfaction A tracking device is placed inside the luggage and transmits its location using internet. The user can track the luggage using a smartphone app The airline charges a fee to its customer for using the luggage tracking service, or offers the service for no charge to premium customers. A share of the revenue generated is paid to the IoT company, which maintains the IoT solution. Impact of IoT on Society  Cost Saving Smart homes and offices can save energy costs.  Security Offers better security by constant surveillance  Quick transfer of data Takes active action, such as alerting the local police body in case of a security breach  Improved health care Remote monitoring of patients and providing medication for them  Automation Reminders of daily tasks such as payment of utility bills Smart lighting of streets and auto-sensing as well as control of traffic signal  Remote Monitoring of assembly line and production system to maximize efficiency, safety, and reliability in a manufacturing firm  Smart automobiles that can provide assistance if required, assist in controlling vehicle speed on the basis of traffic and environmental conditions
  • 16. IoT Solution Architecture - Stages IoT Solution Architecture - Stages No matter the use case and number of layers, the key building blocks of any IoT structure are always the same, namely:  Smart things  Networks and gateways enabling low-power devices (which is often the case in IoT) to enter the big Internet;  Middleware or IoT platforms providing data storage spaces and advanced computing engines along with analytical capabilities  Applications, allowing end users to benefit from IoT and manipulate the physical world. These elements make up the backbone of any IoT system upon which effective, multi-layered architecture can be developed. Most commonly, these layers are:  Perception layer - hosting smart things  Connectivity or transport layer - transferring data from the physical layer to the cloud and vice versa via networks and gateways;  Processing layer- employing IoT platforms to accumulate and manage all data streams; and  Application layer - delivering solutions like analytics, reporting, and device control to end users. Perception layer: Converting analog signals into digital data and vice versa The initial stage of any IoT system embraces a wide range of “things” or endpoint devices that act as a bridge between the real and digital worlds. They vary in form and size, from tiny silicon chips to large vehicles. By their functions, IoT things can be divided into the following large groups.  Sensors such as probes, gauges, meters, and others. They collect physical parameters like temperature or humidity, turn them into electrical signals, and send them to the IoT system. IoT sensors are typically small and consume little power.  Actuators, translating electrical signals from the IoT system into physical actions. Actuators are used in motor controllers, lasers, robotic arms.  Machines and devices connected to sensors and actuators or having them as integral parts. The edge-side layer includes just a few “things” physically placed in one room or myriads of sensors and devices distributed across the world Connectivity layer: Enabling data transmission Server Side Cloud NFC Bluetooth Low Energy LPWAN Zigbee The second level is in charge of all communications across devices, networks, and cloud services that make up the IoT infrastructure. The connectivity between the physical layer and the cloud is achieved directly using TCP or UDP/IP stack or via gateways — hardware or software modules performing translation between different protocols as well as encryption and decryption of IoT data. Ethernet connects stationary or fixed IoT devices like security and video cameras, permanently installed industrial equipment, and gaming consoles. WiFi, the most popular technology of wireless networking, is a great fit for data-intensive IoT solutions that are easy to recharge and operate within a small area. A good example of use is smart home devices connected to the electrical grid. NFC (Near Field Communication) enables simple and safe data sharing between two devices over a distance of 4 inches (10 cm) or less. Bluetooth is widely used by wearables for short-range communications. To meet the needs of low-power IoT devices, the Bluetooth Low-Energy (BLE) standard was designed. It transfers only small portions of data and doesn’t work for large files. LPWAN (Low-power Wide-area Network) was created specifically for IoT devices. It provides long-range wireless connectivity on low power consumption with a battery life of 10+ years. Sending data periodically in small portions, the technology meets the requirements of smart cities, smart buildings, and smart agriculture (field monitoring). ZigBee is a low-power wireless network for carrying small data packages over short distances. The outstanding thing about ZigBee is that it can handle up to 65,000 nodes. Created specifically for home automation, it also works for low-power devices in industrial, scientific, and medical sites. Cellular networks offer reliable data transfer and nearly global coverage. There are two cellular standards developed specifically for IoT things. LTE-M (Long Term Evolution for Machines) enables devices to communicate directly with the cloud and exchange high volumes of data. NB-IoT or Narrowband IoT uses low-frequency channels to send small data packages. Network Connectivity Pros Cons Popular use cases Ethernet Wired, Short-range High speed Security Range limited to wire length Limited Mobility Stationary IoT-Video Camera, game consoles, fixed equipment WiFi Wireless, Short- range High Speed Great Compatibility Smart home, devices that can be easily recharged NFC Wireless, ultra-short- range Reliability Low power Consumption Limited range Lack of availability Payment systems, Smart Home Bluetooth Low- Energy Wireless, Short- range High Speed Low power Consumption Limited range Low bandwidth Smart home devices, wearables, beacons LPWAN Wireless, long-range Long range Low power Consumption Low bandwidth High Latency Smart home, smart city, smart agriculture(Field monitoring) Zigbee Wireless, Short- range Low power Consumption Scalability Limited range Compliance Issues Home automation, healthcare and industrial sites Cellular Networks Wireless, long-range Nearly global coverage High Speed Reliability High Cost High power Consumption Drones sending video and images
