SlideShare a Scribd company logo
Iot full notes - iot for smart systems
Internet of things (Anna University)
Scan to open on Studocu
Studocu is not sponsored or endorsed by any college or university
Iot full notes - iot for smart systems
Internet of things (Anna University)
Scan to open on Studocu
Studocu is not sponsored or endorsed by any college or university
Downloaded by BENAZIR AE (arbenazir22@gmail.com)
lOMoARcPSD|37383633
UNIT I INTRODUCTION TO INTERNET OF THINGS
Overview, Hardware and software requirements for IOT, Sensor and actuators, Technology drivers,
Business drivers, Typical IoT applications, Trends and implications.
Internet of Things - Overview
IoT systems allow users to achieve deeper automation, analysis, and integration within a system. They
improve the reach of these areas and their accuracy. IoT utilizes existing and emerging technology for
sensing, networking, and robotics.
IoT exploits recent advances in software, falling hardware prices, and modern attitudes towards technology.
Its new and advanced elements bring major changes in the delivery of products, goods, and services; and the
social, economic, and political impact of those changes.
IoT − Key Features
The most important features of IoT include artificial intelligence, connectivity, sensors, active engagement,
and small device use. A brief review of these features is given below −
 AI − IoT essentially makes virtually anything ―smart‖, meaning it enhances every aspect of life with
the power of data collection, artificial intelligence algorithms, and networks. This can mean
something as simple as enhancing your refrigerator and cabinets to detect when milk and your
favorite cereal run low, and to then place an order with your preferred grocer.
 Connectivity − New enabling technologies for networking, and specifically IoT networking, mean
networks are no longer exclusively tied to major providers. Networks can exist on a much smaller
and cheaper scale while still being practical. IoT creates these small networks between its system
devices.
 Sensors − IoT loses its distinction without sensors. They act as defining instruments which transform
IoT from a standard passive network of devices into an active system capable of real-world
integration.
 Active Engagement − Much of today's interaction with connected technology happens through
passive engagement. IoT introduces a new paradigm for active content, product, or service
engagement.
 Small Devices − Devices, as predicted, have become smaller, cheaper, and more powerful over time.
IoT exploits purpose-built small devices to deliver its precision, scalability, and versatility.
IoT − Advantages
The advantages of IoT span across every area of lifestyle and business. Here is a list of some of the
advantages that IoT has to offer −
 Improved Customer Engagement − Current analytics suffer from blind-spots and significant flaws
in accuracy; and as noted, engagement remains passive. IoT completely transforms this to achieve
richer and more effective engagement with audiences.
 Technology Optimization − The same technologies and data which improve the customer
experience also improve device use, and aid in more potent improvements to technology. IoT unlocks
a world of critical functional and field data.
 Reduced Waste − IoT makes areas of improvement clear. Current analytics give us superficial
insight, but IoT provides real-world information leading to more effective management of resources.
 Enhanced Data Collection − Modern data collection suffers from its limitations and its design for
passive use. IoT breaks it out of those spaces, and places it exactly where humans really want to go to
analyze our world. It allows an accurate picture of everything.
IoT − Disadvantages
Downloaded by BENAZIR AE (arbenazir22@gmail.com)
lOMoARcPSD|37383633
Though IoT delivers an impressive set of benefits, it also presents a significant set of challenges. Here is a
list of some its major issues −
 Security − IoT creates an ecosystem of constantly connected devices communicating over networks.
The system offers little control despite any security measures. This leaves users exposed to various
kinds of attackers.
 Privacy − The sophistication of IoT provides substantial personal data in extreme detail without the
user's active participation.
 Complexity − Some find IoT systems complicated in terms of design, deployment, and maintenance
given their use of multiple technologies and a large set of new enabling technologies.
 Flexibility − Many are concerned about the flexibility of an IoT system to integrate easily with
another. They worry about finding themselves with several conflicting or locked systems.
 Compliance − IoT, like any other technology in the realm of business, must comply with regulations.
Its complexity makes the issue of compliance seem incredibly challenging when many consider
standard software compliance a battle.
What is the Internet of Things (IoT)?
The term Internet of Things or IoT usually refers to the scenarios where normal items of our day-to-day lives
are extended with network connectivity and stronger computing capabilities generate data that could further
be exchanged, collected, consumed with almost no human intervention (in the whole process).
The IoT can be better explained as one of the emerging technology concepts that have got their own
significance in all aspects of the world.
Components of our day-to-day lives such as the Durable goods, Vehicles, Consumer Products, Utilities,
Sensors when combined with the internet connectivity and stronger data analytic capabilities - has promised
a transformed way of our life significantly.
How does the IoT work?
Further to what we have discussed above, we will now take a closer look at how things work within. For
this, there is a definite need to understand the underlying architecture altogether. This will not only provide
you the details that are required for you to carry out an experiment all by yourselves but also provides you a
better understanding of the whole concept.
An IoT system altogether consists of 4 different components which are Sensors, Connectivity, Data
Processing, and the final one being a User Interface.
Now with this understanding, let us go through each and every component in detail (you can also make
some references of these from the architecture diagram that is provided below):
Sensors:
Sensors are the devices that start the whole process of data collection, verification. This could be any simple
device like a temperature reading to an advanced level such as a video feed altogether.
A sensor as such a component in the IoT system could be just a single device or a combination of various
sensors, devices that collect data from the intended environment.
Connectivity:
Connectivity forms the major part, as the data collected in the step above needs to be sent out to a step where
it can be processed and a thoughtful decision be made out of that data.
Downloaded by BENAZIR AE (arbenazir22@gmail.com)
lOMoARcPSD|37383633
These devices may all be connected to the Cloud via various methods such as WiFi, Cellular Satellite,
Bluetooth, LAN, WAN and etc.
Each of these has its own set of pros and cons, that needs to be thought over before setting up the IoT system
altogether.
Data Processing:
Once the data is collected and obtained to this step via your pre-set connectivity, then it is all logical to
process this data. Based on the data that you are collecting, the processing of this will be dependent.
For example, if your incoming data is temperature then the probable example for data processing is to check
whether it is within a permissible limit or not.
User Interface:
Based on the processed data, what are the next set of actions that you want to perform that could be checked
on a User interface. This could probably be your Mobile application on a phone or a tablet etc.
Building Blocks of the Internet of Things (IoT):
Based on the above, you would have already got an idea of the whole concept. As per the above architecture,
there are two sets of components that come into the picture - the first being the hardware components such
as the sensors, devices, etc and the other side of the system are your software components such as mobile
applications, processing tools/software.
With this context, let us now take a look at each of these components in detail and get some understanding
of these.
IoT Hardware:
The set of devices that respond and have the capabilities to capture data, follow the instructions can be
considered as the IoT Hardware. The following fall into such categories where they not only collect data but
also respond to instructions based on the processed data.
1. Chips:
This is much a broader classification that contains all the electrical and electronic appliances such as
microcontrollers, chips, integrated circuits, radio frequency systems, etc.
2. Sensors:
Sensors, which are one of the base components of an IoT system, have three modules - Power Management
modules, Sensing modules, and Energy modules.
3. Actuators:
These devices provide the motion to a data collection system such as the solenoids, comb drives, etc to fetch
details based on movements.
4. Standard devices:
Standard devices constitute the generally used devices such as Tablets, Smartphones, Switches, Routers and
etc. Each of these devices has its own set of settings that allow them to collect data.
Downloaded by BENAZIR AE (arbenazir22@gmail.com)
lOMoARcPSD|37383633
IoT Software:
The set of programs that help you get the activities done like the data collection, processing, storage, and
evaluating instructions based on the processed data from the IoT Software. Operating Systems, firmware,
applications, middleware are some of the examples that fall into this category.
1. Data Collection:
This step involves the core of the data collection aspects ranging from sensing the data, filtering it,
measuring it, aggregating it, and at the end managing the security of the collected data. Data collection can
be performed from various sources, and once done is distributed over devices and then to a central data
repository.
2. Device Integration:
This ensures that all components within the IoT system are all well integrated. It manages all the limitations,
protocols, and applications that are handled properly to ensure proper communication amongst the devices.
3. Real-Time Analytics:
Over the collected data and the processing that is done over this data, there can be automated tasks that
could run and analyze this data for specific patterns.
4. Application and Process Extension:
This ensures that the data collection process can be accentuated to get the most of it, from all possible
sources. These are more like the enhancers over the existing data collection infrastructure.
Use cases of IoT Platforms:
IoT finds its usage in almost all the Business Verticals, be it Healthcare, Travel, Education, Real Estate,
Retail, Economy. This technology has opened up doors for everyone to leverage this and make a better
future for themselves.
In the process, the whole industry has undergone major shifts causing enough revolution. These are
groundbreaking changes that are brought in that has caused various changes in the whole process altogether.
There are various use cases that can be identified in these Verticals, which are outlined here:
1. Healthcare:
IoT can evaluate if there is a possibility that the patient is prone to any Chronic diseases based on his / her
medical history.
2. Travel:
IoT can ease all your travel needs ranging from your itinerary to your electronic room keys, travel needs,
aids, and information. It could be your single point of an information source in the near future.
3. Education:
Bringing all the education needs to an easy process, knowledge on-demand, knowledge sharing amongst
peers across geographical locations. Skill gaps, knowledge gaps can be reduced with the various ways of
knowledge sharing.
Downloaded by BENAZIR AE (arbenazir22@gmail.com)
lOMoARcPSD|37383633
4. Real Estate:
Energy-efficient solutions, smart options to cover space, and comfort will shape the Real Estate sector to
newer heights. Electrical devices such as a fan, light are switched ON only if the human presence is sensed,
else these will be switched OFF. Thereby, reduces the power consumption to a greater deal.
5. Retail:
Stores based on demand, easier checkouts, easier warehouse maintenance, better demand-supply chains.
With this, based on demand - warehouse management becomes much simpler.
6. Economy:
The concept of Smart Contracts based on the technologies BlockChain and the Internet of Things is nearing
reality. It cuts down the whole process of all manual efforts.
Difference between Sensor and Actuator
1. Sensor:
Sensor is a device used for the conversion of physical events or characteristics into the electrical signals.
This is a hardware device that takes the input from environment and gives to the system by converting it.
For example, a thermometer takes the temperature as physical characteristic and then converts it into
electrical signals for the system.
2. Actuator:
Actuator is a device that converts the electrical signals into the physical events or characteristics. It takes the
input from the system and gives output to the environment.
For example, motors and heaters are some of the commonly used actuators.
Difference between Sensor and Actuator :
SENSOR ACTUATOR
It converts physical characteristics into
electrical signals.
It converts electrical signals into
physical characteristics.
It takes input from environment.
It takes input from output conditioning
unit of system.
Downloaded by BENAZIR AE (arbenazir22@gmail.com)
lOMoARcPSD|37383633
SENSOR ACTUATOR
It gives output to input conditioning unit of
system.
It gives output to environment.
Sensor generated electrical signals. Actuator generates heat or motion.
It is placed at input port of the system.
It is placed at output port of the
system.
It is used to measure the physical quantity.
It is used to measure the continuous
and discrete process parameters.
It gives information to the system about
environment.
It accepts command to perform a
function.
Example: Photo-voltaic cell which
converts light energy into electrical energy.
Example: Stepper motor where
electrical energy drives the motor.
Technology Drivers in 2018 (updated)
The last couple of years have been crazy with the lot of innovation and buzz around Cloud Computing,
Big Data, Machine Learning, Artificial Intelligence, and BlockChain.
Big Data has been there for a while, however, access to these technologies was limited and relatively
expensive. Overall innovation in the public cloud has led to commodification these technologies and ease of
cloud migration. Today processing of a large amount of data in real time is much easier and
cheaper. Outsource Software Development will bring in much more value than it has in the recent past
because of these advantages.
That means Machine Learning, AI, and IOT was not far away on the radar, today there isn‘t much hassle to
develop your own ML, AI and IoT Application with managed offering like AWS Sagemaker and AWS IOT
Suite
Not just AWS but most of the cloud providers are building their offerings around below drivers and Yes!
these are critical ones to build future-ready systems.
Here is my list of 2018 Technology drivers
1. Containerization
2. Machine Learning & Artificial Intelligence
Downloaded by BENAZIR AE (arbenazir22@gmail.com)
lOMoARcPSD|37383633
3. Internet of Things
4. Conversational or Voice Enabled Systems
5. Serverless computing
6. Security
7. Edge Computing
8. BlockChain
Business Drivers
Based on our years of experience with our facility customers, here are five key drivers setting the
momentum of IoT and smart facilities:
 Scalability
 Easy installation and maintenance
 Reliability
 IoT security
 Integration
1. Scalability, the practical driver
The first key driver is perhaps not the most exciting, but probably the most practical: scalability. Creating a
small proof of concept using widely available DIY (Do It Yourself) IoT kits is relatively easy, but when you
need to scale the implementation to thousands or hundreds of thousands of sensors, things get a little
more complicated.
A well designed IoT solution ensures that your solution is easy and fast to scale, secure, easy to use, and of
course, cost-efficient.
The challenges with scalability are not only about adding more devices but also about maintaining them.
Consider what it takes to keep the IoT devices on several locations operating effectively: monitoring their
battery levels and replacing batteries, ensuring consistent and strong connectivity, dealing with each sensor‘s
reporting intervals, as well as remote firmware updates over the entire lifecycle.
Although these issues seem to add some complications to the mix when you consider implementing IoT to
your operations, the efforts will be more than rewarded in the savings received.
What is Massive IoT?
Massive IoT sets some requirements for the technologies used. For this article, we partnered with Wirepas to
go through the meaning and implications of massive scale IoT.
2. Easiness of installation and maintenance
Easy installation and scale are paramount for smart facilities. A wonderful instant benefit of IoT is that its
hardware, including sensors and gateways, are easy to install and user-friendly for the technicians. For
example, wireless sensor installation should be as easy as mounting the sensor to walls, ceilings, under
tables, etc. in a matter of seconds and validating the connectivity with a smartphone. Also, there should be
no need to involve building IT infrastructure when connecting devices with mobile gateways.
When considering different IoT solutions, one must remember that the amount of installation time per
sensor will mirror directly to the overall cost. The instructions must be straightforward for technicians
Downloaded by BENAZIR AE (arbenazir22@gmail.com)
lOMoARcPSD|37383633
and easy to understand. Also, the instructions should be easily available in, for example, a mobile app that
can guide the technicians through both installation and maintenance procedures.
3. Reliability
Buildings are built to last, and that‘s how the design for sensors and gateways should be approached as well.
Batteries in sensors last for several years, therefore requiring very little maintenance. Once installed, the
sensor maintenance should be minimal.
As the installed sensor base scales, the less you need to worry about their connectivity, battery levels and
signal strengths, the more time you have analyzing the data they give.
Reliable maintenance makes sure that the dataflow is constant, all the devices are in operation and where
they should be, and that nothing comes in the way of getting the most out of IoT in your smart facilities
solution.
4. IoT Security
The quality of security is one of the major key drivers of any type of development, and IoT data
collection platforms are designed with privacy and security in mind. End-to-end security is employed from
the sensors to the cloud application in terms of software, and from the factory to the location with no
unknown software layers. Comprehensive security allows for protected integration to your cloud platform
and ensures the continuity of its transmission.
We at Haltian are overseeing security all the way from the manufacturing, where customer-specific
encryption keys are installed in the software ensuring data integrity. We don‘t use any unknown software
layers and interfaces.
Our cloud partner for sensor operations is Amazon Web Services which means that our solution has gone
through a thorough validation process and is tested regularly.
5. Easily integrated IoT ecosystem
IoT ecosystem and value chains are rather long and complex, hence implementing that IoT solutions require
various layers to talk to each other. A system that can deliver a cost-effective data collection solution for
smart facilities with full integration to any cloud-based application is a massive forward driver.
Haltian‘s Thingsee solution includes various sensors, gateways, cellular connectivity and software for device
cloud. Our customers can have an IoT platform or cloud-based solution from another vendor, to which we
integrate easily. The beauty of running a cloud-based solution is the ease of integration!
Internet of Things Applications
The Internet of Things (IoT) provides the ability to interconnect computing devices, mechanical machines,
objects, animals or unique identifiers and people to transfer data across a network without the need for
human-to-human or human-to-computer is a system of conversation. IoT applications bring a lot of value in
our lives. The Internet of Things provides objects, computing devices, or unique identifiers and people's
ability to transfer data across a network without the human-to-human or human-to-computer interaction.
Downloaded by BENAZIR AE (arbenazir22@gmail.com)
lOMoARcPSD|37383633
A traffic camera is an intelligent device. The camera monitors traffic congestion, accidents and weather
conditions and can access it to a common entrance.
This gateway receives data from such cameras and transmits information to the city's traffic monitoring
system.
For example, the municipal corporation has decided to repair a road that is connected to the national
highway. It may cause traffic congestion to the national highway. The insight is sent to the traffic
monitoring system.
The intelligent system analyzes the situation, estimate their impact, and relay information to other cities
connected to the same highway. It generates live instructions to drivers by smart devices and radio channels.
It creates a network of self-dependent systems that take advantage of real-time control.
What is IoT?
Downloaded by BENAZIR AE (arbenazir22@gmail.com)
lOMoARcPSD|37383633
IoT is a platform where embedded devices are connected to the Internet to collect and exchange data.
It enables machines to interact, collaborate and learn from experiences like humans. IoT applications
equipped billions of objects with connectivity and intelligence.
Applications of IoT
1. Wearables
Wearable technology is the hallmark of IoT applications and one of the earliest industries to deploy IoT. We
have fit bits, heart rate monitors and smartwatches these days.
Guardian glucose monitoring device has been developed to help people with diabetes. It detects glucose
levels in our body, uses a small electrode called the glucose sensor under the skin, and relates it to a
radiofrequency monitoring device.
2. Smart Home Applications
The smart home is probably the first thing when we talk about the IoT application. The example we see the
AI home automation is employed by Mark Zuckerberg. Alan Pan's home automation system, where a
string of musical notes uses in-house functions.
3. Health care
IoT applications can transform reactive medical-based systems into active wellness-based systems.
Resources that are used in current medical research lack important real-world information. It uses controlled
environments, leftover data, and volunteers for clinical trials. The Internet of Things improves the
device's power, precision and availability. IoT focuses on building systems rather than just tools. Here's
how the IoT-enabled care device works.
Downloaded by BENAZIR AE (arbenazir22@gmail.com)
lOMoARcPSD|37383633
4. Smart Cities
Most of you have heard about the term smart city. Smart city uses technology to provide services. The smart
city includes improving transportation and social services, promoting stability and giving voice to their
citizens.
The problems faced by Mumbai are very different from Delhi. Even global issues, such as clean drinking
water, declining air quality, and increasing urban density, occur in varying intensity cities. Therefore, they
affect every city.
Governments and engineers use the Internet of Things to analyze the complex factors of town and each city.
IoT applications help in the area of water management, waste control and emergencies.
Example of a smart city - Palo Alto.
Palo Alto, San Francisco, is the first city to acquire the traffic approach. He realized that most cars roam
around the same block on the streets in search of parking spots. It is the primary cause of traffic congestion
in the city. Thus, the sensors were installed at all parking areas in the city. These sensors pass occupancy
status to the cloud of each spot.
This solution involves the use of sensor arrays that collects data and uses it for many purposes.
5. Agriculture
By the year 2050, the world's growing population is estimated to have reached about 10 billion. To feed
such a large population, agriculture needs to marry technology and get the best results. There are many
possibilities in this area. One of them is Smart Greenhouse.
Farming techniques grow crops by environmental parameters. However, manual handling results in
production losses, energy losses and labor costs, making it less effective.
The greenhouse makes it easy to monitor and enables to control the climate inside it.