  • 17. Once parts of the IoT solution are networked, they still need messaging protocols to share data across devices and with the cloud. The most popular protocols used in the IoT ecosystems are: AMQP (the Advanced Message Queuing Protocol) aiming at peer-to-peer data exchange between servers; CoAP (the Constrained Application Protocol), a software protocol designed for constrained devices — end nodes limited in memory and power (for example, wireless sensors). It feels much like HTTP but uses fewer resources; MQTT (the Message Queue Telemetry Transport), a lightweight messaging protocol built on top of TCP/IP stack for centralized data collection from low-powered devices. Edge or fog computing layer: reducing system latency This level is essential for enabling IoT systems to meet the speed, security, and scale requirements of the 5th generation mobile network or 5G. The new wireless standard promises faster speeds, lower latency, and the ability to handle many more connected devices, than the current 4G standard. The idea behind edge or fog computing is to process and store information as early and as close to its sources as possible. This approach allows for analyzing and transforming high volumes of real-time data locally, at the edge of the networks. Thus, you save the time and other resources that otherwise would be needed to send all data to cloud services. The result is reduced system latency that leads to real-time responses and enhanced performance. Edge computing occurs on gateways, local servers, or other edge nodes scattered across the network. At this level, data can be:  evaluated to determine if it needs further processing at higher levels,  formatted for further processing  decoded  filtered and  redirected to an additional destination To sum up, the first three layers see data in motion, as it is constantly moving and altering. Only on hitting the next level, is data finally at rest and available for use by consumer applications. Processing layer: making raw data useful The processing layer accumulates, stores, and processes data that comes from the previous layer. All these tasks are commonly handled via IoT platforms and include two major stages. Data accumulation stage The real-time data is captured via an API and put at rest to meet the requirements of non-real-time applications. The data accumulation component stage works as a transit hub between event-based data generation and query-based data consumption. Among other things, the stage defines whether data is relevant to the business requirements and where it should be placed. It saves data to a wide range of storage solutions, from data lakes capable of holding unstructured data like images and video streams to event stores and telemetry databases. The total goal is to sort out a large amount of diverse data and store it in the most efficient way. Data abstraction stage Here, data preparation is finalized so that consumer applications can use it to generate insights. The entire process involves the following steps: combining data from different sources, both IoT and non-IoT, including ERM, ERP, and CRM systems; reconciling multiple data formats; and aggregating data in one place or making it accessible regardless of location through data virtualization. Similarly, data collected at the application layer is reformatted here for sending to the physical level so that devices can “understand” it. Together, the data accumulation and abstraction stages veil details of the hardware, enhancing the interoperability of smart devices. What’s more, they let software developers focus on solving particular business tasks — rather than on delving into the specifications of devices from different vendors. Application layer: addressing business requirements At this layer, information is analyzed by software to give answers to key business questions. There are hundreds of IoT applications that vary in complexity and function, using different technology stacks and operating systems. Some examples are: device monitoring and control software, mobile apps for simple interactions, business intelligence services, and analytic solutions using machine learning. Currently, applications can be built right on top of IoT platforms that offer software development infrastructure with ready-to-use instruments for data mining, advanced analytics, and data visualization. Otherwise, IoT applications use APIs to integrate with middleware. Business layer: implementing data-driven solutions The information generated at the previous layers brings value if only it results in problem-solving solution and achieving business goals. New data must initiate collaboration between stakeholders who in turn introduce new processes to enhance productivity. The decision-making usually involves more than one person working with more than one software solution. For this reason, the business layer is defined as a separate stage, higher than a single application layer. Security layer: preventing data breaches It goes without saying that there should be a security layer covering all the above-mentioned layers. IoT security is a broad topic worthy of a separate article. Here we’ll only point out the basic features of the safe architecture across different levels. Device security - Modern manufacturers of IoT devices typically integrate security features both in the hardware and firmware installed on it. This includes embedded TPM (Trusted Platform Module) chips with cryptographic keys for authentication and protection of endpoint devices; a secure boot process that prevents unauthorized code from running on a powered-up device; updating security patches on a regular basis; and physical protection like metal shields to block physical access to the device. Connection security – Whether data is being sent over devices, networks, or applications, it should be encrypted. Otherwise, sensitive information can be read by anybody who intercepts information in transit. IoT-centric messaging protocols like MQTT, AMQP, and DDS may use standard Transport Layer Security (TSL) cryptographic protocol to ensure end-to-end data protection. Cloud security - Data at rest stored in the cloud must be encrypted as well to mitigate risks of exposing sensitive information to intruders. Cloud security also involves authentication and authorization mechanisms to limit access to the IoT applications. Another important security method is device identity management to verify the device’s credibility before allowing it to connect to the cloud.