Downloaded by BENAZIR AE (arbenazir22@gmail.com)
lOMoARcPSD|37383633
6. Industrial Automation
It is one of the areas where the quality of products is an essential factor for a more significant investment
return. Anyone can re-engineer products and their packaging to provide superior performance
in cost and customer experience with IoT applications. IoT will prove as a game-changer. In industrial
automation, IoT is used in the following areas:
o Product flow monitoring
o Factory digitization
o Inventory management
o Safety and security
o Logistics and Supply Chain Optimization
o Quality control
o Packaging customization
Downloaded by BENAZIR AE (arbenazir22@gmail.com)
lOMoARcPSD|37383633
7. Hacked Car
A connected car is a technology-driven car with Internet access and a WAN network. The technology offers
the user some benefits such as in-car infotainment, advanced navigation and fuel efficiency.
8. Healthcare
Healthcare do real-time monitoring with the help of smart devices. It gathers and transfers health data such
as blood pressure, blood sugar levels, weight, oxygen, and ECG. The patient can contact the doctor by the
smart mobile application in case of any emergency.
9. Smart Retail
IoT applications in retail give shoppers a new experience. Customers do not have to stand in long queues as
the checkout system can read the tags of the products and deduct the total amount from the customer's
payment app with IoT applications' help.
10. Smart Supply Chain
Customers automate the delivery and shipping with a smart supply chain. It also provides details of real-time
conditions and supply networks.
11. Smart Farming
Farmers can minimize waste and increase productivity. The system allows the monitoring of fields with the
help of sensors. Farmers can monitor the status of the area.
Internet-connected devices go from 5 million to billions in just one year. Business Insider Intelligence
estimates 24 billion IoT devices will install and generate more than 300 billion in revenue in the future.
Internet of Things TechnologyTrends 2023
Now, let‘s move on to the top IoT trends that will determine the industry‘s development this year.
1. IoT Security
The increasing number of devices connected to the internet brings new vulnerabilities and exposures to
companies and private users. If one machine in an IoT ecosystem is compromised, other devices are
automatically at risk, since they are all connected.
Common IoT security issues include:
 data leaks and data breaches
 malware, ransomware, DDoS attacks
 software weaknesses due to poor development
 outdated software
 device mismanagement.
That‘s why cybersecurity should be prioritized when developing and implementing IoT solutions in all
industries.
The global IoT security spending is predicted to amount to $6.68 billion in 2023.
Following are some trends that will help businesses and users improve their Internet of Things cybersecurity
this year.
Downloaded by BENAZIR AE (arbenazir22@gmail.com)
lOMoARcPSD|37383633
 Cybersecurity software — more enterprises will invest in software solutions that protect IoT devices from
cyberattacks. An example of such software is Quantum IoT Protect by Check Point, which discovers risks,
assesses them, and prevents unauthorized access.
 Password management software — more digital businesses will leverage solutions that provide IoT
credential management and eliminate threats connected with weak or default passwords. Credential hygiene
is supported by periodically rotating passwords in the system and ensuring that they comply with security
requirements.
 Network security tools — more companies will enhance their network security with the help of firewalls,
identity, and access management (IAM) products, remote access VPN, and other tools.
 Government regulations — more countries will develop and enact laws and standards to regulate the
production and usage of connected devices. IoT manufacturers and businesses will be obliged to comply
with a range of security norms.
 Cybersecurity strategy — business leaders will pay greater attention to developing in-house cybersecurity
strategies.
2. Digital Twins and the Metaverse in Enterprises
The technology of digital twins is quite young, but various enterprises with implemented IoT systems are
already embracing it. In their essence, digital twins allow you to test a product, process, or business model
based on collected data without risking real-world assets.
For example, using a digital twin of some manufacturing process in a plant, workers can create various
optimization models, test hypotheses, and predict possible issues. All this happens in a simulated reality,
while in the real world the plant employees will apply only the most suitable optimization model and avoid
unnecessary expenses. Digital twins can also simulate hacker attacks on IoT systems so that security experts
can improve their means of data protection.
The metaverse is an even younger concept, but it‘s gaining traction and is built, among other technologies,
on digital twins. We can say that the metaverse technology is an expanded digital twin of a real-world space
where people can interact with each other. In the near future, it will be possible not only to have fun, but also
to work, study, go shopping, and have a doctor appointment in the metaverse. In fact, it can become a
comprehensive digital twin of the reality we live in.
3. IoT in Healthcare
The healthcare sector is experiencing considerable investments in digitalization, including IoT adoption. The
Internet of Things has enormous potential to transform the entire industry as it allows for improved
diagnostics and a personalized approach to treatment. No wonder an independent branch — the Internet of
Medical Things (IoMT) as part of the general digital health concept — has appeared.
Some IoT use cases that have become popular in hospitals around the world include:
 medical wearables
 patient data collection and analytics
 smart diagnostic tools
 robotic surgery machines
 monitoring systems to supervise patients and control storage conditions in laboratories.
Note: IoT advancements in healthcare and other industries are tightly coupled with machine learning,
artificial intelligence, virtual reality, and other advanced technologies.
The healthcare business model is also altered under the influence of IoT, bringing benefits both for patients
and service providers:
Downloaded by BENAZIR AE (arbenazir22@gmail.com)
lOMoARcPSD|37383633
 Reduced costs. Using IoT sensors, healthcare providers ensure continuous real-time monitoring for patients
who require it. This way, they improve the quality of medical care and reduce its costs, because medical
workers no longer need to regularly check patients‘ vital signs.
 Improved disease control. When patients are under constant monitoring and caregivers have access to real-
time data, it is possible to provide early diagnosis and preventive care. Combining this with constant
monitoring of the therapy effectiveness, healthcare providers can help prevent serious complications.
 Remote consultations. For some population groups (e.g., those living in remote areas) it‘s challenging to
access medical institutions on time to get effective treatment. Such people can use IoT solutions paired with
mobile applications to collect and communicate health data to doctors and receive consultation based on it.
 Patient engagement. IoT in healthcare is shifting the focus to patients and their needs. Patients can now
control their health conditions independently, and contact a medical specialist only if needed. This creates a
new relationship model between doctor and patient, in which the latter becomes a partner in preventing and
treating diseases.
4. Edge IoT
The Internet of Things in many ways depends on cloud computing. Unfortunately, cloud services have
significant drawbacks, such as low bandwidth and possible high latency, which may cause issues in real-
time data processing. This is why numerous companies are currently investing in edge computing
technology.
5. Governance and Regulation in the IoT Space
Challenges of IoT
A few of the challenges are as follows:
· Boundary and technical limitation is a few areas of technology
· Cybercrime
· Intellectual Property Rights
· More value must be extracted from the app instead of just concentrating on silicon-based technology
· Technology standard is inconsistent and remains disjointed in the majority of the fields.
· Not sufficient security for user data and their protection
Downloaded by BENAZIR AE (arbenazir22@gmail.com)
lOMoARcPSD|37383633
UNIT II IOT ARCHITECTURE
IoT reference model and architecture -Node Structure - Sensing, Processing, Communication, Powering,
Networking - Topologies, Layer/Stack architecture, IoT standards, Cloud computing for IoT, Bluetooth,
Bluetooth Low Energy beacons.
Architecture of Internet of Things (IoT)
Internet of Things (IoT) technology has a wide variety of applications and use of Internet of Things is
growing so faster. Depending upon different application areas of Internet of Things, it works accordingly as
per it has been designed/developed. But it has not a standard defined architecture of working which is
strictly followed universally. The architecture of IoT depends upon its functionality and implementation in
different sectors. Still, there is a basic process flow based on which IoT is built.
So. here in this article we will discuss basic fundamental architecture of IoT i.e., 4 Stage IoT architecture.
4 Stage IoT architecture
So, from the above image it is clear that there is 4 layers are present that can be divided as follows: Sensing
Layer, Network Layer, Data processing Layer, and Application Layer.
These are explained as following below.
1. Sensing Layer –
The sensing layer is the first layer of the IoT architecture and is responsible for collecting data from
different sources. This layer includes sensors and actuators that are placed in the environment to gather
information about temperature, humidity, light, sound, and other physical parameters. These devices are
connected to the network layer through wired or wireless communication protocols.
2. Network Layer –
The network layer of an IoT architecture is responsible for providing communication and connectivity
between devices in the IoT system. It includes protocols and technologies that enable devices to connect
and communicate with each other and with the wider internet. Examples of network technologies that are
commonly used in IoT include WiFi, Bluetooth, Zigbee, and cellular networks such as 4G and 5G.
Additionally, the network layer may include gateways and routers that act as intermediaries between
devices and the wider internet, and may also include security features such as encryption and
authentication to protect against unauthorized access.
3. Data processing Layer –
The data processing layer of IoT architecture refers to the software and hardware components that are
responsible for collecting, analyzing, and interpreting data from IoT devices. This layer is responsible
for receiving raw data from the devices, processing it, and making it available for further analysis or
action.The data processing layer includes a variety of technologies and tools, such as data management
systems, analytics platforms, and machine learning algorithms. These tools are used to extract
meaningful insights from the data and make decisions based on that data.Example of a technology used
in the data processing layer is a data lake, which is a centralized repository for storing raw data from IoT
devices.
Downloaded by BENAZIR AE (arbenazir22@gmail.com)
lOMoARcPSD|37383633
4. Application Layer –
The application layer of IoT architecture is the topmost layer that interacts directly with the end-user. It
is responsible for providing user-friendly interfaces and functionalities that enable users to access and
control IoT devices.This layer includes various software and applications such as mobile apps, web
portals, and other user interfaces that are designed to interact with the underlying IoT infrastructure. It
also includes middleware services that allow different IoT devices and systems to communicate and
share data seamlessly.The application layer also includes analytics and processing capabilities that allow
data to be analyzed and transformed into meaningful insights. This can include machine learning
algorithms, data visualization tools, and other advanced analytics capabilities.
IoT node
IoT node Within the IoT (Internet of Things) ecosystem, buildings can be considered as basic cells of the
city and can provide valuable and relevant information about the city. It means that they‘re just another
object in this is environment. We are therefore interested in the information it generates.
The main two features of an IoT node are to manage the interconnection between the building and the rest of
the network and to recollect the information generated by itself (all the relevant systems inside the building).
In other words, the IoT nodes are the elements within an IoT ecosystem than allow the connection of the
physical world with the Internet.
These kinds of devices are conceived as hubs of information from multiple sensors with diverse origins.
This information has to be stored (only data considered of interest), processed based on his value, and make
it available to higher-level systems (or smart city platforms) through private networks or Internet, for the
provision of basic services through open, free and (as far as possible) standardised protocols.
Regarding processing capabilities, it‘s a good practice to apply edge computing on nodes, because IoT
produces a large amount of data that needs to be processed and analysed so it can be used (for decision
making). The purpose of edge computing is to move computing services closer to the source of the data, and
that fits perfectly on IoT devices.
In the specific case of the city of Terrassa, the device chosen was the Industrial PC-BL2 BPC 1000 -
2404777 (https://www.phoenixcontact.com/es-es/productos/box-pc-bl2-bpc-1000-2404777)
Downloaded by BENAZIR AE (arbenazir22@gmail.com)
lOMoARcPSD|37383633
In addition to meeting the requirements of an IoT node, in our case we had additional needs for the further
management and monitoring of these devices, such as:
- The operating system used by the IoT node must be Open Source.
- The operating system must be compatible with the corporate monitoring system.
- The Operating System must be compatible with the corporate automation system.
- The device must be compatible with our image distribution system.
- Ability to be installed in a communications rack.
1: What is the IoT, and What Does it Do?
It‘s probably best to start talking about the entirety of the Internet of Things with a definition. The Internet
of Things is the ecosystem made by connecting every kind of device to the internet for the purposes of
acquiring data, control and automation, remote sensing, and more without human intervention. It‘s a very
broad definition, but that speaks to just how far reaching the potential applications are.
Philosophically speaking, it‘s about making all the information of the world accessible and being able to act
on it in ways that save human effort and make our lives better and more efficient.
This is why people often distinguish between ―smart‖ and ―dumb‖ devices in reference to the IoT. Every
object that we interact with every single day has some form of data inherent to it.
Without a means to sense, capture, process, and send that information, most of these objects remain dumb
objects. There is something meaningful that they can measure about themselves, or that can be controlled
and automated, but the electronics and software are not in place.
Now, thanks to increasingly more affordable sensors, it‘s no longer impractical to outfit nearly everything
with wireless microcomputer hardware that can harvest that meaningful information or be remote controlled
by the cloud.
If you have ever looked at your running shoes and wondered exactly how many steps you‘ve taken in them,
you can start to see the broad horizon of what the IoT can do. This is the kind of meaningful information
inherent to an object that the IoT is designed for. The possibilities are endless.
What the IoT is really about, therefore, is solving very human problems in elegant ways.
What if a pill can be outfitted with sensors to take and share measurements inside the body, eliminating the
problem of an invasive scope? What if your refrigerator can tell you when you‘re at the store that you need a
gallon of milk? What if your garden can alert you that it‘s thirsty, or your front door can remind you that you
forgot to lock it? And then, what if you can lock it with your phone, anywhere on planet earth?
This is what the IoT is built to solve. Everything around us is better when its properties are known, when it‘s
controllable, and when it can alert us to problems before they become problems.
In short – the IoT means a better, more convenient life for people in ways great and small. Imagination
really is the only limit.
2: Architecting the IoT with the Node / Gateway / Cloud Model
The IoT is the result of a lot of devices operating in coordination with each other, sometimes asynchronously
or agnostic of each other. They operate at different levels, and each take custody of different aspects of
data‘s journey to and from the internet.
Downloaded by BENAZIR AE (arbenazir22@gmail.com)
lOMoARcPSD|37383633
There are all sorts of devices in the IoT, but they can very generally be broken down into three roles: Nodes,
Gateways, and Cloud Services. Together, they form a chain that gets data where it needs to go: Nodes at the
smart device, Gateways positioned within range to provide the uplink/downlink with the internet, and the
Cloud to store data, manipulate it, and initiate actions down to nodes again.
IoT Nodes – Sensing and Controlling
The most numerous type of device in the IoT can be referred to as the node. These are all the exciting
devices that are providing sensor data, or devices that are being controlled from the cloud. This means things
like door locks, security sensors, temperature sensors, and more.
Put simply, the node is the ―thing‖ in Internet of Things, and until recently they were a practical
impossibility. Nodes tend to be either lightweight sensor devices, which primarily gather status information
over a pre-programmed interval, or middleweight devices which also offer controllable functions (like a
door lock which can be toggled, traffic lights whose patterns can be adjusted, or industrial equipment which
can be disabled if a fault is triggered.
The IoT node as we know it today, in its most minimal use case, can be a sensor embedded in an object that
is never serviced again across the life of the device. They can be wireless and operated on a coin cell battery
for years. What seemed impossible just a few years ago is now quickly becoming standard. And that‘s
thanks to incredible innovations in low-power operation of wireless modules.
Laird Connectivity‘s BL654, for example, is a product that comes from a long line of Bluetooth modules
that support Bluetooth Low Energy (BLE). BLE, introduced in the Bluetooth v4.0 specification, enables
infrequent status-type messaging between Bluetooth devices with long sleep cycles in between messages.
Downloaded by BENAZIR AE (arbenazir22@gmail.com)
lOMoARcPSD|37383633
The BL654 consumes 4.8 mA power at peak transmission. But during deep sleep, which can be configured
to last a very long time, it only consumes 0.4µA – about 12,000x less power.
This is leaps ahead of the kind of power savings that were possible even just a decade ago, and it‘s part of
the reason that the IoT is finally beginning to live up to its promise.
Not all nodes are light on power consumption – they can be bigger, more complicated devices that run on
AC power as well. However, the ability to put a sensor into virtually anything and give it years of battery
life is the primary driver for the explosion of smart devices that we see now. It also creates a challenge,
because a low power wireless hub is needed that can support lots of devices connecting infrequently. And
there are lots of approaches to doing that, which we refer to as gateways.
IoT Gateways – The Launch Pad to the Web
The IoT gateway is the central hub for sensors that collects their data, and they come in many forms. They
interface directly with sensors and provide the path for that data to go to the cloud. Gateways can be
designed to operate in so many ways that it can be hard to generalize.
In some cases they may listen passively, and the sensor operates without even knowing the gateway is there.
In some cases they may establish bidirectional communication with the sensor, allowing the sensor to be
controlled by the cloud through the gateway. A gateway may be a small unit collocated with the sensors on-
site, or it may be the massive cellular tower miles away. Much of this depends on what wireless technology
is used, all of which have advantages and disadvantages.
Most IoT devices communicate over either Wi-Fi, LTE, Bluetooth, or LoRaWAN. These technologies vary
in their available throughput, their range, their power consumption, and more.
Selecting the right technology for a given use case is an important early decision for an IoT implementation,
as well.
For those who are especially protective of their data, LoRaWAN may make the most sense as it allows you
to build a private network without relying on a big public gateway, like a cellular tower.
For a smart home installation, where the components are all nearby, a short-range Bluetooth gateway can
offer adequate coverage at a substantially smaller power consumption and send the data to the internet over
home internet service.
If higher throughput is needed (like a group of security cameras that are capturing live video), a Wi-Fi
gateway can provide coverage over a whole facility to capture that video and send over Ethernet to the
server that catalogs that video.
Importantly, gateways are often multi-protocol for this reason. Gather sensor data over Bluetooth and send it
to the internet over Ethernet. Connect industrial hardware over serial port to a gateway, and control that
gateway via a Wi-Fi connection to the internet.
The purpose of a gateway is to bridge devices and make them accessible, and this very often means
supporting multiple types of connectivity. Laird Connectivity‘s IG60, for example, supports Wi-Fi,
Downloaded by BENAZIR AE (arbenazir22@gmail.com)
lOMoARcPSD|37383633
Bluetooth, Ethernet, Serial, and USB connection, because retrofitting IoT connectivity to an existing system
can mean having to resolve lots of different protocols and connector types to connect to the cloud.
Cloud Services – The Brains of the Operation
The cloud aspect of IoT is where real intelligence happens, and what makes the IoT more than just a
collection of devices talking to each other. The cloud is composed of the storage and processing in a data
center that allows data to be pulled in from a gateway and to be manipulated or analyzed in software.
This tends to be a subscription type service such as Amazon Web Services or Microsoft Azure, although it‘s
possible to host the cloud storage and computing independently on your own server. The major advantage of
suppliers like Amazon and Microsoft is the worldwide access, content distribution, and ability to scale
which enables very large and flexible IoT applications.
The cloud, more than anything, is about gaining insights into the data around us to make meaningful
changes that make things better. Consider the following example: A factory is outfitted with sensors on all
of its manufacturing equipment to keep a watchful eye on operations. The factory‘s administrators can see
when equipment is running, when it stops, gather machine codes that the equipment spits out if there is a
fault, and more. All of this by itself is already useful – the ability to see this all in one dashboard removes
the need to have inspectors constantly examining the equipment. Centralized information is a major
efficiency advantage.
However, with the cloud, the factory administrators can go much farther. A well-crafted cloud application
can look for trends in that information. Maybe it‘s discovered that a stamping machine routinely goes down
every night between 10 and 10:30. And it‘s also discovered that the materials that stamping machine needs
are being scanned in at the wrong loading location.
The solution becomes obvious: change the process so that those materials are loaded at a different location,
making sure the needed parts are in the right place at the right time to eliminate outages. A problem which
was hiding in plain sight becomes obvious when the data is analyzed. The solution becomes immediately
apparent.
This is the philosophy behind the many ways that the cloud can be used to make all kinds of things work
better, smarter, and more efficiently. It also allows tasks that would have required human time and effort to
be automated, making people‘s lives easier and decreasing errors. The applications are truly limitless, and
the cloud is what enables this.
4: Breaking the Model – Designing to Your Specific Use Case
There is no limit to the kinds of intelligence and control you can achieve with your devices. While we‘ve
focused largely on lightweight sensors that make up the majority of devices, there is no limit to what can be
achieved in the IoT. It‘s an exercise in creativity, and in manufacturers‘ ability to identify what‘s useful to
them and how to leverage it towards a better way to get things done.
Downloaded by BENAZIR AE (arbenazir22@gmail.com)
lOMoARcPSD|37383633
While the node/gateway/cloud model seems inherently to move from the most lightweight and distributed up
to the most powerful and centralized, that‘s only one way to approach the IoT. There are lots of ways to
build an IoT solution. In extreme cases, you may not have a centralized gateway at all.
For example, consider a warehouse with several industrial freezers. It may be that maintenance workers on
site already have regular tasks that must be performed every few hours. Since workers will be visiting each
refrigeration unit several times a day, it may make the most sense to log data on a sensor at each freezer and
manually collect it via a smartphone or other handheld device at each visit.
In this case, the smartphone or handheld serves as a temporary gateway, and data transfer only happens
when it‘s initiated in person. It‘s much different from a central gateway scenario, but it may be the most
sensible option for that OEM.
Standardizing the IoT
Smart objects produce large volumes of data. This data needs to be managed, processed, transferred and
stored securely. Standardization is key to achieving universally accepted specifications and protocols for
true interoperability between devices and applications.
The use of standards:
 ensures interoperable and cost-effective solutions
 opens up opportunities in new areas
 allows the market to reach its full potential
The more things are connected, the greater the security risk. So, security standards are also needed to protect
the individuals, businesses and governments which will use the IoT.
IoT and Cloud Computing
One component that improves the success of the Internet of Things is Cloud Computing. Cloud computing
enables users to perform computing tasks using services provided over the Internet. The use of the Internet
of Things in conjunction with cloud technologies has become a kind of catalyst: the Internet of Things and
cloud computing are now related to each other. These are true technologies of the future that will bring
many benefits.
Due to the rapid growth of technology, the problem of storing, processing, and accessing large amounts of
data has arisen. Great innovation relates to the mutual use of the Internet of Things and cloud technologies.
In combination, it will be possible to use powerful processing of sensory data streams and new monitoring
services. As an example, sensor data can be uploaded and saved using cloud computing for later use as
intelligent monitoring and activation using other devices. The goal is to transform data into insights and thus
drive cost-effective and productive action.
Benefits And Functions of IoT Cloud:
There are many benefits of combining these services –
1. IoT Cloud Computing provides many connectivity options, implying large network access. People use a
wide range of devices to gain access to cloud computing resources: mobile devices, tablets, laptops. This
is convenient for users but creates the problem of the need for network access points.
2. Developers can use IoT cloud computing on-demand. In other words, it is a web service accessed
without special permission or any help. The only requirement is Internet access.
3. Based on the request, users can scale the service according to their needs. Fast and flexible means you
can expand storage space, edit software settings, and work with the number of users. Due to this
characteristic, it is possible to provide deep computing power and storage.
4. Cloud Computing implies the pooling of resources. It influences increased collaboration and builds close
connections between users.
Downloaded by BENAZIR AE (arbenazir22@gmail.com)
lOMoARcPSD|37383633
5. As the number of IoT devices and automation in use grows, security concerns emerge. Cloud solutions
provide companies with reliable authentication and encryption protocols.
6. Finally, IoT cloud computing is convenient because you get exactly as much from the service as you
pay. This means that costs vary depending on use: the provider measures your usage statistics. A
growing network of objects with IP addresses is needed to connect to the Internet and exchange data
between the components of the network.
It is important to note that cloud architecture must be well-designed since reliability, security, economy, and
performance optimization depends upon it. Using well-designed CI/CD pipelines, structured services, and
sandboxed environments results in a secure environment and agile development.
Comparison of Internet of Things and Cloud Computing:
Cloud is a centralized system helping to transfer and deliver data and files to data centers over the Internet.
A variety of data and programs are easy to access from a centralized cloud system.
The Internet of Things refers to devices connected to the Internet. In the IoT, data is stored in real-time, as
well as historical data. The IoT can analyze and instruct devices to make effective decisions, as well as track
how certain actions function.
Cloud computing encompasses the delivery of data to data centers over the Internet. IBM divides cloud
computing into six different categories:
1. Platform as a Service (PaaS) –
The cloud contains everything you need to build and deliver cloud applications so there is no need to
maintain and buy equipment, software, etc.
2. Software as a Service (SaaS) –
In this case, applications run in the cloud and other companies operate devices that connect to users‘
computers through a web browser.
3. Infrastructure as a Service (IaaS) –
IaaS is an option providing companies with storage, servers, networks and hubs processing data for each
use.
4. Public cloud –
Companies manage spaces and provide users with quick access through the public network.
5. Private cloud –
The same as a public cloud, but only one person has access here, which can be an organization, an
individual company, or a user.
6. Hybrid cloud –
Based on a private cloud, but provides access to a public cloud.
What is a beacon?
A beacon is a small Bluetooth radio transmitter, powered by batteries. Beacons are similar to a
lighthouse in functionality. These small hardware devices incessantly transmit Bluetooth Low Energy
(BLE) signals. The Bluetooth enabled smartphones are capable of scanning and displaying these
signals.
Beacons could be deployed on store-fronts, real estate properties, amusement parks, events and other
public venues to broadcast contextually-relevant advertisements and notifications.
Downloaded by BENAZIR AE (arbenazir22@gmail.com)
lOMoARcPSD|37383633
What is a BLE beacon?
It is important to understand the difference between classic Bluetooth and Bluetooth Low Energy to
appreciate BLE beacons. Classic Bluetooth consumes high power and transmits to long ranges, which
is suited for Bluetooth headsets and speakers.
However, Bluetooth Low Energy transmits less data over a smaller range, hence consuming much less
power. BLE beacons transfers small amounts of data at regular intervals of time.
How does a Bluetooth beacon work?
To understand how beacons work let's take an example of a coffee shop with beacon deployment.
1. Let‘s assume, beacons are deployed at the entrance of a coffee shop
2. These beacons transmit signals in its range. The range of beacons vary from 20m to 300m.
(Know more about the range of Beaconstac beacons)
3. Smartphones in the range of beacons is itself indicating that the smartphones are nearby.
4. The smartphone then sends the ID number attached to the signal to the cloud server
5. The server responds with the action linked to the beacon ID. It could be a notification
introducing a new appetizer in the cafe, combo deals, video of coffee making or a feedback
form!
6. These notifications drive customers to a webpage, a form, a phone number or whatever you plan
to do.
Downloaded by BENAZIR AE (arbenazir22@gmail.com)
lOMoARcPSD|37383633
What is Bluetooth?
Bluetooth simply follows the principle of transmitting and receiving data using radio waves. It can be
paired with the other device which has also Bluetooth but it should be within the estimated
communication range to connect. When two devices start to share data, they form a network called piconet
which can further accommodate more than five devices.
Points to remember for Bluetooth:
 Bluetooth Transmission capacity 720 kbps.
 Bluetooth is Wireless.
 Bluetooth is a Low-cost short-distance radio communications standard.
 Bluetooth is robust and flexible.
 Bluetooth is cable replacement technology that can be used to connect almost any device to any other
device.
 The basic architecture unit of Bluetooth is a piconet.
Bluetooth Architecture:
The architecture of Bluetooth defines two types of networks:
1. Piconet
2. Scatternet
Piconet:
Piconet is a type of Bluetooth network that contains one primary node called the master node and seven
active secondary nodes called slave nodes. Thus, we can say that there is a total of 8 active nodes which
are present at a distance of 10 meters. The communication between the primary and secondary nodes can
be one-to-one or one-to-many. Possible communication is only between the master and slave; Slave-slave
communication is not possible. It also has 255 parked nodes, these are secondary nodes and cannot take
participation in communication unless it gets converted to the active state.
Scatternet:
It is formed by using various piconets. A slave that is present in one piconet can act as master or we can
say primary in another piconet. This kind of node can receive a message from a master in one piconet and
deliver the message to its slave in the other piconet where it is acting as a master. This type of node is
referred to as a bridge node. A station cannot be mastered in two piconets.
Downloaded by BENAZIR AE (arbenazir22@gmail.com)
lOMoARcPSD|37383633
Bluetooth protocol stack:
Types of Bluetooth
Various types of Bluetooth are available in the market nowadays. Let us look at them.
 In-Car Headset: One can make calls from the car speaker system without the use of mobile phones.
 Stereo Headset: To listen to music in car or in music players at home.
 Webcam: One can link the camera with the help of Bluetooth with their laptop or phone.
 Bluetooth-equipped Printer: The printer can be used when connected via Bluetooth with mobile phone
or laptop.
 Bluetooth Global Positioning System (GPS): To use GPS in cars, one can connect their phone with car
system via Bluetooth to fetch the directions of the address.
Advantage:
 It is a low-cost and easy-to-use device.
 It can also penetrate through walls.
 It creates an Ad-hoc connection immediately without any wires.
 It is used for voice and data transfer.
Disadvantages:
 It can be hacked and hence, less secure.
 It has a slow data transfer rate: of 3 Mbps.
 It has a small range: 10 meters.
 Bluetooth communication does not support routing.
 The issues of handoffs have not been addressed.
Applications:
 It can be used in laptops, and in wireless PCs, printers.
Downloaded by BENAZIR AE (arbenazir22@gmail.com)
lOMoARcPSD|37383633
 It can be used in wireless headsets, wireless PANs, and LANs.
 It can connect a digital camera wirelessly to a mobile phone.
 It can transfer data in terms of videos, songs, photographs, or files from one cell phone to another cell
phone or computer.
 It is used in the sectors of Medical health care, sports and fitness, Military.
UNIT III PROTOCOLS AND WIRELESS TECHNOLOGIES FOR IOT
PROTOCOLS:
NFC, SCADA and RFID, Zigbee MIPI, M-PHY, UniPro, SPMI, SPI, M-PCIe GSM, CDMA, LTE, GPRS,
small cell.
Wireless technologies for IoT:
WiFi (IEEE 802.11), Bluetooth/Bluetooth Smart, ZigBee/ZigBee Smart, UWB (IEEE 802.15.4),
6LoWPAN, Proprietary systems-Recent trends.
Near Field Communication (NFC)
NFC stands for Near Field Communication. It enables short range communication between compatible
devices. At least one transmitting device and another receiving device is needed to transmit the signal. Many
devices can use the NFC standard and are considered either passive or active.
So NFC devices can be classified into 2 types:
1. Passive NFC devices –
These include tags, and other small transmitters which can send information to other NFC devices
without the need for a power source of their own. These devices don‘t really process any information
sent from other sources, and can not connect to other passive components. These often take the form of
interactive signs on walls or advertisements.
2. Active NFC devices –
These devices are able to both the things i.e. send and receive data. They can communicate with each
other as well as with passive devices. Smartphones the best example of active NFC device. Card readers
in public transport and touch payment terminals are also good examples of the technology.
How does NFC work?
Like other wireless signals Bluetooth and WiFi, NFC works on the principle of sending information over
radio waves. Near Field Communication is another standard for wireless data transition which means
devices must adhere to certain specifications in order to communicate with each other properly. The
technology used in NFC is based on older technology which is the RFID (Radio-frequency identification)
that used electromagnetic induction in order to transmit information.
This creates one major difference between NFC and Bluetooth/WiFi. NFC can be used to induce electric
currents within passive components rather than just send data. This means that their own power supply is not
required by passive devices. Instead they can be powered by the electromagnetic field produced by an active
NFC component when it comes into range. NFC technology unfortunately does not command enough
inductance to charge our smartphones, but QI charging is based on the same principle.
The transmission frequency is 13.56 megahertz for data across NFC. Data can be sent at either 106, 212, or
424 kilobits per second which is quick enough for a range of data transfers like contact details to swapping
pictures and music.
The NFC standard currently has three distinct modes of operation to determine what sort of information will
be exchanged between devices.
1. The most common used in smartphones is the peer-to-peer mode. Exchange of various piece of
information is allowed between 2 devices. In this mode both devices switch between active when
sending data and passive when receiving.
Downloaded by BENAZIR AE (arbenazir22@gmail.com)
lOMoARcPSD|37383633
2. The second mode i.e. read/write mode is a one-way data transmission. The active device, possibly your
smartphone, links up with another device in order to read information from it. NFC advertisement tags
use this mode.
3. The third mode of operation is card emulation. The NFC device can function as a smart or contactless
credit card and make payments or tap into public transport systems.
Comparisons with Bluetooth –
There are several important technological differences between NFC and bluetooth but NFC has some
significant benefits in certain circumstances.
The major advantage of NFC over bluetooth is that it requires much less power consumption than Bluetooth.
This makes NFC perfect for passive devices, such as the advertising tags as they can operate without a major
power source.
But this power saving does have some major drawbacks. First and the foremost is that the range of
transmission of NFC is much shorter than Bluetooth which is a major drawback. NFC has a range of around
10 cm, just a few inches whereas Bluetooth connections can transmit data up to 10 meters or more from the
source. Another drawback is that NFC is quite a bit slower than Bluetooth. NFC can transmit data at a
maximum speed of just 424 kbit/s, whereas Bluetooth 2.1 can transmit 2.1 Mbit/s and with Bluetooth Low
Energy around 1 Mbit/s .
NFC has one another major advantage i.e. faster connectivity. It uses inductive coupling(i.e. the absence of
manual pairing) which takes less than one tenth of a second to establish a connection between two devices.
While modern Bluetooth connects pretty fast, NFC is still super handy for certain scenarios as mobile
payments.
Samsung Pay, Android Pay, and even Apple Pay use NFC technology though Samsung Pay works a bit
differently than the others. While Bluetooth works better for connecting devices together for file transfers,
sharing connections to speakers, and more, we anticipate that NFC will always have a place in this world
thanks to mobile payments — a quickly expanding technology.
SCADA: Supervisory Control and Data Acquisition
SCADA stands for Supervisory Control and Data Acquisition. It is a computer system designed to gather
and analyse real-time data. It is used to control and monitor the equipment and manufacturing processes in
various industries in different fields such as water and waste control, telecommunications, oil and gas
refining, power generation, and transportation. SCADA systems were used for the first time in the 1960s.
SCADA controls the functioning of equipment involved in manufacturing, production, fabrication,
development, and more. It is also used for infrastructural processes such as gas and oil distribution, electrical
power distribution, water distribution, and more. Thus, it has reduced human intervention to a great extent.
Furthermore, it is also used by industrial organizations to accomplish the followings tasks.
Downloaded by BENAZIR AE (arbenazir22@gmail.com)
lOMoARcPSD|37383633
o To control industrial processes locally as well as at remote locations
o To monitor, gather and process real-time data
o To interact with devices such as sensors, valves, motors, pumps, and more using human-machine
interface (HMI) software
o It comprises both software and hardware
It comprises both software and hardware, different industries have different requirements, so there may be
some differences in their SCADA systems, but still, some features are common for all, such as:
o Graphic interface
o Process mimic
o Real-time checking
o Alarm system
o Data acquisition
o Data analysis
o Report generator
How SCADA Systems Work:
Let us take an example of a leak on a pipeline. When a pipeline starts leaking, the SCADA system gathers
information and forwards it to a central site and thus alerts the home station about the leak. It also analyses
the situation, such as how big is the leak and how much water is being released.
A SCADA system can be very simple such as which are used to monitor the environmental conditions of a
small office building or complex or can be very advanced such as which are used to monitor the activity in a
nuclear power plant or the activity of a municipal water system.
Introduction of Radio Frequency Identification (RFID)
Radio Frequency Identification (RFID) is a form of wireless communication that incorporates the use of
electromagnetic or electrostatic coupling in the radio frequency portion of the electromagnetic spectrum to
uniquely identify an object, animal or person. It uses radio frequency to search ,identify, track and
communicate with items and people. it is a method that is used to track or identify an object by radio
transmission uses over the web. Data digitally encoded in an RFID tag which might be read by the reader.
This device work as a tag or label during which data read from tags that are stored in the database through
the reader as compared to traditional barcodes and QR codes. It is often read outside the road of sight either
passive or active RFID.
Downloaded by BENAZIR AE (arbenazir22@gmail.com)
lOMoARcPSD|37383633
Kinds of RFID :
There are many kinds of RFID, each with different properties, but perhaps the most fascinating aspect of
RFID technology is that most RFID tags have neither an electric plug nor a battery. Instead, all of the energy
needed to operate them is supplied in the form of radio waves by RFID readers. This technology is called
passive RFID to distinguish it from the(less common) active RFID in which there is a power source on the
tag.
UHF RHID ( Ultra-High Frequency RFID ). It is used on shipping pallets and some driver‘s licenses.
Readers send signals in the 902-928 MHz band. Tags communicate at distances of several meters by
changing the way they reflect the reader signals; the reader is able to pick up these reflections. This way of
operating is called backscatter.
HF RFID (High-Frequency RFID ). It operates at 13.56 MHz and is likely to be in your passport, credit
cards, books, and noncontact payment systems. HF RFID has a short-range, typically a meter or less because
the physical mechanism is based on induction rather than backscatter.
There are also other forms of RFID using other frequencies, such as LF RFID(Low-Frequency RFID),
which was developed before HF RFID and used for animal tracking
There are two types of RFID :
1. Passive RFID –
Passive RFID tags does not have thier own power source. It uses power from the reader. In this device,
RF tags are not attached by a power supply and passive RF tag stored their power. When it is emitted
from active antennas and the RF tag are used specific frequency like 125-134MHZ as low frequency,
13.56MHZ as a high frequency and 856MHZ to 960MHZ as ultra-high frequency.
2. Active RFID –
In this device, RF tags are attached by a power supply that emits a signal and there is an antenna which
receives the data. means, active tag uses a power source like battery. It has it‘s own power source, does
not require power from source/reader.
Working Principle of RFID :
Generally, RFID uses radio waves to perform AIDC function. AIDC stands for Automatic Identification and
Data Capture technology which performs object identification and collection and mapping of the data.
An antenna is an device which converts power into radio waves which are used for communication between
reader and tag. RFID readers retrieve the information from RFID tag which detects the tag and reads or
writes the data into the tag. It may include one processor, package, storage and transmitter and receiver unit.
Working of RFID System :
Every RFID system consists of three components: a scanning antenna, a transceiver and a transponder.
When the scanning antenna and transceiver are combined, they are referred to as an RFID reader or
interrogator. There are two types of RFID readers — fixed readers and mobile readers. The RFID reader is a
network-connected device that can be portable or permanently attached. It uses radio waves to transmit
signals that activate the tag. Once activated, the tag sends a wave back to the antenna, where it is translated
into data.
The transponder is in the RFID tag itself. The read range for RFID tags varies based on factors including the
type of tag, type of reader, RFID frequency and interference in the surrounding environment or from other
RFID tags and readers. Tags that have a stronger power source also have a longer read range.
Downloaded by BENAZIR AE (arbenazir22@gmail.com)
lOMoARcPSD|37383633
Features of RFID :
 An RFID tag consists of two-part which is an microcircuit and an antenna.
 This tag is covered by protective material which acts as a shield against the outer environment effect.
 This tag may active or passive in which we mainly and widely used passive RFID.
Application of RFID :
 It utilized in tracking shipping containers, trucks and railroad, cars.
 It uses in Asset tracking.
 It utilized in credit-card shaped for access application.
 It uses in Personnel tracking.
 Controlling access to restricted areas.
 It uses ID badging.
 Supply chain management.
 Counterfeit prevention (e.g., in the pharmaceutical industry).
Advantages of RFID :
 It provides data access and real-time information without taking to much time.
 RFID tags follow the instruction and store a large amount of information.
 The RFID system is non-line of sight nature of the technology.
 It improves the Efficiency, traceability of production.
 In RFID hundred of tags read in a short time.
Disadvantages of RFID :
 It takes longer to program RFID Devices.
 RFID intercepted easily even it is Encrypted.
 In an RFID system, there are two or three layers of ordinary household foil to dam the radio wave.
 There is privacy concern about RFID devices anybody can access information about anything.