  • 18. How IoT Works Mobile App Sensor i. Sensors/Devices First, sensors or devices help in collecting very minute data from the surrounding environment. All of this collected data can have various degrees of complexities ranging from a simple temperature monitoring sensor or a complex full video feed. ii. Connectivity Next, that collected data is sent to a cloud infrastructure but it needs a medium for transport. The sensors can be connected to the cloud through various mediums of communication and transports such as cellular networks, satellite networks, Wi-Fi, Bluetooth, wide-area networks (WAN), low power wide area network and many more. iii. Data Processing Once the data is collected and it gets to the cloud, the software performs processing on the acquired data. This can range from something very simple, such as checking that the temperature reading on devices such as AC or heaters is within an acceptable range. It can sometimes also be very complex, such as identifying objects (such as intruders in your house) using computer vision on video. iv. User Interface Next, the information made available to the end-user in some way. This can achieve by triggering alarms on their phones or notifying through texts or emails. Also, a user sometimes might also have an interface through which they can actively check in on their IOT system. For example, a user has a camera installed in his house, he might want to check the video recordings and all the feeds through a web server. How IoT Works Principal Technologies that Drive IoT System  Wireless Sensor Networks  Embedded Systems  Communication Protocols  Cloud Computing  Big Data Analytics A Wireless Sensor Network (WSN) It is a network formed by a large number of sensor nodes where each node is equipped with a sensor to detect physical phenomenon such as light, heat, pressure, etc. With the rapid technological development of sensors, WSNs will become the key technology for IoT. A sensor has the ability to capture anything from location to the device orientation. Collectively, these sensors produce a huge amount of data, both in unstructured form (such as picture or videos) as well as structured (such as GPS or acceleration data). These “devices” are perpetually connected to the Internet over WiFi, 3G or 4G. Embedded Systems Embedded hardware devices, micro controllers etc, are the ones that process the data. The data from the sensors are not directly usable and a process for using them is implemented by the embedded system. Their main function is to process the data from the sensors according to an algorithm to extract the valuable information like status, parameter values, alerts etc., and control actuators in some cases in the system
  • 19. Cloud computing Cloud computing is the on-demand delivery of compute power, database, storage, applications, and other IT resources via the internet with pay-as-you-go pricing. These resources run on server computers that are located in large data centers in different locations around the world. When you use a cloud service provider like AWS, that service provider owns the computers that you are using. These resources can be used together like building blocks to build solutions that help meet business goals and satisfy technology requirements. Infrastructure as a service (IaaS): Services in this category eliminate the need for you to procure and maintain the hardware related to networking, storage, servers, etc. Services in this category are the basic building blocks for cloud IT and typically provide you with access to networking features, computers (virtual or on dedicated hardware), and data storage space. Platform as a service (PaaS): Services in this category reduce the need for you to manage the underlying infrastructure (usually hardware and operating systems) and enable you to focus on the deployment and management of your applications. Software as a service (SaaS): Services in this category provide you with a completed product that the service provider runs and manages. In most cases, software as a service refers to end-user applications. With a SaaS offering, you do not have to think about how the service is maintained or how the underlying infrastructure is managed. You need to think only about how you plan to use that particular piece of software. A common example of a SaaS application is web-based email On-premises Big Data analytics Big data analytics is the process of examining large and varied data sets i.e., big data to uncover hidden patterns, unknown correlations, market trends, customer preferences and other useful information that can help organizations make more-informed business decisions. Big data analysis and cloud computing go hand in hand, particularly in IoT applications. Analysis of the data coming from a device or other sources can be used to send information to a remote/local user regarding the device operation, or this analysis can be translated into commands sent to the device to influence its operation. For example, the connected lamp can be turned on from the Cloud when analysis shows that it is dark in the lamp's location and a remote lock shows that someone has entered the house. Communication Protocols OSI MODEL
  • 20. Bits, Frames, Packet and Segment MAC, IP and Port Address MAC: Physical Address of the device(system/Laptop). Does not change. Unique for the given device IP: Address provided by the internet service providers when the device is connected to internet. Address changes w,r.t to the service providers. Port Address: Final destination address. Indicates which process to be carried out. Example: 1880 is for Node-RED Physical Address: F1-E3-C8-77-40-12 DHCP Enabled: Yes IPv4 Address: 172.15.221.207 IPv4 Subnet Mask: 255.255.248.0 IPv4 Default Gateway: 172.15.215.1 Iv4 DHCP Server: 172.15.215.1 IPv4 DNS Server: 172.15.215.1 OSI MODEL OSI Model Function IoT Host Layers 7 Application Human-computer interaction layer, where applications can access the network services Application 6 Presentation Ensure that data is in a usable format where data encryption occurs 5 Session Maintain connections and is responsible for controlling ports and sessions 4 Transport Transmits data using transmission protocols including TCP and UDP Transport Media Layers 3 Network Decides which physical path the data will take Network/Internet 2 Data Link Defines the format of data on the network Link 1 Physical Transmits raw bit stream over the physical medium Communication Protocols IoT connects various devices through Internet and devices talk to each other through a communication channel. The defined communication channel is called as Communication Protocol 802.3 - Ethernet  Coaxial cables, twisted pair wire or optical fibre as a medium  10Mbps to 40Gbps+ data rate 802.11 – Wi-Fi  Wireless LAN; 802.11 b/g/n  2.4GHz / 5GHz band  1 Mbps to up to 6.75 Gbps data rate 802.16 – WiMax  Collection of wireless broadband standards  1.5Mbps to 1Gbps data rate 802.15.4 – LR-WPAN IEEE 802.15.4 is a standard which specifies the physical layer and media access control for Low-rate wireless personal area networks (LR-WPANs)  Example: LoRa 40bps to 250Kbps data rate Provides low-cost, low-speed communication for low-power devices 2G/3G/4G - Mobile Communication  Date rates - 9.6 Kbps to 100 Mbps  2G - GSM and CDMA  3G - UMTS and CDMA2000  4G - LTE Link Layer Protocols Wireless IoT Connectivity Technologies have a range from a few centimeters to many kilometers: Wireless Personal and Local Area Network technologies (WPANLAN) such as Bluetooth, ZigBee, 6LowPAN, RFID and Wi-Fi are ideal for short to medium range communication like home or indoor applications. Wireless Wide Area Network technologies (WWAN) are divided into two types: Cellular (3G/4G and 5G) and Low-Power Wide Area Networks (LPWANs), themselves split into licensed (LTE-M, NB-IoT EC-GSM) or unlicensed long-range technologies (LPWA LoRa, Sigfox and other). They are best suited for long-range communication such as smart meters, animal or assets tracking.