 Active RFID can costlier due to battery.
What is ZigBee Protocol?
The ZigBee wireless technology is basically a openly available global standard to address the uniques needs
of low-power, low-cost wireless M2M(machine-to-machine) networks and also Internet-of-Things(IoT). It
operates on IEEE 802.15.4 physical radio specification and operates even in unlicensed band including 2.4
GHz, 900 MHz and 868 MHz.
Applications of ZigBee Technology
Because of its three major USPs of being low-cost, low-power consumption and having faster wireless
connectivity, the ZigBee protocol caters to a lot of applications like industrial automation, home automation,
smart metering, smart grids etc. Also with it low-power requirements, it ensures seamless operation of
various sensor equipments offering years of battery-life. Here are some of the areas where ZigBee is widely
used.
 Industrial Automation: ZigBee offers a faster and low-cost communication that can communicate with
almost all devices in factories and centralise them at one place making it easy for you to monitor every
process and thereby optimise the control process. ZigBee protocol also finds its presence in many medical
and scientific equipments such as personal chronic monitoring, sports and fitness trackers, and can even be
used for remote patient monitoring.
 Smart Metering and Smart Grid Monitoring: In case of smart metering, ZigBee is used for better energy
consumption response, security over power theft, pricing support etc. Additionally in case of smart grids,
ZigBee is even used for reactive power management, fault locations, remote temperature monitoring, etc.
 Home Automation: ZigBee is one of the most widely used protocol in most of the home automation
equipments. Right from offering lighting system solutions, sensor responsive solutions to security solutions
and surveillance, ZigBee has its presence everywhere.
Downloaded by BENAZIR AE (arbenazir22@gmail.com)
lOMoARcPSD|37383633
WhatisM-PHY?
M-PHY interface supports data rates greater than 5 Gbps. In M-PHY, clock signal is embedded with data
frame using 8b/10b encoding technique. It is optical friendly interface. It supports data transfer in two modes
viz. burst mode and continuous mode and supports both HS (High Speed)/LS (Low Speed) modes. Low
speed mode supports both PWM (Pulse Width Modulation) and NRZ (Non Return to Zero) signaling modes.
It supports large amplitude and small amplitude drive strengths. It supports two types of modules (Type-I
and Type-II).
As shown in the figure, M-PHY link consists of minimum two uni-directional lanes. Each lane consists of
M-TX module which communicates with M-RX module on another chip via two differential lines. The
differential lines carry both HS and LS signals.
Following are the features of M-PHY physical layer protocol developed by MIPI Alliance.
• Supports signaling speeds from 10 kbit/sec to 11.6 Gbit/sec per lane and supports 1-4 lanes
• Serial interface with embedded clock using 8b10b symbol encoding/decoding scheme
• M-PHY supports various states viz. LS burst, HS burst, STALL, HIBERN8 and SLEEP
• Supports Type-I and Type-II LS modes
BenefitsoradvantagesofM-PHYlayer
Following are the benefits or advantages of M-PHY layer:
➨It offers improved performance and effective power management.
➨It is robust against RF interference and generates low RF emission.
Downloaded by BENAZIR AE (arbenazir22@gmail.com)
lOMoARcPSD|37383633
➨For power saving, M-PHY uses low power modes, switchable termination and programmable low
amplitude.
➨It offers high speed greater than 5 Gbps with the help of differential signaling.
➨It requires fewer signal wires (i.e. fewer pins) as it uses 8b/10b encoding in which clock is embedded with
data.
➨It provides more bandwidth per pin in addition to improvement in power efficiency.
➨To support flexible bandwidth, M-PHY supports variable number of links/sub-links/data lanes.
WhatisUniproprotocol?
The UNIPRO specifications with versions 1.4, 1.41, 1.6, 1.8 and 2.0 are published by MIPI Alliance. It is
used with M-PHY with specifications 2.0, 3.0, 4.1 and 5.0. Uniport stack is used in wide range of
applications which include UFS (Universal Flash Storage) developed by JEDEC for mass storage devices,
Uniport-M (Unipro with M-PHY), Uniport-D (Unipro with D-PHY), CSI-3 (Camera Serial Interface-3) ,
DSI-2 (Display Serial Interface-2), GBT etc. UFS uses Unipro as link layer and M-PHY as physical layer.
The Unipro or Uniport-M target devices are smartphones, digital cameras, tablets, multimedia devices etc.
Following are the features of Unipro Interface developed by MIPI Alliance.
• Supports multiple physical layers within single network similar to TCP/IP.
• Unipro v2.0 uses M-PHY HS-G5. This increases bandwidth up to 23.32 Gbps per lane and per direction.
• Payload length has been increased from 272 to 1144 in Unipro L2 layer
• Latency is decreased by up to 8 ms in V2.0 compare to Unipro v1.8 specifications.
BenefitsoradvantagesofUnipro
Following are the benefits or advantages of Unipro:
➨It offers low power consumption due to introduction of six power modes and hibernation.
➨It is flexible in changing chip to chip lane routing based on traffic BW (Bandwidth) and latency
requirements. Number of lanes and operational speed of lanes can be scaled dynamically in Unipro.
➨It offers enhanced QoS with the help of CPort arbitration and data link layer pre-emption.
Downloaded by BENAZIR AE (arbenazir22@gmail.com)
lOMoARcPSD|37383633
➨It along with physical layer offers high speed data communication in gigabits per second, low pin count,
smaller silicon area, data reliability and congestion management.
➨Unipro supports various traffic classes both in real time or non real time.
➨It offers high performance and low EMI.
WhatisSPMIprotocol?
SPMI is the short form of System Power Management Interface. The specifications of SPMI are defined and
managed by MIPI Alliance. It is 2 wire bi-directional interface with lines SDATA and SCLK. It supports
multi-master and multi-slave configurations. In this protocol, Slaves work in two modes viz. request capable
and non-request capable. It monitors performance of the processor in given load condition and application of
usage. It also controls various supply voltages as per performance level requirements.
enefitsoradvantagesofSPMI
Following are the benefits or advantages of SPMI:
➨It replaces point to point topology with bus architecture. Hence it reduces pin counts of SoCs.
➨Multi master/slave feature allows chipset partitioning based on hardware complexity and load
distribution.
➨Use of ACK/NACK allows confirmity to correct completion of commands.
➨It offers high speed.
➨It offers low latency.
➨It offers real time control of voltage as well as frequency.
DrawbacksordisadvantagesofSPMI
Following are the drawbacks or disadvantages of SPMI:
➨SPMI v2.0 devices are not compatible with SPMI v1.0 devices.
Downloaded by BENAZIR AE (arbenazir22@gmail.com)
lOMoARcPSD|37383633
➨Like other serial communication interfaces, it is also affected by noise, reset issues, board layout and
minor differences in its implementations. This sometimes results into bus errors and system malfunctioning.
SPI Protocol
SPI stands for the Serial Peripheral Interface. It is a serial communication protocol that is used to connect
low-speed devices. It was developed by Motorola in the mid-1980 for inter-chip communication. It is
commonly used for communication with flash memory, sensors, real-time clock (RTC), analog-to-digital
converters, and more. It is a full-duplex synchronous serial communication, which means that data can be
simultaneously transmitted from both directions.
The main advantage of the SPI is to transfer the data without any interruption. Many bits can be sent or
received at a time in this protocol.
In this protocol, devices are communicated in the master-slave relationship. The master device controls the
slave device, and the slave device takes the instruction from the master device. The simplest configuration of
the Serial Peripheral Interface (SPI) is a combination of a single slave and a single master. But, one master
device can control multiple slave devices.
SPI Interface
The SPI protocol uses the four wires for the communication. There are shown in the figure.
1. MOSI: MOSI stands for Master Output Slave Input. It is used to send data from the master to the
slave.
2. MISO: MISO stands for Master Input Slave Output. It is used to send data from the slave to the
master.
3. SCK or SCLK (Serial Clock): It is used to the clock signal.
4. SS/CS (Slave Select / Chip Select): It is used by the master to send data by selecting a slave.
Advantages of SPI
1. The main advantage of the SPI is to transfer the data without any interruption.
2. It is simple hardware.
Downloaded by BENAZIR AE (arbenazir22@gmail.com)
lOMoARcPSD|37383633
3. It provides full-duplex communication.
4. There is no need for a unique address of the slave in this protocol.
5. This protocol does not require precise oscillation of slave devices because it uses the master's clock.
6. In this, software implementation is very simple.
7. It provides high transfer speed.
8. Signals are unidirectional.
9. It has separate lines of MISO and MOSI, so the data can be sent and received at the same time.
Disadvantages of SPI
1. Usually, it supports only one master.
2. It does not check the error like the UART.
3. It uses more pins than the other protocol.
4. It can be used only from a short distance.
5. It does not give any acknowledgment that the data is received or not.
Applications of SPI
o Memory: SD Card, MMC, EEPROM, and Flash.
o Sensors: Temperature and Pressure.
o Control Devices: ADC, DAC, digital POTS, and Audio Codec.
o Others: Camera Lens Mount, Touchscreen, LCD, RTC, video game controller, etc.
GSM - Protocol Stack
GSM architecture is a layered model that is designed to allow communications between two different
systems. The lower layers assure the services of the upper-layer protocols. Each layer passes suitable
notifications to ensure the transmitted data has been formatted, transmitted, and received accurately.
The GMS protocol stacks diagram is shown below −
Downloaded by BENAZIR AE (arbenazir22@gmail.com)
lOMoARcPSD|37383633
MS Protocols
Based on the interface, the GSM signaling protocol is assembled into three general layers −
 Layer 1 − The physical layer. It uses the channel structures over the air interface.
 Layer 2 − The data-link layer. Across the Um interface, the data-link layer is a modified version of
the Link access protocol for the D channel (LAP-D) protocol used in ISDN, called Link access
protocol on the Dm channel (LAP-Dm). Across the A interface, the Message Transfer Part (MTP),
Layer 2 of SS7 is used.
 Layer 3 − GSM signalling protocol‘s third layer is divided into three sublayers −
o Radio Resource Management (RR),
o Mobility Management (MM), and
o Connection Management (CM).
MS to BTS Protocols
The RR layer is the lower layer that manages a link, both radio and fixed, between the MS and the MSC. For
this formation, the main components involved are the MS, BSS, and MSC. The responsibility of the RR
layer is to manage the RR-session, the time when a mobile is in a dedicated mode, and the radio channels
including the allocation of dedicated channels.
The MM layer is stacked above the RR layer. It handles the functions that arise from the mobility of the
subscriber, as well as the authentication and security aspects. Location management is concerned with the
procedures that enable the system to know the current location of a powered-on MS so that incoming call
routing can be completed.
The CM layer is the topmost layer of the GSM protocol stack. This layer is responsible for Call Control,
Supplementary Service Management, and Short Message Service Management. Each of these services are
treated as individual layer within the CM layer. Other functions of the CC sublayer include call
establishment, selection of the type of service (including alternating between services during a call), and call
release.
BSC Protocols
The BSC uses a different set of protocols after receiving the data from the BTS. The Abis interface is used
between the BTS and BSC. At this level, the radio resources at the lower portion of Layer 3 are changed
from the RR to the Base Transceiver Station Management (BTSM). The BTS management layer is a relay
function at the BTS to the BSC.
The RR protocols are responsible for the allocation and reallocation of traffic channels between the MS and
the BTS. These services include controlling the initial access to the system, paging for MT calls, the
handover of calls between cell sites, power control, and call termination. The BSC still has some radio
resource management in place for the frequency coordination, frequency allocation, and the management of
the overall network layer for the Layer 2 interfaces.
To transit from the BSC to the MSC, the BSS mobile application part or the direct application part is used,
and SS7 protocols is applied by the relay, so that the MTP 1-3 can be used as the prime architecture.
MSC Protocols
At the MSC, starting from the BSC, the information is mapped across the A interface to the MTP Layers 1
through 3. Here, Base Station System Management Application Part (BSS MAP) is said to be the equivalent
set of radio resources. The relay process is finished by the layers that are stacked on top of Layer 3
protocols, they are BSS MAP/DTAP, MM, and CM. This completes the relay process. To find and connect
to the users across the network, MSCs interact using the control-signalling network. Location registers are
included in the MSC databases to assist in the role of determining how and whether connections are to be
made to roaming users.
Downloaded by BENAZIR AE (arbenazir22@gmail.com)
lOMoARcPSD|37383633
Each GSM MS user is given a HLR that in turn comprises of the user‘s location and subscribed services.
VLR is a separate register that is used to track the location of a user. When the users move out of the HLR
covered area, the VLR is notified by the MS to find the location of the user. The VLR in turn, with the help
of the control network, signals the HLR of the MS‘s new location. With the help of location information
contained in the user‘s HLR, the MT calls can be routed to the user.
Code Division Multiple Access (CDMA) – One channel carries all transmissions simultaneously. There
is neither division of bandwidth nor division of time. For example, if there are many people in a room all
speaking at the same time, then also perfect reception of data is possible if only two person speak the
same language. Similarly, data from different stations can be transmitted simultaneously in different code
languages.
LTE Overview
LTE stands for Long Term Evolution and it was started as a project in 2004 by telecommunication body
known as the Third Generation Partnership Project (3GPP). SAE (System Architecture Evolution) is the
corresponding evolution of the GPRS/3G packet core network evolution. The term LTE is typically used to
represent both LTE and SAE.
LTE evolved from an earlier 3GPP system known as the Universal Mobile Telecommunication System
(UMTS), which in turn evolved from the Global System for Mobile Communications (GSM). Even related
specifications were formally known as the evolved UMTS terrestrial radio access (E-UTRA) and evolved
UMTS terrestrial radio access network (E-UTRAN). First version of LTE was documented in Release 8 of
the 3GPP specifications.
A rapid increase of mobile data usage and emergence of new applications such as MMOG (Multimedia
Online Gaming), mobile TV, Web 2.0, streaming contents have motivated the 3rd Generation Partnership
Project (3GPP) to work on the Long-Term Evolution (LTE) on the way towards fourth-generation mobile.
The main goal of LTE is to provide a high data rate, low latency and packet optimized radioaccess
technology supporting flexible bandwidth deployments. Same time its network architecture has been
designed with the goal to support packet-switched traffic with seamless mobility and great quality of service.
LTE Evolution
Year Event
Mar 2000 Release 99 - UMTS/WCDMA
Mar 2002 Rel 5 - HSDPA
Mar 2005 Rel 6 - HSUPA
Year 2007 Rel 7 - DL MIMO, IMS (IP Multimedia Subsystem)
November 2004 Work started on LTE specification
January 2008 Spec finalized and approved with Release 8
2010 Targeted first deployment
Downloaded by BENAZIR AE (arbenazir22@gmail.com)
lOMoARcPSD|37383633
Facts about LTE
 LTE is the successor technology not only of UMTS but also of CDMA 2000.
 LTE is important because it will bring up to 50 times performance improvement and much better
spectral efficiency to cellular networks.
 LTE introduced to get higher data rates, 300Mbps peak downlink and 75 Mbps peak uplink. In a
20MHz carrier, data rates beyond 300Mbps can be achieved under very good signal conditions.
 LTE is an ideal technology to support high date rates for the services such as voice over IP (VOIP),
streaming multimedia, videoconferencing or even a high-speed cellular modem.
 LTE uses both Time Division Duplex (TDD) and Frequency Division Duplex (FDD) mode. In FDD
uplink and downlink transmission used different frequency, while in TDD both uplink and downlink
use the same carrier and are separated in Time.
 LTE supports flexible carrier bandwidths, from 1.4 MHz up to 20 MHz as well as both FDD and
TDD. LTE designed with a scalable carrier bandwidth from 1.4 MHz up to 20 MHz which bandwidth
is used depends on the frequency band and the amount of spectrum available with a network operator.
 All LTE devices have to support (MIMO) Multiple Input Multiple Output transmissions, which allow
the base station to transmit several data streams over the same carrier simultaneously.
 All interfaces between network nodes in LTE are now IP based, including the backhaul connection to
the radio base stations. This is great simplification compared to earlier technologies that were initially
based on E1/T1, ATM and frame relay links, with most of them being narrowband and expensive.
 Quality of Service (QoS) mechanism have been standardized on all interfaces to ensure that the
requirement of voice calls for a constant delay and bandwidth, can still be met when capacity limits
are reached.
 Works with GSM/EDGE/UMTS systems utilizing existing 2G and 3G spectrum and new spectrum.
Supports hand-over and roaming to existing mobile networks.
Advantages of LTE
 High throughput: High data rates can be achieved in both downlink as well as uplink. This causes
high throughput.
 Low latency: Time required to connect to the network is in range of a few hundred milliseconds and
power saving states can now be entered and exited very quickly.
 FDD and TDD in the same platform: Frequency Division Duplex (FDD) and Time Division
Duplex (TDD), both schemes can be used on same platform.
 Superior end-user experience: Optimized signaling for connection establishment and other air
interface and mobility management procedures have further improved the user experience. Reduced
latency (to 10 ms) for better user experience.
 Seamless Connection: LTE will also support seamless connection to existing networks such as
GSM, CDMA and WCDMA.
 Plug and play: The user does not have to manually install drivers for the device. Instead system
automatically recognizes the device, loads new drivers for the hardware if needed, and begins to work
with the newly connected device.
 Simple architecture: Because of Simple architecture low operating expenditure (OPEX).
LTE - QoS
LTE architecture supports hard QoS, with end-to-end quality of service and guaranteed bit rate (GBR) for
radio bearers. Just as Ethernet and the internet have different types of QoS, for example, various levels of
QoS can be applied to LTE traffic for different applications. Because the LTE MAC is fully scheduled, QoS
is a natural fit.
Evolved Packet System (EPS) bearers provide one-to-one correspondence with RLC radio bearers and
provide support for Traffic Flow Templates (TFT). There are four types of EPS bearers:
 GBR Bearer resources permanently allocated by admission control
 Non-GBR Bearer no admission control
Downloaded by BENAZIR AE (arbenazir22@gmail.com)
lOMoARcPSD|37383633
 Dedicated Bearer associated with specific TFT (GBR or non-GBR)
 Default Bearer Non GBR, catch-all for unassigned traffic
GPRS - Overview
General Packet Radio System is also known as GPRS is a third-generation step toward internet access.
GPRS is also known as GSM-IP that is a Global-System Mobile Communications Internet Protocol as it
keeps the users of this system online, allows to make voice calls, and access internet on-the-go. Even Time-
Division Multiple Access (TDMA) users benefit from this system as it provides packet radio access.
GPRS also permits the network operators to execute an Internet Protocol (IP) based core architecture for
integrated voice and data applications that will continue to be used and expanded for 3G services.
GPRS supersedes the wired connections, as this system has simplified access to the packet data networks
like the internet. The packet radio principle is employed by GPRS to transport user data packets in a
structure way between GSM mobile stations and external packet data networks. These packets can be
directly routed to the packet switched networks from the GPRS mobile stations.
In the current versions of GPRS, networks based on the Internet Protocol (IP) like the global internet or
private/corporate intranets and X.25 networks are supported.
Who owns GPRS ?
The GPRS specifications are written by the European Telecommunications Standard Institute (ETSI), the
European counterpart of the American National Standard Institute (ANSI).
Key Features
Following three key features describe wireless packet data:
 The always online feature - Removes the dial-up process, making applications only one click away.
 An upgrade to existing systems - Operators do not have to replace their equipment; rather, GPRS is
added on top of the existing infrastructure.
 An integral part of future 3G systems - GPRS is the packet data core network for 3G systems
EDGE and WCDMA.
Goals of GPRS
GPRS is the first step toward an end-to-end wireless infrastructure and has the following goals:
 Open architecture
 Consistent IP services
 Same infrastructure for different air interfaces
 Integrated telephony and Internet infrastructure
 Leverage industry investment in IP
 Service innovation independent of infrastructure
Benefits of GPRS
Higher Data Rate
GPRS benefits the users in many ways, one of which is higher data rates in turn of shorter access times. In
the typical GSM mobile, setup alone is a lengthy process and equally, rates for data permission are
restrained to 9.6 kbit/s. The session establishment time offered while GPRS is in practice is lower than one
second and ISDN-line data rates are up to many 10 kbit/s.
Downloaded by BENAZIR AE (arbenazir22@gmail.com)
lOMoARcPSD|37383633
Easy Billing
GPRS packet transmission offers a more user-friendly billing than that offered by circuit switched services.
In circuit switched services, billing is based on the duration of the connection. This is unsuitable for
applications with bursty traffic. The user must pay for the entire airtime, even for idle periods when no
packets are sent (e.g., when the user reads a Web page).
In contrast to this, with packet switched services, billing can be based on the amount of transmitted data.
The advantage for the user is that he or she can be "online" over a long period of time but will be billed
based on the transmitted data volume.
What is a small cell?
A small cell is a low-cost radio access point with low radio frequency (RF) power output, footprint
and range. It can be deployed indoors or outdoors, and in licensed, shared or unlicensed spectrum.
Small cells deliver high-quality, secure cellular coverage indoors and out, complementing the macro
network to improve coverage, add targeted capacity, and support new services and user experiences. There
are various types of small cell, with varying ranges, power levels and form factors, according to use case.
The smallest units are for indoor residential use; the largest are urban or rural outdoor picocells.
In the 5G Era, small cells will be deployed in a far wider range of scenarios than in the past, and the form
factors and architectures will be extremely varied. A recent SCF work item provides concise definitions of
5G small cells and the small cell network architecture and product types.
What are IEEE 802.11 networks?
IEEE 802.11 standard, popularly known as WiFi, lays down the architecture and specifications of wireless
LANs (WLANs). WiFi or WLAN uses high-frequency radio waves instead of cables for connecting the
devices in LAN. Users connected by WLANs can move around within the area of network coverage.
IEEE 802.11 Architecture
The components of an IEEE 802.11 architecture are as follows −
 Stations (STA) − Stations comprises of all devices and equipment that are connected to the wireless
LAN. A station can be of two types−
o Wireless Access Point (WAP) − WAPs or simply access points (AP) are generally wireless
routers that form the base stations or access.
o Client. Clients are workstations, computers, laptops, printers, smartphones, etc.
 Each station has a wireless network interface controller.
 Basic Service Set (BSS) − A basic service set is a group of stations communicating at the physical
layer level. BSS can be of two categories depending upon the mode of operation−
o Infrastructure BSS − Here, the devices communicate with other devices through access points.
o Independent BSS − Here, the devices communicate in a peer-to-peer basis in an ad hoc
manner.
 Extended Service Set (ESS) − It is a set of all connected BSS.
 Distribution System (DS) − It connects access points in ESS.
Downloaded by BENAZIR AE (arbenazir22@gmail.com)
lOMoARcPSD|37383633
Frame Format of IEEE 802.11
The main fields of a frame of wireless LANs as laid down by IEEE 802.11 are −
 Frame Control − It is a 2 bytes starting field composed of 11 subfields. It contains control
information of the frame.
 Duration − It is a 2-byte field that specifies the time period for which the frame and its
acknowledgment occupy the channel.
 Address fields − There are three 6-byte address fields containing addresses of source, immediate
destination, and final endpoint respectively.
 Sequence − It a 2 bytes field that stores the frame numbers.
 Data − This is a variable-sized field that carries the data from the upper layers. The maximum size of
the data field is 2312 bytes.
 Check Sequence − It is a 4-byte field containing error detection information.
What Is UWB?
Ultra-wideband (UWB) is a short-range wireless communication protocol—like Wi-Fi or Bluetooth—uses
radio waves of short pulses over a spectrum of frequencies ranging from 3.1 to 10.5 GHz in unlicensed
applications.
The term UWB is used for a bandwidth (BW) that is larger or equal to 500 MHz or a fractional bandwidth
(FBW) greater than 20% where FBW = BW/fc, where fc is the center frequency.
Downloaded by BENAZIR AE (arbenazir22@gmail.com)
lOMoARcPSD|37383633
The Advantages of Ultra-Wideband Technology
The very wide bandwidth of UWB signals enables superior indoor performance over traditional narrow-
band systems.
Some of this bandwidth's features are highlighted below:
 The wide bandwidth provides immunity against the channel effect in a dense environment and enables
very fine time-space resolutions for highly accurate indoor positioning of the UWB nodes, e.g., the new
iPhone 11.
 The low spectral density, below environmental noise, ensures a low probability of signal detection and
increases the security of communication.
 High data rates can be transmitted over a short distance using UWB.
 UWB systems can co-exist with already-deployed narrowband systems.
UWB Transmission
Two different approaches are adopted for data transmission:
 Ultra-short pulses in the picosecond range, which covers all frequencies simultaneously (also called
impulse radios)
 Subdividing the total UWB bandwidth into a set of broadband Orthogonal Frequency Division
Multiplexing (OFDM) channels
What is 6LoWPAN?
6LoWPAN is an IPv6 protocol, and It‘s extended from is IPv6 over Low Power Personal Area Network. As
the name itself explains the meaning of this protocol is that this protocol works on Wireless Personal Area
Network i.e., WPAN.
WPAN is a Personal Area Network (PAN) where the interconnected devices are centered around a person‘s
workspace and connected through a wireless medium. You can read more about WPAN at WPAN.
6LoWPAN allows communication using the IPv6 protocol. IPv6 is Internet Protocol Version 6 is a network
layer protocol that allows communication to take place over the network. It is faster and more reliable and
provides a large number of addresses.
6LoWPAN initially came into existence to overcome the conventional methodologies that were adapted to
transmit information. But still, it is not so efficient as it only allows for the smaller devices with very limited
processing ability to establish communication using one of the Internet Protocols, i.e., IPv6. It has very low
cost, short-range, low memory usage, and low bit rate.
It comprises an Edge Router and Sensor Nodes. Even the smallest of the IoT devices can now be part of the
network, and the information can be transmitted to the outside world as well. For example, LED Streetlights.
Downloaded by BENAZIR AE (arbenazir22@gmail.com)
lOMoARcPSD|37383633
 It is a technology that makes the individual nodes IP enabled.
 6LoWPAN can interact with 802.15.4 devices and also other types of devices on an IP Network. For
example, Wi-Fi.
 It uses AES 128 link layer security, which AES is a block cipher having key size of 128/192/256 bits and
encrypts data in blocks of 128 bits each. This is defined in IEEE 802.15.4 and provides link
authentication and encryption.
Basic Requirements of 6LoWPAN:
1. The device should be having sleep mode in order to support the battery saving.
2. Minimal memory requirement.
3. Routing overhead should be lowered.
Features of 6LoWPAN:
1. It is used with IEEE 802.15,.4 in the 2.4 GHz band.
2. Outdoor range: ~200 m (maximum)
3. Data rate: 200kbps (maximum)
4. Maximum number of nodes: ~100
Advantages of 6LoWPAN:
1. 6LoWPAN is a mesh network that is robust, scalable, and can heal on its own.
2. It delivers low-cost and secure communication in IoT devices.
3. It uses IPv6 protocol and so it can be directly routed to cloud platforms.
4. It offers one-to-many and many-to-one routing.
5. In the network, leaf nodes can be in sleep mode for a longer duration of time.
Disadvantages of 6LoWPAN:
1. It is comparatively less secure than Zigbee.
2. It has lesser immunity to interference than that Wi-Fi and Bluetooth.
3. Without the mesh topology, it supports a short range.
Applications of 6LoWPAN:
1. It is a wireless sensor network.
2. It is used in home-automation,
3. It is used in smart agricultural techniques, and industrial monitoring.
Security and Interoperability with 6LoWPAN:
 Security: 6LoWPAN security is ensured by the AES algorithm, which is a link layer security, and the
transport layer security mechanisms are included as well.
 Interoperability: 6LoWPAN is able to operate with other wireless devices as well which makes it
interoperable in a network.
What Is Proprietary Technology?
Downloaded by BENAZIR AE (arbenazir22@gmail.com)
lOMoARcPSD|37383633
Proprietary technology is any combination of processes, tools, or systems of interrelated connections that
are the property of a business or individual. These combinations provide a benefit or competitive advantage
to the owners of proprietary technologies.
Companies capable of developing useful proprietary technologies in-house are rewarded with a valuable
asset and can either use it exclusively or profit from the sale of licensing their technology to other parties.
UNIT IV IOT PROCESSORS
Services/Attributes: Big-Data Analytics for IOT, Dependability,Interoperability, Security, Maintainability.
Embedded processors for IOT :Introduction to Python programming -Building IOT with RASPERRY PI
and Arduino. 26
Role of Big Data in IoT
Companies make use of IoT devices to collect data. Since the data stored by IoT devices are in unstructured
form, Big Data processes this collected data on a real-time basis and also stores them using several storage
technologies. Therefore, the need to get big data in IoT is compelling.
IoT big data processing occurs in four sequential steps
1. A Group of unstructured data is generated by IoT devices and stored in the big data system.
2. A big data system is a shared distributed database where a huge amount of data is stored.
3. Stored data is analyzed using analytic tools like Hadoop MapReduce or Spark
4. Then, Generate the reports of analyzed data.
How Do IoT and Big Data Impact Each Other?
IoT and Big Data carry an inter-dependency relationship and hugely impact each other. As IoT grows, it
gives rise to the demand for big data capabilities. An increase in the amount of data every day requires more
advanced and innovative storage solutions resulting in updating an organization‘s big data storage
infrastructure.
Big data and IoT have a closely knitted future. It is evident that the two fields will generate new solutions
and opportunities that will have a long-lasting impact.
How are IoT and Big Data Together Beneficial for Companies?
IoT and Big Data help companies in different sectors to make efficient and well-informed decisions and thus
offer better services/products. IoT with Big data helps companies to
 Examine data
 Reveal data trends
 Find unseen data patterns
 Find hidden data correlations
 Reveal new information
Helps to increase the ROI for the companies
IoT in Big Data analytics helps businesses to extract information to get better business insights. Better
business insights help in taking better decisions that result in high ROI. Due to an increase in demand for
data storage, companies are switching to big data cloud storage which lowers the implementation cost.
Downloaded by BENAZIR AE (arbenazir22@gmail.com)
lOMoARcPSD|37383633
Reshapes the future of the e-health system
The features of Big Data in IoT are reshaping the upcoming generation of the e-health care system and
developing an innovative solution in the healthcare field. Big data will now lead to data-driven research
instead of hypothesis-driven research. IoT will control and analyze the connection between sensors and
existing big data.
Revolution in Manufacturing Companies
In manufacturing companies, due to improper working of equipment and machines, they may end up
producing fewer products as they used to do earlier. Installing IoT sensors in the equipment can collect
operation data on the machine.
This data will help to find out which equipment is working properly and which requires repair. Hence, a
business will never fall short of products.
Benefits in the Transportation Industry
Installing IoT sensors in vehicles provide data regarding fuel efficiency, tracking the location of the vehicle,
delivery routes, and other information that helps in improving organizational productivity.
Weather Forecast
With the help of IoT, we can collect big data from weather and satellites to know about the amount of wind
and sunlight we can expect within a particular time period. Due to these predictive analytics and machine
learning advances, we are capable of predicting weather conditions and taking actions according to that to
meet the demand.
Facilitate the Energy Revolution
For grid operators, intelligent sensors constantly check the temperature of underground cables which helps
in taking immediate countermeasures if the cable temperature rises up.
Big data is used to generate findings of power grid components such as input-output curves of transformers
that help companies to take action at the right time and prevent load intervention in the power grid.
In this section, we will discuss in-depth how these distinct components help in the functioning of the IoT
system.
 Sensors/Devices
The sensors or devices collect the data from the environment they are present in. For eg, reading the
temperature, analyzing location, etc.
 Connectivity
After collecting the data, we need to transfer it for processing, so how to transfer it? The sensor/device can
be connected to the cloud through various methods - satellite, WiFi, Bluetooth, direct connection to the
internet or ethernet, etc. We can choose any of these methods to transfer the data to the cloud.
 Data Processing
Downloaded by BENAZIR AE (arbenazir22@gmail.com)
lOMoARcPSD|37383633
Once the data is loaded on the cloud, the software processes it to get the required insights. If the data is
favorable or it is as per expectation then nothing to worry about. But what if not? Here is, when the user
interface comes.
 User Interface
After looking at the data insights, a user can react if it is not going as expected. For eg, if you are monitoring
the room temperature from a far location and it is too high as per requirement, then you can maintain it
through some apps or trigger some warnings in the home.
Introduction of Embedded Systems | Set-1
Before going to the overview of Embedded Systems, Let‘s first know the two basic things i.e embedded and
system, and what actually do they mean.
System is a set of interrelated parts/components which are designed/developed to perform common tasks or
to do some specific work for which it has been created.
Embedded means including something with anything for a reason. Or simply we can say something which is
integrated or attached to another thing. Now after getting what actual systems and embedded mean we can
easily understand what are Embedded Systems.
Embedded System is an integrated system that is formed as a combination of computer hardware and
software for a specific function. It can be said as a dedicated computer system has been developed for some
particular reason. But it is not our traditional computer system or general-purpose computers, these are the
Embedded systems that may work independently or attached to a larger system to work on a few specific
functions. These embedded systems can work without human intervention or with little human intervention.
Three main components of Embedded systems are:
1. Hardware
2. Software
3. Firmware
Some examples of embedded systems:
 Digital watches
 Washing Machine
 Toys
 Televisions
 Digital phones
 Laser Printer
 Cameras
 Industrial machines
 Electronic Calculators
 Automobiles
 Medical Equipment
Application areas of Embedded System:
Mostly Embedded systems are present everywhere. We use it in our everyday life unknowingly as in most
cases it is integrated into the larger systems. So, here are some of the application areas of Embedded
systems:
 Home appliances
 Transportation
 Health care
 Business sector & offices
Downloaded by BENAZIR AE (arbenazir22@gmail.com)
lOMoARcPSD|37383633
 Defense sector
 Aerospace
 Agricultural Sector
Important Characteristics of an Embedded System:
1. Performs specific task: Embedded systems perform some specific function or tasks.
2. Low Cost: The price of an embedded system is not so expensive.
3. Time Specific: It performs the tasks within a certain time frame.
4. Low Power: Embedded Systems don‘t require much power to operate.
5. High Efficiency: The efficiency level of embedded systems is so high.
6. Minimal User interface: These systems require less user interface and are easy to use.
7. Less Human intervention: Embedded systems require no human intervention or very less human
intervention.
8. Highly Stable: Embedded systems do not change frequently mostly fixed maintaining stability.
9. High Reliability: Embedded systems are reliable they perform tasks consistently well.
10. Use microprocessors or microcontrollers: Embedded systems use microprocessors or microcontrollers
to design and use limited memory.
11. Manufacturable: The majority of embedded systems are compact and affordable to manufacture. They
are based on the size and low complexity of the hardware.
Block Structure Diagram of Embedded System:
Embedded System
Advantages of Embedded System:
 Small size.
 Enhanced real-time performance.
 Easily customizable for a specific application.
Downloaded by BENAZIR AE (arbenazir22@gmail.com)
lOMoARcPSD|37383633
Disadvantages of Embedded System:
 High development cost.
 Time-consuming design process.
 As it is application-specific less market available.
Python programming powers intuitive interfaces of intelligent and effective Internet of Things (IoT) systems
that are paramount in remote sensor networks, big data and data analysis, automation, and machine learning.
IoT applications function efficiently with the help of Python libraries/packages which include:
NUMPY
Numpy is a scientific computing package that helps to create datasets to test with the time series data in
IoT. Numpy features are used in IoT to read sensor bulk data from the database inbuilt functions in the
system
SOCKETS AND MYSQLDB
Sockets that facilitate networking in IoT devices include TCP/IP and UDP, which are compatible to work
with Python packages. TCP/IP and UDP act as transport layer protocols for communication. The MySQLdb
is a go-to relational format database that helps in the development of remote stores for the IoT system.
MATPLOTLIB
To get data insights, matplotlib visualizes the most paramount operations by giving a variety of graphs to
represent the data.
REQUESTS, TKINTER AND TENSORFLOW
To make HTTP calls and parse responses in Python, the request package acts as a major protocol for data
exchanges. Tkinter GUI puts the aspects of Python script in a controlled distribution, which enables
functional testing and repeated executions in IoT Python devices. Therefore, the numerical computations of
machine learning initiated into the IoT systems utilize the representation in data flow graphs dealing with
huge non-linear datasets and deep learning aspects.
IOT DEVICES USED TO DEVELOP APPLICATIONS IN IOT
 Raspberry Pi Model 3
 Intel Edison
 Arduino
IOT SENSORS SIMULATORS USED IN PYTHON PROGRAMMING INCLUDE:
MQ TELEMETRY TRANSPORT (MQTT) SENSOR SIMULATOR
MQTT protocol for the IoT in Python enables high-speed data exchange with low payload communication
between the devices. User-friendly requests of MQTT are made directly in Python. Data is collected in real-
time and easily analyzed in mathematical computation libraries like matplotlib. The diagram below shows
the steps used for the data flow:
Downloaded by BENAZIR AE (arbenazir22@gmail.com)
lOMoARcPSD|37383633
Data logging using MQTT (install using pip install paho-mqtt) Python is displayed below:
import paho.mqtt.client as mqtt
#Callback
for received data from server
def on_connect(data_iot, user, events):
print(―connected with code‖ + str(events))
data = mqtt.Client()
Data.on_connect = on_connect
Data.on_message = on_message
data.loop_forever()
IoT using Raspberry Pi
IoT using raspberry pi mainly include what is an IoT, Raspberry pi, IOT design methodology, etc.
What is the Internet of Things?
The Internet of Things (IoT) is a scenario in which objects, animals or people are provided with single
identifiers and the capability to automatically transfer and the capability to automatically transfer data more
to a network without requiring human-to-human or human-to-computer communication. IoT has evolved
from the meeting of wireless technologies, micro-electromechanical systems (MEMS) and the internet.
Internet of Things
Downloaded by BENAZIR AE (arbenazir22@gmail.com)
lOMoARcPSD|37383633
IoT Design Methodology
All web application is developed natively in Java Programming Language. It includes java technologies
similar to JSP, servlets, hibernate, and web services, etc., the latest version of net beans IDE is basically
used for web application development. Additional technologies like bootstrap, javascript, jQuery, etc are
used to handle UI and client-side validations. Cisco provided APIs are used to develop application related to
Cisco IP phones.
IOT uisng Raspberry Pi
Five steps are used in web applications
 Installing Apache Webserver
 Create a My SQL database system
 Developed web application For the GUI (Graphical User Interface)
 Write lots of PHP, JAVA script, CSS and Python Programs for the Web Application
 Host Web application on our Web server
Raspberry Pi
The history of the Raspberry Pi was basically introduced in 2006. Its main concept is based on Atmel
ATmega644 which is particularly designed for educational use and intended for Python. A Raspberry Pi is
of small size i.e., of a credit-card-sized single-board computer, which is developed in the United
Kingdom(U.K) by a foundation called Raspberry Pi. The main motto of this foundation is to promote the
teaching of basic computer science in the education institutes and also in developing countries. The first
generation of Raspberry (Pi 1) was released in the year 2012, which has two types of models namely model
A and model B.
Raspberry Pi
In the subsequent year, A+ and B+ models were released. Again in 2015, Raspberry Pi2 model B was
released and an immediate year Raspberry Pi3 model B was released in the market.
Raspberry Pi can be plugged into a TV, computer monitor, and it uses a standard keyboard and mouse. It is
user-friendly as it can be handled by all the age groups. It does everything you would expect a desktop
computer to do like word-processing, browsing the internet spreadsheets, playing games to playing high
Downloaded by BENAZIR AE (arbenazir22@gmail.com)
lOMoARcPSD|37383633
definition videos. It is used in many applications like in a wide array of digital maker projects, music
machines, parent detectors to the weather station and tweeting birdhouses with infrared cameras.