  • 21. Wireless Personal Area Network (WPAN) WPAN does not exceed a maximum range of 100m. Devices include Bluetooth-connected headsets for example, but also Zigbee and Z- wave connected devices mostly used in home applications such as building control systems, smart alarms, or smart thermostats also Industry 4.0 applications. ZigBee and 6LoWPAN protocols are designed for low power consumption applications such as low power wireless sensor networks. However, the transmission time for those protocols is longer than the low power Wi-Fi, due to its low data rate (250 Kb/s). The average consumption profile is therefore considered as low to medium depending on the application and the module used. Wireless Local Area Networks (WLAN) WLAN, a network that enables connectivity of up to 1 kilometer. In this category, Wi-Fi is the most common standard. The technology is supporting devices such as home assistants, smart TVs, and smart speakers and is sometimes used in industrial settings like factories. Wi-Fi was historically designed for laptops or PCs, where the power requirements were not so important. It was deemed too power hungry for battery-powered smart objects which led manufacturers to develop new standards for the Internet of Things. New generation, low power Wi-Fi operates at much higher data rates ranging from 1 Mb/s to 54 Mb/s. This allows Wi-Fi enabled sensors to spend very little time with actual transmission or reception. The chips ‘sleep mode’ power consumption was also greatly reduced (convenient for IoT applications since these devices are mostly in the sleep state) thus reducing the modules overall power consumption. Low Power Wide Area Networks (LPWAN) IoT applications’ requirements have driven the emergence of LPWAN. The technology offers low power, long range (up to 10–50 km in rural zones and 1–10 km in urban zones) together with low-cost specifications. Four main competing standards are currently sharing the market: Sigfox, LoRaWAN, LTE-M and NB-IoT. They are presently being rolled-out worldwide with more than 25 million devices already connected, the majority of which are smart meters. These protocols may be based on cellular technology, such as LTE-M and NB-IoT or radio-based (LoRa, Sigfox),they can be licensed (NB-IoT, LTE-M) or unlicensed (LoRa, Sigfox) which also differentiates their availability and prices. In long range connectivity, LoRaWAN requires more transmission time compared to small range connectivity protocols because of its low rate data rate. However, the optimizations brought to power savings mode, small data maximization, and flexible sleep all reduce the power consumption of devices which makes LoRaWAN a good candidate for numerous IoT applications. Cellular technology (2G, 3G, 4G and 5G) Before the advent of LPWAN, cellular technology (2G, 3G, and 4G) was the only option for long-range remote device connectivity (up to 100km). The new, much talked about, 5G technology that is currently being deployed, promises a massive bandwidth and extremely low latency which could favor its adoption. Cellular connectivity has historically been focused on range and bandwidth at the expense of power consumption. The high amount of data produced by devices was hard to process quickly and the amount of time between when data is sent from a connected device to when it returns to the same device—the latency—was high. However, new cellular technologies like 5G transmit data about 10 times faster than 4G, promising ultra-low latency and lower power consumption. Wireless Neighborhood Area Networks (WNAN) WNAN lies between WLAN and long-range technologies. A medium range technology that covers areas between 5-10 km with its typical proponents, Mesh networks (Wi-Sun (6LoWPAN), JupiterMesh or ZigBee-NAN). The technology can be used as an alternative for LPWA/Cellular (e.g, in Utilities Field Area Networks) or as a complimentary element (e.g., for remote metering where other protocols do not have sufficient range to be implemented) such as gas metering applications). WNAN networks are generally deemed as high-energy consumers but mesh technologies such as Wi-SUN can provide high data rates and low latency. Additionally, Wi-SUN modules use less power for listening which enable customers to configure devices to listen frequently and still maintain a long-life. Cellular There are a lot of IoT applications that may call for operation over a longer remoteness. These IoT applications can take the help of Cellular communication capabilities like GSM/3G/4G. Cellular is one of the IoT Communication Protocols which can send or transfer a high amount of data. The fee for sending a high quantity of data will be high too. Cellular does need not only high cost but also to need high power consumption for several applications. This Internet of Things Protocol is amazing for sensor-based data projects of low- bandwidth. This is because they can send a very insignificant amount of data or information on the Internet.
  • 22. RFID The Radio Frequency Identification uses the electromagnetic fields to identify objects. NFC The NFC or Near Field Communication allows the clients to connect to the electronic devices, to use digital contents and to do the contactless payment transaction. The essential work of NFC is to expand the “contactless” card technology. It works within 4cm (between devices) by enabling the devices for sharing information. SigFox Sigfox is known as one of the best alternative technologies which bear the attributes of both Cellular and WiFi. As Sigfox IoT Protocol was developed and designed for the M2M applications, it can only send data of low-level. By taking the help of Ultra Narrow Band(UNB), Sigfox can hold speeds of 10 to 1000 bits per second for transferring low- data. It only consumes 50 microwatts of the power. The frequency of the IoT Connectivity Protocols Sigfox is 900MHz, and it has Could-access. In rural environments, Sigfox IoT Protocol covers a range of 30 km to 50 km. In the urban areas, the range of this protocol is 3-10 km. Internet Protocol (IPv4 and IPv6) 6LowPAN Network Layer Protocols The Internet Protocol is the protocol that defines and enables internetworking at the internet layer of the Internet Protocol Suite. It uses a logical addressing system and performs routing, which is the forwarding of packets from a source host to the next router that is one hop closer to the intended destination host on another network. IPv4 IPv6 Address Size 32-bit 128-bit Address format Dot Decimal Notation 12.244.233.165 Hexadecimal Notation 2001:0db8:0000:0000:0000:ff00:0042:7879 Number of addresses 4.29×109 3.4×1038 Enable IPv6 standards to be used in low-power wireless networks, specifically with IEEE 802.15.4 6LowPAN protocol is an adaptation layer allowing to transport IPv6 packets over 802.15.4 links Transmission Control Protocol (TCP) User Datagram Protocol (UDP) Transport Layer Protocols TCP UDP A connection-oriented protocol A connectionless protocol Uses specific handshake protocols (generally, SYN, SYN-ACK, ACK) No handshake Guarantees the delivery of data to the destination router, thus making it reliable. Doesn’t guarantee the delivery of data to the destination Packet sequence is verified Data is processed in order of arrival Slower speed of transmission due to reordering and retransmission Faster because integrity is checked at the arrival time using checksum Performs error checking and attempts error recovery. Performs basic error checking and discards erroneous packets without attempting error recovery. TCP is heavy. It needs three packets to set up a socket connection before data can be sent. UDP is lightweight. There is no tracking of connections, ordering of messages, etc. Applications: File Transfer, Web Browsing, Email Live Streaming, online games, VoIP Request Data Response
  • 23. UDP  UDP is a connectionless protocol which means the sender just transmits the data without waiting for the connection with the receiver. It is an unreliable protocol when compared with TCP.  There is no error checking mechanism or correcting mechanism involved in data transmission which results in using less bandwidth. UDP protocol just sends the packets (or datagram). There is no acknowledgement guarantee of packet received by the other end.  It allows for less data overhead and delays.  To achieve higher performance, the protocol allows individual packets to be dropped (with no retries) and UDP packets to be received in a different order than they were sent, as dictated by the application. Features of UDP  UDP can be used when acknowledgement of data does not hold any significance.  It is great for data flowing in one direction.  It is connectionless protocol.  It does not provide any congestion control mechanism.  It is a suitable protocol for streaming applications such as video conference applications, computer games etc. UDP Datagrams UDP traffic works through packets called datagram, with every datagram consisting of a single message unit. The header details are stored in the first eight bytes, but the rest is what holds onto the actual message. The UDP datagram header can be divided into four parts: 1) Source Port – 2) Destination Port – 3) Length – 4) Checksum –In UDP, checksum is optional, as opposed to TCP where checksum is mandatory. Advantages of UDP over TCP/IP Stack It is better than TCP for applications that require constant data flow, bulk data and which require more swiftness than reliability. For multicast and broadcast purposes, UDP is best suited because it supports point to multipoint transmission method. The sender does not need to keep track of retransmission of data for multiple receivers in contrast with the TCP/IP where sender needs to take care of each packet. Both TCP and UDP run on the top of Internet Protocol (IP) that is why they are referred as TCP/IP and UDP/IP. Multicast Unicast Broadcast Hyper Text Transfer Protocol (HTTP) Application Layer Protocols Message Queuing Telemetry Transport (MQTT) HTTP Request HTTP Response (Web Page, Image, PDF) MQTT MQTT HTTP It works on publish/subscribe model It works on request/response model It runs over Transmission Control Protocol It runs over Transmission Control Protocol It has less complexity It is more complex This protocol’s design is Data centric This protocol’s design is Document centric The message size generated is less as it uses binary format The message size generated is more as it uses ASCII format It provides data security with SSL/TLS It does not provide security but Https is built for that