All models feature on a Broadcom system on a chip (SOC), which includes chip graphics processing unit
GPU(a Video Core IV), an ARM-compatible and CPU. The CPU speed ranges from 700 MHz to 1.2 GHz
for the Pi 3 and onboard memory range from 256 MB to 1 GB RAM. An operating system is stored in the
secured digital SD cards and program memory in either the MicroSDHC or SDHC sizes. Most boards have
one to four USB slots, composite video output, HDMI and a 3.5 mm phone jack for audio. Some models
have WiFi and Bluetooth.
The Raspberry Pi Foundation provides Arch Linux ARM and Debian distributions for download, and
promotes Python as the main programming language, with support for BBC BASIC, Java, C, Perl, Ruby,
PHP, Squeak Smalltalk, C++, etc.
The following are essential to get started
 Video cable to suit the TV or monitor used
 SD card containing Linux Operating system
 Power supply (see Section 1.6 below)
 USB keyboard
 TV or monitor (with DVI, HDMI, Composite or SCART input)
Recommended optional extras include
 Internet connection, Model B only: LAN (Ethernet) cable
 USB mouse
 Powered USB hub
 Internet connection, Model A or B: USB WiFi adaptor
What is a System on Chip?
A system on chip is a complex IC that integrates the functional elements into a single chip or chipset. It is a
programmable processor on a chip memory, accelerating function hardware, software, hardware, and analog
components.
System on Chip
Benefits of SoC
 Lower power consumption
 Reduces size
 Reduces overall system cost
Downloaded by BENAZIR AE (arbenazir22@gmail.com)
lOMoARcPSD|37383633
 Increases performance
Internet Gateway Device
Internet Gateway Device has the ability to route data approaching from the WSN network to the internet and
Send data coming from the internet to the WSN network. It is like a Wi-Fi router for the Internet of Things.
In the internet gateway device, we use raspberry pi model B, it features a quad-core ARM Cortex- A7 CPU
is running at 900MHz (for a 6x presentation improve on the first generation Raspberry Pi Model B+) and
1GB of LPDDR2 SDRAM (for a 2x memory increase). And yes, there is total compatibility with Raspberry
Pi1 we are secured. Broadcom‘s new SoC, the BCM2836, is the key factor.
Five steps we are using Internet Gateway Device
 Port Linux operating system on Raspberry Pi
 Modify Linux to work with Our Prototype
 Developed Python Library for Communication of RPI with Xbee ZB
 Wrote Program from sensors and Device controlling
 Create WI-FI functionality on RPI for Internet Connection
WSN Nodes
A wireless sensor network (WSN) consists of three main components: nodes, gateways, and software. The
spatially dispersed measurement nodes interface with the sensors to monitor assets or their surroundings.
The acquired information is wirelessly transmitted to the gateway, which provides a connection to the wired
globe where you can collect, procedure, analyze, and present your measurement information using the
software. Routers are an individual type of dimension node that you can use to expand the distance and
dependability in a WSN. Sensors can be dispersed on the roads, vehicles, hospitals, buildings, people and
allow dissimilar applications such as medical services, battlefield operations, disaster response, disaster
relief, and environmental monitoring.
IoT Applications
 Weather security and temperature cam
 The working doctor who props with raspberry pi
 Sensually an air quality monitoring hat
 Beer and wine fridge of awesomeness
 Raspberry pi Internet doorbell
 Internet of things toilet
 Train your rat behavioral science at home
 Pebbly smart doorbell
 The raspberry pi microwave
This is all about IoT using Raspberry Pi. Currently, IoT is made up of a loose collection of different,
purpose-built networks. Today‘s cars, intended, for example, have multiple networks to control engine
function, safety features, communication systems, and so on. Commercial and residential buildings also
have various control systems for heating, venting, and air condition (HVAC), telephone service, security,
and lighting.
As IoT evolves, these networks and a lot of others will be connected with additional security, analytics, and
management capabilities. This will allow IoT to become even more powerful in what it can help people
achieve. Furthermore, any queries regarding this concept or electrical and electronics projects, please give
your valuable suggestions by commenting in the comment section below.
Photo Credits:
 System on Chip directindustry
 IOT goodworklabs
Downloaded by BENAZIR AE (arbenazir22@gmail.com)
lOMoARcPSD|37383633
Introduction
Connected devices around the world are increasing by billions every year. The Arduino IoT Cloud is a
platform that allows anyone to create IoT projects, with a user friendly interface, and an all in one
solution for configuration, writing code, uploading and visualization.
In this article, we will take a look at some different components of the Arduino IoT Cloud, and provide a
general overview.
But if you‘re itching to get started and explore the Arduino IoT Cloud yourself, that is also perfectly fine!
You can always come back here for more information!
 Go to Arduino IoT Cloud
IoT Cloud Documentation
The Arduino IoT Cloud has several pages of documentation available. Below you will find a list of some
popular pages:
 To find all tutorials & articles, visit the Arduino IoT Cloud Documentation page.
 For a technical overview, list of features, and API guide, visit the Arduino IoT Cloud Cheat
Sheet.
 For API & SDK Documentation, visit the developer reference at Arduino IoT Cloud API.
Features
Below is a list of Arduino IoT Cloud features.
 Data Monitoring - learn how to easily monitor your Arduino's sensor values through a dashboard.
 Variable Synchronisation - variable synchronisation allows you to sync variables across devices,
enabling communication between devices with minimal coding.
 Scheduler - schedule jobs to go on/off for a specific amount of time (seconds, minutes, hours).
 Over-The-Air (OTA) Uploads - upload code to devices not connected to your computer.
 Webhooks - integrate your project with another service, such as IFTTT.
 Amazon Alexa Support - make your project voice controlled with the Amazon Alexa integration.
 Dashboard Sharing - share your data with other people around the world.
Compatible Hardware
To use the Arduino IoT Cloud, a cloud compatible board is required. You can choose between using an
official Arduino board, or a board based on the ESP32 / ESP8266 microcontroller. The Arduino IoT
Cloud currently supports connection via Wi-Fi, LoRaWAN® (via The Things Network) and mobile
networks.
Downloaded by BENAZIR AE (arbenazir22@gmail.com)
lOMoARcPSD|37383633
All cloud-compatible Arduino boards come with a hardware secure element (such as
the ECC508 cryptochip), where you can store your security keys.
Wi-Fi
Official Arduino boards only supports the 2.4GHz frequency band for transmitting data.
The following boards connect to the Arduino IoT Cloud via Wi-Fi.
 MKR 1000 WiFi
 MKR WiFi 1010
 Nano RP2040 Connect
 Nano 33 IoT
 GIGA R1 WiFi
 Portenta H7
 Portenta H7 Lite Connected
 Portenta Machine Control
 Nicla Vision
 Opta.
Connection via Wi-Fi is an easy alternative, and your credentials can safely be entered during the
configuration of a project. This type of connection is most suitable for low-range projects, where you
connect your board to the cloud via your home/work/school router.
LoRaWAN®
The following boards connect to the Arduino IoT Cloud via The Things Stack, a LoRaWAN® Network
Server connected to thousands of public LoRa® gateways.
 MKR WAN 1300
 MKR WAN 1310
Connection via LoRaWAN® is recommended for low-power projects in both remote and urban areas,
where Wi-Fi or other popular connectivity types are not available. The MKR WAN 1300/1310 boards are
equipped with a LoRa radio module and has a slot for an antenna. With the right low-power configuration,
the board can send data to the cloud for months on a single battery.
To learn more about setting up LoRaWAN® devices, visit the Configuring LoRaWAN® devices in the
Arduino Cloud guide.
GSM / NB-IoT Boards
The MKR GSM 1400 and MKR NB 1500 require a SIM card to connect to the cloud, as they
communicate over the mobile networks.
 MKR GSM 1400
 MKR NB 1500
Downloaded by BENAZIR AE (arbenazir22@gmail.com)
lOMoARcPSD|37383633
Connection through mobile networks can be considered in remote areas where there's no Wi-Fi, or in
mobile projects (such as cargo tracking).
For more information, visit the Arduino SIM page.
Note that a secured connection is a memory intense operation, so there's not a lot of memory for the user
application (e.g. around 2.6 kB on the MKR GSM 1400). Using a lot of IoT Cloud variables may cause
the sketch to run out of memory on boards which don't offload the SSL stack and make it crash.
ESP32 / ESP8266
The Arduino IoT Cloud supports a wide range of third party boards based on the ESP32 and ESP8266
microcontrollers with support for Wi-Fi. To set them up, simply choose the third party option in the
device setup.
Configuring third party boards.
To learn more about ESP32/ESP8266 support and how to set it up, visit the Connecting ESP32 &
ESP8266 to Arduino Cloud IoT guide.
Ethernet
The Arduino IoT Cloud supports connection via Ethernet on a number of devices. The options to connect
via Ethernet are the following:
 Connect with the Portenta H7 in combination with an Ethernet compatible carrier/shield (see below).
 Connect with the Opta.
To connect with the Portenta H7 board, you will need one of the following shields/carriers:
Downloaded by BENAZIR AE (arbenazir22@gmail.com)
lOMoARcPSD|37383633
 Portenta Vision Shield Ethernet
 Portenta Machine Control
To enable communication via Ethernet with the Portenta H7, while configuring your device, you need to
select the "Ethernet" option. If your device is already configured as a Wi-Fi device, you need to remove it
before configuring it to Ethernet communication.
Choose the Ethernet option.
Please note that older hardware such as the Ethernet Shield Rev2 and MKR ETH Shield are currently not
supported by the Arduino IoT Cloud.
Support
If you have any problems with the Arduino IoT Cloud, you can browse through common troubleshooting
issues and find information on different features in the Arduino Help Center. If you don‘t find the
answer you are looking for, we are always happy to help you with any question regarding our products!
Go to Arduino Help Center
A Walk Through the Configuration
Setting up the Arduino IoT Cloud.
Setting up the Arduino IoT Cloud and accessing the different features available involves a few simple
steps. So let‘s take a look at how to go from start to finish!
Downloaded by BENAZIR AE (arbenazir22@gmail.com)
lOMoARcPSD|37383633
1. Creating an Arduino Account
To starting using the Arduino IoT cloud, we first need to log in or sign up to Arduino.
2. Go to the Arduino IoT Cloud
After we have signed up, you can access the Arduino IoT Cloud from any page on arduino.cc by clicking
on the four dots menu in the top right corner. You can also go directly to the Arduino IoT Cloud.
Navigating to the cloud.
3. Creating a Thing
The journey always begin by creating a new Thing. In the Thing overview, we can choose what device to
use, what Wi-Fi network we want to connect to, and create variables that we can monitor and control. This
is the main configuration space, where all changes we make are automatically generated into a special
sketch file.
The
Thing overview.
Downloaded by BENAZIR AE (arbenazir22@gmail.com)
lOMoARcPSD|37383633
4. Configuring a Device
Devices can easily be added and linked to a Thing. The Arduino IoT Cloud requires your computer to
have the Arduino Create Agent installed. The configuration process is quick and easy, and can be done by
clicking on the “Select device” button in the Thing overview. Here, we can choose from any board that
has been configured, or select the “Configure new device” option.
Configuring a device.
We can also get a complete overview of our devices by clicking the “Devices" tab at the top of the
Arduino IoT Cloud interface. Here we can manage and add new devices.
The
device tab.
5. Creating Variables
The variables we create are automatically generated into a sketch file. There are several data types we can
choose from, such as int, float, boolean, long, char. There‘s also special variables, such
Downloaded by BENAZIR AE (arbenazir22@gmail.com)
lOMoARcPSD|37383633
as Temperature, Velocity, Luminance that can be used. When clicking on the “Add variable” button,
we can choose name, data type, update setting and interaction mode.
Creating variables.
6. Connecting to a Network
To connect to a Wi-Fi network, simply click the “Configure” button in the network section. Enter the
credentials and click “Save”. This information is also generated into your sketch file!
Entering network credentials.
Downloaded by BENAZIR AE (arbenazir22@gmail.com)
lOMoARcPSD|37383633
7. Editing the Sketch
Now that we have configured variables, devices and network settings, we can get to programming our
devices!
An automatically generated sketch file can be found in the “Sketch” tab. It has the same structure as a
typical
.ino
file, but with some additional code to make the connection to your network and to the cloud.
A sketch that, for example, reads an analog sensor, and use the cloud variable to store it. When the sketch
has been uploaded, it will work as a regular sketch, but it will also update the cloud variables that we use!
Additionally, each time we create a variable that has the Read & Write permission enabled, a function is
also generated, at the bottom of your sketch file. Each time this variable changes, it will execute the code
within this function! This means that we can leave most of the code out of the loop() and only run code
when needed.
To upload the program to our board, simply click the "Upload" button.
Editing a sketch in the cloud editor.
The editor also has a Serial Monitor Tool, which can be opened by clicking the magnifying glass in the
toolbar. Here you can view information regarding your connection, or commands printed via
Serial.print()
.
Downloaded by BENAZIR AE (arbenazir22@gmail.com)
lOMoARcPSD|37383633
The
Serial Monitor Tool.
After we have successfully uploaded the code, we can open the “Serial Monitor” tab to view information
regarding our connection. If it is successful, it will print “connected to network_name” and “connected
to cloud”. If it fails to connect, it will print the errors here as well.
The cloud editor is a mirrored "minimal" version of the Web Editor. Any changes you make will also be
reflected in the Web Editor, which is more suitable for developing more advanced sketches.
8. Creating a Dashboard
Now that we have configured the device & network, created variables, completed the sketch and
successfully uploaded the code, we can move on to the fun part: creating dashboards!
Visualize your data.
Downloaded by BENAZIR AE (arbenazir22@gmail.com)
lOMoARcPSD|37383633
Dashboards are visual user interface for interacting with your boards over the cloud, and we can setup
many different setups depending on what your IoT project needs. We can access our dashboards by
clicking on the “Dashboards” tab at the top of the Arduino IoT Cloud interface, where we can create new
dashboards, and see a list of dashboards created for other Things.
Navigating to dashboards.
If we click on “Create new dashboard”, we enter a dashboard editor. Here, we can create something
called widgets. Widgets are the visual representation of our variables we create, and there are many
different to choose from. Below is an example using several types of widgets.
The
different widgets available.
When we create widgets, we also need to link them to our variables. This is done by clicking on a
widget we create, select a Thing, and select a variable that we want to link. Once it is linked, we can either
Downloaded by BENAZIR AE (arbenazir22@gmail.com)
lOMoARcPSD|37383633
interact with it, for example a button, or we can monitor a value from a sensor. As long as our board is
connected to the cloud, the values will update!
Let's say we have a temperature widget that we want to link to the temperature variable inside
the Cloud project thing.
Linking a variable to a widget.
Note that not all widgets and variables are compatible. A switch and an integer can for example not be
linked, and will not be an option while setting up your dashboard.
We can also have several things running at once, depending on your Arduino IoT Cloud plan, which we
can include in the same dashboard. This is a great feature for tracking multiple boards in for example a
larger sensor network, where boards can be connected to different networks around the world, but be
monitored from the same dashboard.
UNIT V CASE STUDIES
Industrial IoT, Home Automation, smart cities, Smart Grid, connected vehicles, electric vehicle charging,
Environment, Agriculture, Productivity Applications, IOT Defense
What Is Industrial IoT (IIoT)?
Industrial IoT is an ecosystem of devices, sensors, applications, and associated networking equipment that
work together to collect, monitor, and analyze data from industrial operations. Analysis of such data helps
increase visibility and enhances troubleshooting and maintenance capabilities. It can also increase
efficiencies, reduce costs, and improve safety and security.
Why should organizations consider adopting industrial IoT?
Industrial IoT enables organizations to get a wealth of actionable data from their operations. When properly
aggregated and analyzed, the data helps them better control operations, with the potential to:
Downloaded by BENAZIR AE (arbenazir22@gmail.com)
lOMoARcPSD|37383633
 Improve worker safety
 Increase production uptime by predictive maintenance of machinery
 Maintain product quality
 Help ensure regulatory compliance
 Improve operational efficiencies
 Accelerate response times with real-time collection and processing of operational data
Major considerations for adopting IIoT
Depending on where an organization is in its digital transformation, it may need to replace analog
information sources with digital, securely network these sources, and develop applications that can ingest
the data and generate actionable insights.
Network equipment
The switches, routers, and wireless equipment that connect IIoT devices must provide the needed bandwidth
and be able to withstand punishing physical conditions on factory floors or outdoors. This equipment must
support the communication protocols in use to provide visibility and help monitor each endpoint. Network
equipment should also be able to run edge applications to respond to emerging situations in real time and to
extract, curate, and transmit operations data to applications in a data center or the cloud.
Explore Cisco Industrial IoT portfolio
Centralized connectivity deployment and monitoring
For organizations to efficiently monitor and scale their deployments, centralized visibility of device
connectivity is of paramount importance. Organizations need to be able to deploy and configure connectivity
to their edge devices and equipment quickly and accurately. They also need to efficiently update
configurations by enabling secure remote access to equipment and troubleshoot issues by monitoring alerts.
Learn about Cisco IoT Operations Dashboard
Asset tracking and monitoring
Continuous tracking and monitoring of IIoT devices, assets, and facilities is essential to keep them up and
running efficiently. Such visibility helps you quickly identify potential issues that could impact your
operations, worker safety, and revenue. For example, tracking whether equipment is running inordinately
hot or a door has been left open allows you to take corrective actions before irreversible damage is done.
Discover Cisco Industrial Asset Vision
Strong cybersecurity
All connected devices increase the threat surface. Operational devices are especially vulnerable, and an
attack could have grave consequences. Robust security based on the zero-trust model is a must. This model
requires you to establish trust parameters by identifying and profiling connected endpoints. You also
segment the network into zones and continuously monitor each endpoint's behavior to make sure it remains
trustworthy. If anomalous behavior is found that might indicate an endpoint is infected, you can then take
appropriate steps to mitigate any risk.
See Cisco IoT/OT security solutions
The role of IT in industrial IoT
IIoT malfunctions can have a major impact on operations, ranging from production downtime to
compromising worker safety or damaging the environment. IIoT installations benefit from rigorous IT
processes, tools, and best practices. IT can scale and secure IIoT deployments to help ensure success.
Downloaded by BENAZIR AE (arbenazir22@gmail.com)
lOMoARcPSD|37383633
A reliable network
Organizations rely more and more on the quantity and quality of data they get from their operations. IT must
strive to ensure that a reliable network with sufficient bandwidth capacity is in place so time-sensitive data
can be transmitted without delay to applications in data centers or the cloud.
The network that connects IIoT devices and sensors needs to support diverse physical channels. For
example, although Ethernet cables may connect devices commonly found on the factory floor, wireless
technologies such as 5G, 4G LTE, NFC, RFID, Bluetooth, NB-IOT, LoRaWAN, and Wi-SUN may also be
required for connectivity.
Intelligent network control
The network for IIoT must be kept highly available. IIoT devices may be numerous and spread across a
large geographical area, but a network controller can automate networking equipment deployment and keep
configurations consistent, and firmware updated. It can also help ensure that devices are performing to
expectations—and guide administrators to take corrective actions if not. Network controllers that have
served IT well in the past could serve IIoT equally well.
Security for critical resources
As IT and IIoT networks converge, security practices must also converge. Protecting IIoT is best done with
a comprehensive, integrated security solution rather than a multitude of point products. The same proven
security tools that IT has deployed over the years can benefit IIoT as well.
IoT Home Automation
In this article, we will discuss the overview of IoT home automation. And will focus on smart lighting, smart
appliances, intrusion detection, smoke/gas detector, etc. Let‘s discuss it one by one.
Overview :
 Home automation is constructing automation for a domestic, mentioned as a sensible home or smart
house. In the IoT home automation ecosystem, you can control your devices like light, fan, TV, etc.