  • 24.  CoAP is a specialized Internet Application Protocol for constrained devices  It is intended for use in resource-constrained internet devices, such as wireless sensor network nodes  It enables those constrained devices (nodes) to communicate with the wider Internet using similar protocols.  CoAP is designed for use between devices on the same constrained network (e.g., low-power, lossy networks), between devices and general nodes on the Internet, and between devices on different constrained networks both joined by an internet  CoAP is designed to easily translate to HTTP for simplified integration with the web, while also meeting specialized requirements such as multicast support, very low overhead, and simplicity. Multicast, low overhead, and simplicity are extremely important for Internet of Things (IoT) and Machine-to-Machine (M2M) devices.  CoAP can run on most devices that support UDP  It uses ACK messages so that it will become reliable like TCP. It has low latency and consumes lesser power compare to HTTP Constrained Application Protocol (CoAP) Reliable Transmission Unreliable Transmission Confirmable Request & Response Non-Confirmable Request & Response Extensible Messaging and Presence Protocol (XMPP) Advanced Message Queuing Protocol (AMQP) Designed for instant messaging (IM), presence information, and contact list maintenance. Based on XML (Extensible Markup Language), it enables the near- real-time exchange of structured data between two or more network entities. The defining features of AMQP are message orientation, queuing, routing (including point-to-point and publish-and- subscribe)
  • 25. Features CoAP HTTP Protocol It uses UDP It uses TCP Network layer It uses IPv6 along with 6LoWPAN It uses IP layer Multicast support It supports It does not support Architecture model CoAP uses both client-Server & Publish-Subscribe models HTTP uses client and server architecture Synchronous communication CoAP does not need this HTTP needs this Overhead Less overhead and it is simple More overhead compare to CoAP and it is complex Application Designed for resource constrained networking devices such as WSN/IoT/M2M Designed for internet devices where there is no issue of any resources MQTT CoAP XMPP AMQP TCP UDP TCP TCP Publish-Subscribe Request-Response Publish-Subscribe Request-Response Publish-Subscribe Request-Response Publish-Subscribe Power Consumption - Less Power Consumption - Medium Power Consumption -High Power Consumption - Medium A parking lot where there are a number of parking sensors installed to identify the number and location of empty or vacant parking spots. Constrained devices A smart thermostat that can be accessed from a smartphone via a web server AMQP is mostly used in business messaging. It usually defines devices like mobile handsets, communicating with back-office data centers IoT Communication Protocol Stack IoT Protocols Stacks Communication protocols IoT Layered Architecture (3 Layer) Application HTTP CoAP MQTT AMQP Application Layer Transport TCP UDP TCP TCP Network Layer Network IP IP IP IP Link Ethernet Link Constrained Link WiFi Hart LR-WPAN Perception Layer Existing IoT Use Cases Financial Services Government and Non-profit Utilities and Resources Banking Travel and Transportation Healthcare and Life Science Manufacturing Retail and CPG Insurance Telecom, Media and Entertainment
  • 26. Financial Services  Fraud detection  Protect trading data  Smart algorithm trading Government and Non-profit  Public Safety  National Defence  Smart Cities  Asset Tracking  Flood monitoring  Infrastructure maintenance  Military personnel safety Utilities and Resources  Energy Conservation  Water management  Smart metering  Smart Lighting  Power grid optimization  Waste management  Pipeline monitoring Travel and Transportation  Delivery status monitoring  Fleet availability  Fuel indicators  Auto toll debits  Vehicle safety  Route optimization  Vehicle to vehicle communication Healthcare and Life Science  Remote Patient monitoring  Hospital Asset management  Drug management  Workflow optimization  Virtual care Manufacturing  Predictive maintenance  Asset Tracking  Supply Chain Management  Asset Tracking  Flood monitoring  Infrastructure maintenance  Military personnel safety Retail  Theft Prevention  Indoor Navigation  Inventory monitoring  Product Recommendation  Power grid optimization  Smart Ordering & Payment  Vending Machines Insurance  Claim management Telecom, Media and Entertainment  Smart TV Natural Resources  Agriculture  Mining  Oil and Gas IoT in Transportation Smart Parking System Every wireless node on a IEEE 802.15.4e mesh network has routing capabilities, so data can travel to the network gateway via any combination of nodes. If one path is blocked the network will simply find another. This means that network gateway doesn’t need to be within range of every node on the network, making the network incredibly scalable. The most useful network gateways can connect to your computer, or to your cloud applications on the Internet, via both wired and cellular data connections. That means you can put your gateways just about anywhere. Parking system network gateways are often placed at locations like entrances and exits. There they can connect to the wireless mesh network as well as nearby wired devices like security cameras, card readers and digital signage. The gateway then connects the entire system to your controlling software, whether your software is on your computer or up in the cloud.
  • 27. Smart Home System IoT in an Integrated Smart Energy System Energy Democratization Virtual Power Plant Smart Mobility Energy Efficiency Smart Building Demand & Response Energy Management Distributed Energy System Optimized Energy Grid Preventive & Fault Maintenance Digitalized Energy Generation Utilities & Generation Transmission & Distribution Demand Side Services Energy Supply Regulation and Market Regulation & market Application Sector Description Benefits Energy democratization Regulation Providing access to the grid for many small end users for peer to peer electricity trade and choosing the supplier freely. Alleviating the hierarchy in the energy supply chain, market power, and centralized supply; liquefying the energy market and reducing the prices for consumers; and creating awareness on energy use and efficiency Aggregation of small prosumers (virtual power plants Energy market Aggregating load and generation of a group of end users to offer to electricity, balancing, or reserve markets Mobilizing small loads to participate in competitive markets; helping the grid by reducing load in peak times; Hedging the risk of high electricity bills at peak hours; and improving flexibility of the grid and reducing the need for balancing assets; Offering profitability to consumers Energy supply Application Sector Description Benefits Preventive maintenance Upstream oil and gas industry/utility companies Fault, leakage, and fatigue monitoring by analyzing of big data collected through static and mobile sensors or cameras Reducing the risk of failure, production loss and maintenance downtime; reducing the cost of O&M; and preventing accidents and increasing safety. Fault maintenance Energy market Identifying failures and problems in energy networks and possibly fixing them virtually Improving reliability of a service; improving speed in fixing leakage in district heating or failures in electricity grids; and reducing maintenance time and risk of health/safety Energy storage and analytics Industrial suppliers or utility companies Analyzing market data and possibilities for activating flexibility options such as energy storage in the systems Reducing the risk of supply and demand imbalance; increasing profitability in energy trade by optimal use of flexible and storage options; and ensuring an optimal strategy for storage assets. Digitalized power generation Utility companies & system operator Analyzing big data of and controlling many generation units at different time scales Improving security of supply; improving asset usage and management; reducing the cost of provision of backup capacity; accelerating the response to the loss of load; and reducing the risk of blackout. Transmission and Distribution (T&D) grid Application Sector Description Benefits Smart grids Electric grid management A platform for operating the grid using big data and ICT technologies as opposed to traditional grids. Improving energy efficiency and integration of distributed generation and load; improving security of supply; and reducing the need for backup supply capacity and costs Network management Electric grid operation &management Using big data at different points of the grid to manage the grid more optimally Identifying weak points and reinforcing the grid accordingly and reducing the risk of blackout Integrated control of electric vehicle fleet (EV) Electric grid operation & management Analyzing data of charging stations and charge/discharge cycles of EVs. Improving the response to charging demand at peak times; analyzing and forecasting the impact of EVs on load; and identifying areas for installing new charging stations and reinforcement of the distribution grid. Control and management of vehicle to grid (V2G) residential/comme rcial &industry Central control (i.e., by shedding, shifting, or leveling; load of many consumers by analyzing the load and operation of appliances Reducing demand at peak time, which itself reduces the grid congestion; reducing consumer electricity bills; and reducing the need for investment in grid backup capacity. Microgrids Electricity grid Platforms for managing a grid independent from the central grid Improving security of supply; creating interoperability and flexibility between microgrids and the main grid; and offering stable electricity prices for the consumers connected to the microgrid.
  • 28. Demand side Application Sector Description Benefits Demand response Residential/comm ercial &industry Central control (i.e., by shedding, shifting, or leveling. Reducing demand at peak time, which itself reduces the grid congestion Demand response(demand side management Residential/comm ercial &industry Central control (i.e., by shedding, shifting, or leveling; load of many consumers by analyzing the load and operation of appliances Reducing demand at peak time, which itself reduces the grid congestion; reducing consumer electricity bills; and reducing the need for investment in grid backup capacity Advanced metering infrastructure End users Using sensors and devices to collect and analyze the load and temperature data in a consumer site Having access to detailed load variations indifferent time scale; identifying areas for improving energy efficiency (for example overly air-conditioned rooms or extra lights when there is no occupants); and reducing the cost of energy use Battery energy management End users Data analytics for activating battery at the most suitable time Optimal strategy for charge/discharge of battery in different time scale; improving energy efficiency and helping the grid at peak times; and reducing the cost of energy use Smart buildings End users Centralized and remote control of appliances and device Improving comfort by optimal control of appliances and HVAC systems; reducing manual intervention, saving time and energy; increasing knowledge on energy use and environmental impact; improving readiness for joining a smart grid or virtual power plant; and improved integration of distributed generation and storage systems https://iot-analytics.com/top-10-iot-applications-in-2020/ Top Ten IoT Application Areas in 2020 Existing IoT Use Cases Module 3 IoT Security and Privacy  Security and Privacy Risks  Analyze Security Risks  Technologies and Methods that Mitigate Security  Privacy Standards and Regulations  Social and Privacy impacts IoT Applications Vehicles Devices (Medical, Security, Data Collection) Smart office Smart Tracking Smart Advertisement Smart Appliances Smart Kitchen Security System Smart Phone Tablets Wearable Objects Smart Grid Smart Road Smart Traffic Smart Parking Smart Transport Smart Agriculture Smart Energy Human Objects Homes Cities Trades Industries