 A domestic automation system can monitor and/or manage home attributes adore lighting, climate,
enjoyment systems, and appliances. It is very helpful to control your home devices.
 It‘s going to in addition incorporates domestic security such as access management and alarm systems.
Once it coupled with the internet, domestic gadgets are a very important constituent of the Internet of
Things.
 A domestic automation system usually connects controlled devices to a central hub or gateway.
 The program for control of the system makes use of both wall-mounted terminals, tablet or desktop
computers, a smartphone application, or an online interface that may even be approachable off-site
through the Internet.
 Smart Home automation refers to the use of technology to control and automate various functions in a
home, such as lighting, heating, air conditioning, and security. In the context of IoT (Internet
of Things) and M2M (Machine-to-Machine) communications, home automation systems can be
controlled and monitored remotely through a network connection.
 One of the key benefits of IoT-enabled home automation is the ability to control and monitor a wide
range of devices and systems from a single, centralized location, such as a smartphone or tablet. This can
include everything from lighting and temperature control to security cameras and alarm systems.
 Another advantage of IoT-enabled home automation is the ability to remotely monitor and control
devices, even when away from home. This can be useful for controlling energy consumption and
ensuring the safety and security of the home.
 IoT-enabled home automation systems typically involve the use of smart devices, such as thermostats,
light bulbs, and security cameras, that can be controlled and monitored through a centralized hub or app.
These smart devices can communicate with each other and with the centralized hub using wireless
protocols such as Zigbee, Z-Wave, and Bluetooth.
Downloaded by BENAZIR AE (arbenazir22@gmail.com)
lOMoARcPSD|37383633
 In addition, IoT-enabled home automation systems can integrate with other smart home technologies,
such as voice assistants like Alexa and Google Home, to provide additional functionality and
convenience.
 Overall, IoT-enabled home automation can provide many benefits to homeowners, including increased
convenience, energy efficiency, and security. However, it is important to ensure the security of these
systems, as they may be vulnerable to hacking and other cyber threats.
Components :
Here, you will see the smart home components like smart lighting, smart appliances, intrusion detection,
smoke/gas detector, etc. So, let‘s discuss it.
Component-1 :
Smart Lighting –
 Smart lighting for home helps in saving energy by adapting the life to the ambient condition and
switching on/off or dimming the light when needed.
 Smart lighting solutions for homes achieve energy saving by sensing the human movements and their
environments and controlling the lights accordingly.
Component-2 :
Smart Appliances –
 Smart appliances with the management are here and also provide status information to the users
remotely.
 Smart washer/dryer can be controlled remotely and notify when the washing and drying are complete.
 Smart refrigerators can keep track of the item store and send updates to the users when an item is low on
stock.
Component-3 :
Intrusion Detection –
 Home intrusion detection systems use security cameras and sensors to detect intrusion and raise alerts.
 Alert can we inform of an SMS or an email sent to the user.
 Advanced systems can even send detailed alerts such as an image shoot or short video clips.
Component-4 :
Smoke/gas detectors –
 Smoke detectors are installed in homes and buildings to detect smoke that is typically an early sign of
Fire.
 It uses optical detection, ionization for Air sampling techniques to detect smoke.
 Gas detectors can detect the presence of harmful gases such as CO, LPG, etc.
 It can raise alerts in the human voice describing where the problem is.
ioT in Smart Home and Smart City Application
Implementing IoT system in home and city leads them to become as smart home and smart city. Smart home
or smart city make life quite easier and smarter.
A smart home system can be something that makes our life quite easy. Starting from energy management
where the power controls system in the AC appliances where we use the thermostat, all this is managed to
cut down the power consumption that's taking place. A door management system, security management
system, water management system are the part of this as well. Still, these are vital things that stand out in the
smart home system. The limitation of IoT in smart home application stops where our imagination stops.
Anything that we wish to automate or want to make our life easier can be a part of smart home, a
smartphone system as well.
Downloaded by BENAZIR AE (arbenazir22@gmail.com)
lOMoARcPSD|37383633
Now, a smart home usually is going to be a base of a smart city. The smart city is an evolution of a smart
home. Here, it is not just the sensors of a single home that is connected, here its correlation or a network or a
connection between various organizations, various domains as well as multiple segments of that city as a
whole. In the smart city, the life of every single dependent becomes more comfortable and in tune really
help to develop that city to greater extends as such. Now, the key factor for a smart city is government
support as well, and if the governments are willing to take this step, then we hope we would see a smart city
completely build on the Internet of Things.
IoT Smart Agriculture Domain
Another important domain for Iot is the agriculture domain where IoT system plays vital role for soil and
crop monitoring and provides a proper solution accordingly.
Using smart farming through IoT technologies helps farmer to reduce waste generation and increase the
productivity.
Downloaded by BENAZIR AE (arbenazir22@gmail.com)
lOMoARcPSD|37383633
There are several IoT technologies available that work on agriculture domain. Some of them are:
o Drones for field monitoring
o Sensor for soil monitoring
o Water pump for water sully
o Machines for routine operation
Smart Irrigation System
One of the parts of smart agriculture using IoT is smart irrigation system. In the smart irrigation system, IoT
checks the moisture level in the environment or in the water lanes that the farmer has created.
Now, let's understand the working process of this smart irrigation system. Usually, the two main IoT devices
that used here is the Arduino board and the Raspberry Pi. The Raspberry Pi becomes the main processing
unit, and an Arduino board is placed from each of water channels. These Arduino boards themselves connect
to multiple sensors which are part of this water channel so what these sensors check the moisture present in
these lanes as such. So, let's say a specific lane does not meet the minimum required moisture then the
Arduino board would send a signal to the Raspberry Pi. Again all these devices are connected on the same
wireless router network, and the Raspberry Pi would identify the lack of moisture and pass a signal to the
relay. The relay, in turn, would initiate the water pump and the water would be parked now to ensure that
water is not wasted. The smart irrigation system would be a gate control system and only that gate will open
where the moister is less. Once the sensors detect that the moisture level has gone beyond the required limit,
it would again transmit another signal to the Raspberry Pi asking it to stop the pump as well. So, this helps a
farmer to save a lot of water and also makes life quite easier as well. So, after this, the farmer only task is to
either setting up new plans or creating new water channels.
Downloaded by BENAZIR AE (arbenazir22@gmail.com)
lOMoARcPSD|37383633
Smart Grid in Action
The businesses, services and private citizens that require electricity from the grid, and therefore stand to
benefit when municipalities adopt smart grid technologies, span every resident, city service and critical
Downloaded by BENAZIR AE (arbenazir22@gmail.com)
lOMoARcPSD|37383633
infrastructure installation. While we won't cover every use case, some key examples can help to illustrate the
impact of the movement to the smart grid.
Smart grid allows a power company to assess system health in significantly more detail than was previously
possible. For instance, with smart meters the power company can discover real time power demands with a
granularity and accuracy that is simply not possible with older technology. This can allow them to better
predict and respond to sudden increases in demand, which can help to prevent blackouts.
In the event that a blackout does occur, IoT devices that use cellular and RF technology installed in
transformers and substations can automatically redirect power. That can allow for a faster, easier fix versus
having to dispatch service personnel in a truck each time the power goes out. As stated on SmartGrid.gov:
“A smarter grid will add resiliency to our electric power system and make it better prepared to address
emergencies such as severe storms, earthquakes, large solar flares, and terrorist attacks. Because of its two-
way interactive capacity, the Smart Grid will allow for automatic rerouting when equipment fails or outages
occur.”
This idea of smart grid mitigating the effects of a terrorist attack is an interesting one and a topic we‘ll cover
in a later section. For now it would be informative to look at how smart grid can benefit a city.
How Smart Cities Are Adopting Smart Grid Technology
Smart city applications are vast, and include everything from smart city lighting, energy management and
intelligent traffic management to water treatment and wastewater management.
Sensors in traffic lights can send information back to a central authority for decision making. Even better,
with intelligent traffic systems, both surface traffic and public transportation can be managed with routing
and traffic lighting to improve or eliminate congestion.
IoT sensors in streetlights can also adjust off and on timing and brightness according to real time conditions.
Plus or minus a few watts might not sound like much. However, when considering the thousands or tens of
thousands of streetlights that can be found in any given city, the savings and environmental impact quickly
add up. Those same sensors can also send out an alert if a light needs servicing. No need to wait for a call
from an angry customer complaining about street lights being out.
Additionally, with a sophisticated remote management solution, technicians can remotely troubleshoot the
issue and determine whether or not to send a truck. In the past, a truck roll – a highly expensive proposition
compared to a fast firmware fix or reboot from a management system in the home office – was inevitable.
Smart meters enable demand response which lets home and business owners see real time pricing
information so that they can adjust their energy usage accordingly. For example, switching off the AC, or
turning down the thermostat in winter. Most of all smart meters will benefit electric car owners. With real
time pricing information EV owners will be able to charge their cars when electricity is the cheapest and
avoid charging, if possible, during times of peak demand.
The Top Three Benefits of Smart Grid
Downloaded by BENAZIR AE (arbenazir22@gmail.com)
lOMoARcPSD|37383633
While there are numerous benefits to smart grid the following three instances show just how useful an
updated power grid can be.
1. Smart Grid Enables Renewable Energy Generation
Traditional energy grids are designed to transmit electricity from a large, centralized power station to a wide
network of homes and businesses in the area. At this stage, the electric grid is not designed to accept inputs
from homes and businesses that are generating power via solar panels or windmills. A smart grid is designed
to accept power from renewable resources.
Crucially, the smart grid in conjunction with wirelessly enabled smart meters can keep track of how much
energy a net-positive establishment is generating and reimburse them accordingly. The smart grid also
allows for monitoring of solar panels and equipment as well.
We mentioned earlier that a smart grid can mitigate the effects of a disaster such as a terrorist attack or
natural disaster on a power station, a feat that‘s possible due to decentralized energy generation. Under the
traditional model, a small number of power plants powered a city. This left these services vulnerable to
threats that would result in widespread blackouts and energy shortages. With a decentralized model, even if
the centralized power plant is taken offline, multiple alternative sources, including wind and solar, can
supplant the resources in the grid. This decentralized system is much harder to take offline and can provide a
robustness that‘s not possible when one plant is powering an entire city.
2. Better Billing, Better Predictions
Smart meters offer two benefits. First, via wireless IoT devices they can collect a tremendous amount of
data, data that utility companies have never had access to before. Utilities can use that information to better
forecast when electricity demands will be high and from what areas the demand will be highest.
Second, for consumers the smart grid means more efficient billing. Previously the costs of electricity during
peak demand were averaged out among communities and neighborhoods. Now, if you use electricity while
rates are high you‘ll be billed for it. And if you turn off appliances and save electricity, your bill will drop
accordingly. This increases the incentive for everyone to use electricity responsibly.
3. Smart Grid is More Resilient
A US DOE (Department of Energy) report suggests that every year power outages in the United States
cost businesses about $150 billion. While that’s only an estimate, even if only $50 billion a year lost
these outages are a problem which must be solved.
Downloaded by BENAZIR AE (arbenazir22@gmail.com)
lOMoARcPSD|37383633
With smart grid technology, power can be automatically rerouted as soon as a blackout happens,
minimizing the effects on households and businesses. IoT sensors can also report on the condition of
equipment so that repairs can be made before failure. Utilities can notify their customers (via
email/social media) when there is an outage instead of reactively responding to customer calls
reporting outages.
Connected Vehicles
Connectivity will be at the heart of next generation vehicles. Whether it will be real-time traffic flow
information, mapping, infotainment or remote access to emergency services, all these services will require
connectivity.
Connected vehicle applications and services have distinctive features; they need to operate globally and
usually have a very long ‗device‘ lifetime, however can be integrated with local intelligent transport
solutions and need to comply with local security and emergency regulations.
Connected vehicle and smart transport applications have the potential to bring substantial benefits to
consumers, including making travel safer, reducing congestion, and providing real time information to
passengers.
The GSMA is working with mobile operators and automotive OEMs to align the industry and wider
ecosystem around a common approach to security and network connectivity to accelerate the growth of the
Connected Vehicle market.
Governments can help encourage the development of the connected vehicle and intelligent transport
ecosystems by:
 Introducing incentives for innovation and investment
 Leading with light-touch regulation that will allow the market to scale while building trust and confidence of
consumers
 Promoting research and development programmes for connected and autonomous vehicles
 Supporting services, applications and network industry-led standards and interoperability
Downloaded by BENAZIR AE (arbenazir22@gmail.com)
lOMoARcPSD|37383633
The Role of the IoT in EV Charging Stations is Two-Fold
First, the IoT can be used to remotely monitor and manage charging station operations. This includes
monitoring charger availability, managing user access, and providing real-time updates on charger status.
Second, the IoT can be used to provide data that can be used to improve the efficiency of charging station
operations. This data can be used to optimize charger utilization, identify areas for improvement, and track
trends over time.
The benefits of using the IoT in EV charging stations are numerous and far-reaching. By leveraging the
power of the IoT, we can make EV charging stations more efficient, easier to use, and more reliable.
How IoT can Track Electric Vehicle Charging Stations to Decrease Grid Load
As electric vehicles (EVs) become more prevalent, it‘s important to have a way to track charging stations to
decrease grid load. The internet of things (IoT) can be used for this purpose.
Charging an EV takes a lot of power, and if many people are charging their EVs at the same time, it can put
a strain on the grid. By tracking charging stations with IoT, we can see when they‘re being used and how
much power is being drawn. This information can be used to regulate the flow of power so that the grid isn‘t
overloaded.
IoT can also be used to monitor the status of charging stations and their batteries. If there‘s a problem with a
station, it can be fixed quickly before it causes any disruptions.
Top Benefits of using IoT in Electric Vehicle Charging Stations
The benefits of using IoT in electric vehicle charging station
The use of IoT in electric vehicle charging stations is currently a hot topic in the industry, with many
companies looking to implement this technology. The main benefits are as follows:
1. It helps to save money by reducing energy costs.
2. It helps to reduce carbon emissions by reducing the amount of electricity being consumed.
3. It helps to improve customer satisfaction by providing them with accurate information about their
vehicle‘s charging status even when they‘re away from home or work.
What Is the Internet of Military Things (IoMT)
The Internet of Military Things (IoMT) and the Internet of Battlefield Things (IoBT) are networks of
sensors, wearables, and IoT devices that use cloud and edge computing to increase military capabilities and
safety. IoMT and IoBT incorporate strong edge architecture that uses biometrics, environmental sensors, and
other connected devices to communicate data quickly, allowing military personnel to respond and perform
better on the battlefield.
The network of interconnected entities or ―things‖ in the military domain constantly communicate,
coordinate, learn, and interact with the physical environment, increasing intelligence and allowing for more
informed decision-making.
Downloaded by BENAZIR AE (arbenazir22@gmail.com)
lOMoARcPSD|37383633
IoT Military Applications
IoT military applications include connected ships, tanks, planes, drones, soldiers, and operating bases that all
work together in a cohesive network to increase situational awareness, risks assessment, and response time.
As military operations become more unpredictable and complex, utilizing IoT technology can help
personnel make more informed decisions and take more calculated actions. Here are a few of the most
transformative IoT military applications:
 Collecting Battlefield Intelligence: IoT enables soldiers to survey the battlefield through unmanned
aerial drones utilizing cameras and sensors. Soldiers are able to capture images, trace the landscape,
locate enemies, and send real-time data to a command center–all in an effort to keep an eye on the
battlefield and make more strategic judgments.
 Base Security: Drones can be used for border patrols to alert military staff in the event of an intruder.
If there is a violation or threat, utilizing unmanned devices prevents personnel losses, as they can be
operated over a distance.
 Monitoring Soldier Health: Through the use of sensors in military uniforms, a soldier‘s heart rate,
body temperature, and thermal distribution can be monitored. The collected data about a soldier‘s
physical and mental health can then be shared with doctors in real-time, allowing for the
arrangement of any necessary aid in advance on a per-soldier basis. Additionally, biometrics as well
as behavior elements such as speech patterns, body dynamic patterns, and more can be used to create
a model of a soldier‘s current condition, which is essential in the case of a critical intervention.
 Equipment and Fleet Management: Regularly maintaining vehicles and efficient transportation is
essential in successful military operations. Utilizing the data collected by IoT devices can help track
supplies out on the battlefield. Elements like position, fuel efficiency, engineer status, damage level,
and other parameters enable the quick identification of inconsistencies and solutions. This ultimately
enables lower transportation costs as well as less need for human intervention, and creates more
reliable fleets. Furthermore, with the integration of sensors onto weapons and unmanned equipment,
soldiers can know when to reload and surveillance on enemy grounds can be more safely conducted.
 Smart Bases: Enemies may attempt at accessing military bases through stolen badges or appearing as
civilians. Using IoT fingerprinting and other biometric data, a person‘s true identity can be found.
Other IoT sensors can be incorporated into military bases to increase performance, efficiency, and
convenience of services on an isolated military base. Automated screening of resources, in addition
to the smart management of water and electricity, can all help optimize operations.
 More Advanced Training: Utilizing IoT devices, military personnel can be more prepared for the real
battlefield. Through movement sensors, acoustic sensors, and other methods, personnel can be
screened during preparation and send data to coaches who can better train them. Elements such as
Downloaded by BENAZIR AE (arbenazir22@gmail.com)
lOMoARcPSD|37383633
AR remote training to create more realistic battlefield simulation with VR-fitted equipment can
really transform the training environment for a soldier and allow for better evaluation.
Downloaded by BENAZIR AE (arbenazir22@gmail.com)
lOMoARcPSD|37383633

More Related Content

PPTX
Unit 1 introduction to software defined radios
PDF
IoT (Internet of Things) introduction Notes.pdf
PPT
Question Tags
PPTX
Postural drainage
PDF
API Management Solution Powerpoint Presentation Slides
PPTX
Humidification & nebulization
PPTX
message communication protocols in IoT
PDF
Software defined radio
Unit 1 introduction to software defined radios
IoT (Internet of Things) introduction Notes.pdf
Question Tags
Postural drainage
API Management Solution Powerpoint Presentation Slides
Humidification & nebulization
message communication protocols in IoT
Software defined radio

What's hot (20)

PDF
Internet Of things
PPT
E.s unit 6
PPTX
Embedded system design process
PDF
Building Blocks for IoT Devices
PPTX
Software reuse ppt.
PPT
Microprocessor ppt
PPTX
Bluetooth
PPTX
IoT Enabling Technologies
PDF
15CS81 Module1 IoT
PPTX
Interrupts and types of interrupts
PPTX
4. Internet of Things - Reference Model and Architecture
PPTX
Introduction to Internet of Things Hardware
PPTX
Iot architecture
PPT
Embedded System Basics
PDF
PPT
Quality attributes of Embedded Systems
PPTX
Chapter 8 Embedded Hardware Design and Development (third portion)
PPTX
Agents in Artificial intelligence
PPTX
Microcontoller and Embedded System
PPTX
Physical design of io t
Internet Of things
E.s unit 6
Embedded system design process
Building Blocks for IoT Devices
Software reuse ppt.