  • 29. IoT Solution Architecture - Stages Level 1-Edge Nodes: This level is composed of computing nodes such as sensors, micro-controllers, RFID readers, and several types of RFID tags. Several security goals like integrity, confidentiality, and privacy should be taken into consideration from this level upwards. Level 2-Communication: This level consists of all enabler technologies (e.g., connectivity and communication protocols ) which allow transportation of commands and data between objects in the first level and objects located at the third level. Level 3-Edge Computing: The main objective of this level is to perform simple data processing which in turn decreases the computation load in the higher level and offers a quick response. It is wise for real-time applications to process data closer to the edge of the network, rather than to process data in the cloud. Many factors (e.g., service providers and computing nodes) can be used to define the amount of data processing at this level. Level 4-Data Accumulation: As most of IoT applications may not require immediate data processing, this level converts data in motion to data at rest. It provides several functions, the most popular of which are changing packets to database tables, deciding if data is of importance to higher levels, and minimizing data via filtering process. Level 5- Data Abstraction: This level is used to store data for further processing. In general, this level provides several functions such as normalization/denormalization, indexing, and access control to different data centers. Level 6-Applications: The list of IoT applications operated at this level is almost endless in both sectors ( industries and markets). Information interpretation can be provided as a result of cooperation between different applications, which in turn depends on data either at rest or in motion at this level. Level 7- Data Centers (DC) and Users: In this level, only authorized users should be allowed to communicate with IoT applications to make use of their data. Such data may be stored remotely in DCs for further processing. CIA Security Model IoT Generic Model with Privacy and Security Policies Privacy and Security Policies CIA Confidentiality Integrity Availability Confidentiality measures protect information, data, system, resources etc., from unauthorized view, access and misuse Confidentiality Passwords, access control lists and authentication procedures use software to control access to resources. These access control methods are complemented by the use encryption to protect information that can be accessed despite the controls, such as emails that are in transit. Additional confidentiality countermeasures include administrative solutions such as policies and training, as well as physical controls that prevent people from accessing facilities and equipment. Countermeasures: Integrity measures protect information/data from unauthorized alteration. These measures provide assurance in the accuracy and completeness of data. Integrity Countermeasures: Access control and rigorous authentication can help prevent authorized users from making unauthorized changes. Hash verifications and digital signatures can help ensure that transactions are authentic. Aims to provide data for users whenever needed. User should be able to access data not only in normal conditions but also in disastrous conditions. Some of the most fundamental threats to availability are non-malicious in nature and include hardware failures, unscheduled software downtime and network bandwidth issues. Availability Countermeasures: Backup servers and Data storage Countermeasures to protect against DoS attacks include firewalls and routers.
  • 30. External Internal Agent IoT Layers(3 Layers Architecture) Threats Physical Layer Network Layer Data Process Application Layer DoS Tampering Jamming Eavesdropping De- synchronization MITM Spoofing Selective forwarding Collision Exhaustion Malware System integrity Client application Communication Modifications Unfairness Wormhole Flooding Multi-user access Data access IoT Threats Tampering Eavesdropping Physical Layer - Threats The hardware or software features of IoT objects are modified by the attackers via physical or cyber methods. Jamming Fundamental security policies violation: Tampering targets the integrity of IoT systems. It is the type of attack in which the data integrity is damaged by interfering the network traffic during the communication of the objects. The jammer positioned between the sender and the receiver transmits a high-power signal across the sensitive band range to disrupt the communication medium between the objects. Fundamental security policies violation: Integrity and Accessibility. A passive listening attack. It is a technique that is used to access and retrieve the communication traffic between IoT objects Fundamental security policies violation: Confidentiality. Denial-of-service(DoS) Jamming Eavesdropping Physical Layer - Threats DoS attacks are being made to disrupt the services of IoT platforms. In detail, the communication network between IoT objects is blocked resulting in being non-communicating. IoT has a weakness against attacks that disrupt its functioning, occupy resources and consume the energy of devices. The most important type of attack affected by such weaknesses is the DoS attacks. Likewise, DoS attacks can target all of the physical, data link, network, transmission and application layers of TCP/IP. The attacker gets control of the target system by sending a continuous data request to the target IoT platform from different locations Fundamental security policies violation: Dos targets the accessibility of IoT systems. Denial-of-service(DoS) Denial-of-service attacks are characterized by an explicit attempt by attackers to prevent legitimate use of a service. Distributed DoS(DDoS) (Form of DoS attacks) A distributed denial-of-service (DDoS) attack occurs when multiple systems flood the bandwidth or resources of a targeted system, usually one or more web servers. A DDoS attack uses more than one unique IP address or machines, often from thousands of hosts infected with malware. A distributed denial of service attack typically involves more than around 3–5 nodes on different networks; fewer nodes may qualify as a DoS attack but is not a DDoS attack