Microprocessor ppt
Bluetooth
IoT Enabling Technologies
15CS81 Module1 IoT
Interrupts and types of interrupts
4. Internet of Things - Reference Model and Architecture
Introduction to Internet of Things Hardware
Iot architecture
Embedded System Basics
Quality attributes of Embedded Systems
Chapter 8 Embedded Hardware Design and Development (third portion)
Agents in Artificial intelligence
Microcontoller and Embedded System
Physical design of io t

Similar to iot-full-notes-iot-for-smart-systems.pdf (20)

PPTX
PPTX
Chapter 4about internet of things IoT.pptx
DOCX
Internet of things
PPTX
PPTX
Chapter 4- IOT (gghhhhhhhhhhjjjjjjjjj1).pptx
PPTX
Ch 4.pptx
PPTX
Chapter 4 - EMTE.pptx
PPTX
Emerging chap asasasasasawwqwqwwqwewewr4.pptx
PDF
Internet of things (io t)
PPTX
Emerging Technology for anChapter 4.pptx
PPTX
merged_presentation_choladeck (1).pptxElectric vechile presentation
PDF
IOT Material AY(24-25) Regulation R22 Syllabus
PDF
Unit 3 - Internet of Things - www.rgpvnotes.in.pdf
PPTX
17. Computers Internet of Things(IoT) and Cloud Computing.pptx
PPTX
Internet of things
PPTX
IOT_UNIT-1_Presentation which is basic presentation level
PPTX
INTERNET OF THINGS
PPTX
Basics of internet of things
PDF
IOT - Thesis Report about Home Automation System
PPTX
The-Internet-Of-Things-4th-Industrial-Revolution.pptx
Chapter 4about internet of things IoT.pptx
Internet of things
Chapter 4- IOT (gghhhhhhhhhhjjjjjjjjj1).pptx
Ch 4.pptx
Chapter 4 - EMTE.pptx
Emerging chap asasasasasawwqwqwwqwewewr4.pptx
Internet of things (io t)
Emerging Technology for anChapter 4.pptx
merged_presentation_choladeck (1).pptxElectric vechile presentation
IOT Material AY(24-25) Regulation R22 Syllabus
Unit 3 - Internet of Things - www.rgpvnotes.in.pdf
17. Computers Internet of Things(IoT) and Cloud Computing.pptx
Internet of things
IOT_UNIT-1_Presentation which is basic presentation level
INTERNET OF THINGS
Basics of internet of things
IOT - Thesis Report about Home Automation System
The-Internet-Of-Things-4th-Industrial-Revolution.pptx

More from RamithaDevi (6)

PPTX
ML edddddddddddddddddddddddddxduated detection.pptx
PPTX
cccccccccccccccccccccccccccmlppt-171107181444.pptx
PDF
sdfdfdsdddddddddddddddddddfffffffffffffffffdpl ppt.pdf
PDF
Tdffffffffffffffffffffffffffffffffffffffehranipoor.pdf
PPTX
DeepDRImageGuidedDiabeticRetinopathyDetectionUsingAttentionBasedDeepLearningS...
PPT
12539 Image Processing BV Extraction.ppt
ML edddddddddddddddddddddddddxduated detection.pptx
cccccccccccccccccccccccccccmlppt-171107181444.pptx
sdfdfdsdddddddddddddddddddfffffffffffffffffdpl ppt.pdf
Tdffffffffffffffffffffffffffffffffffffffehranipoor.pdf
DeepDRImageGuidedDiabeticRetinopathyDetectionUsingAttentionBasedDeepLearningS...
12539 Image Processing BV Extraction.ppt

Recently uploaded (20)

PPTX
CLASS_11_BUSINESS_STUDIES_PPT_CHAPTER_1_Business_Trade_Commerce.pptx
PDF
GREEN BUILDING MATERIALS FOR SUISTAINABLE ARCHITECTURE AND BUILDING STUDY
PPTX
Tenders & Contracts Works _ Services Afzal.pptx
DOCX
actividad 20% informatica microsoft project
PPT
EGWHermeneuticsffgggggggggggggggggggggggggggggggg.ppt
PDF
Key Trends in Website Development 2025 | B3AITS - Bow & 3 Arrows IT Solutions
PDF
Interior Structure and Construction A1 NGYANQI
PPTX
HPE Aruba-master-icon-library_052722.pptx
PDF
UNIT 1 Introduction fnfbbfhfhfbdhdbdto Java.pptx.pdf
PPTX
areprosthodontics and orthodonticsa text.pptx
PDF
Urban Design Final Project-Site Analysis
PDF
The Advantages of Working With a Design-Build Studio
PPTX
ANATOMY OF ANTERIOR CHAMBER ANGLE AND GONIOSCOPY.pptx
PPTX
Complete Guide to Microsoft PowerPoint 2019 – Features, Tools, and Tips"
PPTX
Media And Information Literacy for Grade 12
PDF
BRANDBOOK-Presidential Award Scheme-Kenya-2023
PPTX
12. Community Pharmacy and How to organize it
PDF
Phone away, tabs closed: No multitasking
PPTX
YV PROFILE PROJECTS PROFILE PRES. DESIGN
PPT
Machine printing techniques and plangi dyeing
CLASS_11_BUSINESS_STUDIES_PPT_CHAPTER_1_Business_Trade_Commerce.pptx
GREEN BUILDING MATERIALS FOR SUISTAINABLE ARCHITECTURE AND BUILDING STUDY
Tenders & Contracts Works _ Services Afzal.pptx
actividad 20% informatica microsoft project
EGWHermeneuticsffgggggggggggggggggggggggggggggggg.ppt
Key Trends in Website Development 2025 | B3AITS - Bow & 3 Arrows IT Solutions
Interior Structure and Construction A1 NGYANQI
HPE Aruba-master-icon-library_052722.pptx
UNIT 1 Introduction fnfbbfhfhfbdhdbdto Java.pptx.pdf
areprosthodontics and orthodonticsa text.pptx
Urban Design Final Project-Site Analysis
The Advantages of Working With a Design-Build Studio
ANATOMY OF ANTERIOR CHAMBER ANGLE AND GONIOSCOPY.pptx
Complete Guide to Microsoft PowerPoint 2019 – Features, Tools, and Tips"
Media And Information Literacy for Grade 12
BRANDBOOK-Presidential Award Scheme-Kenya-2023
12. Community Pharmacy and How to organize it
Phone away, tabs closed: No multitasking
YV PROFILE PROJECTS PROFILE PRES. DESIGN
Machine printing techniques and plangi dyeing

iot-full-notes-iot-for-smart-systems.pdf

  • 1. Iot full notes - iot for smart systems Internet of things (Anna University) Scan to open on Studocu Studocu is not sponsored or endorsed by any college or university Iot full notes - iot for smart systems Internet of things (Anna University) Scan to open on Studocu Studocu is not sponsored or endorsed by any college or university Downloaded by BENAZIR AE (arbenazir22@gmail.com) lOMoARcPSD|37383633
  • 2. UNIT I INTRODUCTION TO INTERNET OF THINGS Overview, Hardware and software requirements for IOT, Sensor and actuators, Technology drivers, Business drivers, Typical IoT applications, Trends and implications. Internet of Things - Overview IoT systems allow users to achieve deeper automation, analysis, and integration within a system. They improve the reach of these areas and their accuracy. IoT utilizes existing and emerging technology for sensing, networking, and robotics. IoT exploits recent advances in software, falling hardware prices, and modern attitudes towards technology. Its new and advanced elements bring major changes in the delivery of products, goods, and services; and the social, economic, and political impact of those changes. IoT − Key Features The most important features of IoT include artificial intelligence, connectivity, sensors, active engagement, and small device use. A brief review of these features is given below −  AI − IoT essentially makes virtually anything ―smart‖, meaning it enhances every aspect of life with the power of data collection, artificial intelligence algorithms, and networks. This can mean something as simple as enhancing your refrigerator and cabinets to detect when milk and your favorite cereal run low, and to then place an order with your preferred grocer.  Connectivity − New enabling technologies for networking, and specifically IoT networking, mean networks are no longer exclusively tied to major providers. Networks can exist on a much smaller and cheaper scale while still being practical. IoT creates these small networks between its system devices.  Sensors − IoT loses its distinction without sensors. They act as defining instruments which transform IoT from a standard passive network of devices into an active system capable of real-world integration.  Active Engagement − Much of today's interaction with connected technology happens through passive engagement. IoT introduces a new paradigm for active content, product, or service engagement.  Small Devices − Devices, as predicted, have become smaller, cheaper, and more powerful over time. IoT exploits purpose-built small devices to deliver its precision, scalability, and versatility. IoT − Advantages The advantages of IoT span across every area of lifestyle and business. Here is a list of some of the advantages that IoT has to offer −  Improved Customer Engagement − Current analytics suffer from blind-spots and significant flaws in accuracy; and as noted, engagement remains passive. IoT completely transforms this to achieve richer and more effective engagement with audiences.  Technology Optimization − The same technologies and data which improve the customer experience also improve device use, and aid in more potent improvements to technology. IoT unlocks a world of critical functional and field data.  Reduced Waste − IoT makes areas of improvement clear. Current analytics give us superficial insight, but IoT provides real-world information leading to more effective management of resources.  Enhanced Data Collection − Modern data collection suffers from its limitations and its design for passive use. IoT breaks it out of those spaces, and places it exactly where humans really want to go to analyze our world. It allows an accurate picture of everything. IoT − Disadvantages Downloaded by BENAZIR AE (arbenazir22@gmail.com) lOMoARcPSD|37383633
  • 3. Though IoT delivers an impressive set of benefits, it also presents a significant set of challenges. Here is a list of some its major issues −  Security − IoT creates an ecosystem of constantly connected devices communicating over networks. The system offers little control despite any security measures. This leaves users exposed to various kinds of attackers.  Privacy − The sophistication of IoT provides substantial personal data in extreme detail without the user's active participation.  Complexity − Some find IoT systems complicated in terms of design, deployment, and maintenance given their use of multiple technologies and a large set of new enabling technologies.  Flexibility − Many are concerned about the flexibility of an IoT system to integrate easily with another. They worry about finding themselves with several conflicting or locked systems.  Compliance − IoT, like any other technology in the realm of business, must comply with regulations. Its complexity makes the issue of compliance seem incredibly challenging when many consider standard software compliance a battle. What is the Internet of Things (IoT)? The term Internet of Things or IoT usually refers to the scenarios where normal items of our day-to-day lives are extended with network connectivity and stronger computing capabilities generate data that could further be exchanged, collected, consumed with almost no human intervention (in the whole process). The IoT can be better explained as one of the emerging technology concepts that have got their own significance in all aspects of the world. Components of our day-to-day lives such as the Durable goods, Vehicles, Consumer Products, Utilities, Sensors when combined with the internet connectivity and stronger data analytic capabilities - has promised a transformed way of our life significantly. How does the IoT work? Further to what we have discussed above, we will now take a closer look at how things work within. For this, there is a definite need to understand the underlying architecture altogether. This will not only provide you the details that are required for you to carry out an experiment all by yourselves but also provides you a better understanding of the whole concept. An IoT system altogether consists of 4 different components which are Sensors, Connectivity, Data Processing, and the final one being a User Interface. Now with this understanding, let us go through each and every component in detail (you can also make some references of these from the architecture diagram that is provided below): Sensors: Sensors are the devices that start the whole process of data collection, verification. This could be any simple device like a temperature reading to an advanced level such as a video feed altogether. A sensor as such a component in the IoT system could be just a single device or a combination of various sensors, devices that collect data from the intended environment. Connectivity: Connectivity forms the major part, as the data collected in the step above needs to be sent out to a step where it can be processed and a thoughtful decision be made out of that data. Downloaded by BENAZIR AE (arbenazir22@gmail.com) lOMoARcPSD|37383633
  • 4. These devices may all be connected to the Cloud via various methods such as WiFi, Cellular Satellite, Bluetooth, LAN, WAN and etc. Each of these has its own set of pros and cons, that needs to be thought over before setting up the IoT system altogether. Data Processing: Once the data is collected and obtained to this step via your pre-set connectivity, then it is all logical to process this data. Based on the data that you are collecting, the processing of this will be dependent. For example, if your incoming data is temperature then the probable example for data processing is to check whether it is within a permissible limit or not. User Interface: Based on the processed data, what are the next set of actions that you want to perform that could be checked on a User interface. This could probably be your Mobile application on a phone or a tablet etc. Building Blocks of the Internet of Things (IoT): Based on the above, you would have already got an idea of the whole concept. As per the above architecture, there are two sets of components that come into the picture - the first being the hardware components such as the sensors, devices, etc and the other side of the system are your software components such as mobile applications, processing tools/software. With this context, let us now take a look at each of these components in detail and get some understanding of these. IoT Hardware: The set of devices that respond and have the capabilities to capture data, follow the instructions can be considered as the IoT Hardware. The following fall into such categories where they not only collect data but also respond to instructions based on the processed data. 1. Chips: This is much a broader classification that contains all the electrical and electronic appliances such as microcontrollers, chips, integrated circuits, radio frequency systems, etc. 2. Sensors: Sensors, which are one of the base components of an IoT system, have three modules - Power Management modules, Sensing modules, and Energy modules. 3. Actuators: These devices provide the motion to a data collection system such as the solenoids, comb drives, etc to fetch details based on movements. 4. Standard devices: Standard devices constitute the generally used devices such as Tablets, Smartphones, Switches, Routers and etc. Each of these devices has its own set of settings that allow them to collect data. Downloaded by BENAZIR AE (arbenazir22@gmail.com) lOMoARcPSD|37383633
  • 5. IoT Software: The set of programs that help you get the activities done like the data collection, processing, storage, and evaluating instructions based on the processed data from the IoT Software. Operating Systems, firmware, applications, middleware are some of the examples that fall into this category. 1. Data Collection: This step involves the core of the data collection aspects ranging from sensing the data, filtering it, measuring it, aggregating it, and at the end managing the security of the collected data. Data collection can be performed from various sources, and once done is distributed over devices and then to a central data repository. 2. Device Integration: This ensures that all components within the IoT system are all well integrated. It manages all the limitations, protocols, and applications that are handled properly to ensure proper communication amongst the devices. 3. Real-Time Analytics: Over the collected data and the processing that is done over this data, there can be automated tasks that could run and analyze this data for specific patterns. 4. Application and Process Extension: This ensures that the data collection process can be accentuated to get the most of it, from all possible sources. These are more like the enhancers over the existing data collection infrastructure. Use cases of IoT Platforms: IoT finds its usage in almost all the Business Verticals, be it Healthcare, Travel, Education, Real Estate, Retail, Economy. This technology has opened up doors for everyone to leverage this and make a better future for themselves. In the process, the whole industry has undergone major shifts causing enough revolution. These are groundbreaking changes that are brought in that has caused various changes in the whole process altogether. There are various use cases that can be identified in these Verticals, which are outlined here: 1. Healthcare: IoT can evaluate if there is a possibility that the patient is prone to any Chronic diseases based on his / her medical history. 2. Travel: IoT can ease all your travel needs ranging from your itinerary to your electronic room keys, travel needs, aids, and information. It could be your single point of an information source in the near future. 3. Education: Bringing all the education needs to an easy process, knowledge on-demand, knowledge sharing amongst peers across geographical locations. Skill gaps, knowledge gaps can be reduced with the various ways of knowledge sharing. Downloaded by BENAZIR AE (arbenazir22@gmail.com) lOMoARcPSD|37383633
  • 6. 4. Real Estate: Energy-efficient solutions, smart options to cover space, and comfort will shape the Real Estate sector to newer heights. Electrical devices such as a fan, light are switched ON only if the human presence is sensed, else these will be switched OFF. Thereby, reduces the power consumption to a greater deal. 5. Retail: Stores based on demand, easier checkouts, easier warehouse maintenance, better demand-supply chains. With this, based on demand - warehouse management becomes much simpler. 6. Economy: The concept of Smart Contracts based on the technologies BlockChain and the Internet of Things is nearing reality. It cuts down the whole process of all manual efforts. Difference between Sensor and Actuator 1. Sensor: Sensor is a device used for the conversion of physical events or characteristics into the electrical signals. This is a hardware device that takes the input from environment and gives to the system by converting it. For example, a thermometer takes the temperature as physical characteristic and then converts it into electrical signals for the system. 2. Actuator: Actuator is a device that converts the electrical signals into the physical events or characteristics. It takes the input from the system and gives output to the environment. For example, motors and heaters are some of the commonly used actuators. Difference between Sensor and Actuator : SENSOR ACTUATOR It converts physical characteristics into electrical signals. It converts electrical signals into physical characteristics. It takes input from environment. It takes input from output conditioning unit of system. Downloaded by BENAZIR AE (arbenazir22@gmail.com) lOMoARcPSD|37383633
  • 7. SENSOR ACTUATOR It gives output to input conditioning unit of system. It gives output to environment. Sensor generated electrical signals. Actuator generates heat or motion. It is placed at input port of the system. It is placed at output port of the system. It is used to measure the physical quantity. It is used to measure the continuous and discrete process parameters. It gives information to the system about environment. It accepts command to perform a function. Example: Photo-voltaic cell which converts light energy into electrical energy. Example: Stepper motor where electrical energy drives the motor. Technology Drivers in 2018 (updated) The last couple of years have been crazy with the lot of innovation and buzz around Cloud Computing, Big Data, Machine Learning, Artificial Intelligence, and BlockChain. Big Data has been there for a while, however, access to these technologies was limited and relatively expensive. Overall innovation in the public cloud has led to commodification these technologies and ease of cloud migration. Today processing of a large amount of data in real time is much easier and cheaper. Outsource Software Development will bring in much more value than it has in the recent past because of these advantages. That means Machine Learning, AI, and IOT was not far away on the radar, today there isn‘t much hassle to develop your own ML, AI and IoT Application with managed offering like AWS Sagemaker and AWS IOT Suite Not just AWS but most of the cloud providers are building their offerings around below drivers and Yes! these are critical ones to build future-ready systems. Here is my list of 2018 Technology drivers 1. Containerization 2. Machine Learning & Artificial Intelligence Downloaded by BENAZIR AE (arbenazir22@gmail.com) lOMoARcPSD|37383633
  • 8. 3. Internet of Things 4. Conversational or Voice Enabled Systems 5. Serverless computing 6. Security 7. Edge Computing 8. BlockChain Business Drivers Based on our years of experience with our facility customers, here are five key drivers setting the momentum of IoT and smart facilities:  Scalability  Easy installation and maintenance  Reliability  IoT security  Integration 1. Scalability, the practical driver The first key driver is perhaps not the most exciting, but probably the most practical: scalability. Creating a small proof of concept using widely available DIY (Do It Yourself) IoT kits is relatively easy, but when you need to scale the implementation to thousands or hundreds of thousands of sensors, things get a little more complicated. A well designed IoT solution ensures that your solution is easy and fast to scale, secure, easy to use, and of course, cost-efficient. The challenges with scalability are not only about adding more devices but also about maintaining them. Consider what it takes to keep the IoT devices on several locations operating effectively: monitoring their battery levels and replacing batteries, ensuring consistent and strong connectivity, dealing with each sensor‘s reporting intervals, as well as remote firmware updates over the entire lifecycle. Although these issues seem to add some complications to the mix when you consider implementing IoT to your operations, the efforts will be more than rewarded in the savings received. What is Massive IoT? Massive IoT sets some requirements for the technologies used. For this article, we partnered with Wirepas to go through the meaning and implications of massive scale IoT. 2. Easiness of installation and maintenance Easy installation and scale are paramount for smart facilities. A wonderful instant benefit of IoT is that its hardware, including sensors and gateways, are easy to install and user-friendly for the technicians. For example, wireless sensor installation should be as easy as mounting the sensor to walls, ceilings, under tables, etc. in a matter of seconds and validating the connectivity with a smartphone. Also, there should be no need to involve building IT infrastructure when connecting devices with mobile gateways. When considering different IoT solutions, one must remember that the amount of installation time per sensor will mirror directly to the overall cost. The instructions must be straightforward for technicians Downloaded by BENAZIR AE (arbenazir22@gmail.com) lOMoARcPSD|37383633
  • 9. and easy to understand. Also, the instructions should be easily available in, for example, a mobile app that can guide the technicians through both installation and maintenance procedures. 3. Reliability Buildings are built to last, and that‘s how the design for sensors and gateways should be approached as well. Batteries in sensors last for several years, therefore requiring very little maintenance. Once installed, the sensor maintenance should be minimal. As the installed sensor base scales, the less you need to worry about their connectivity, battery levels and signal strengths, the more time you have analyzing the data they give. Reliable maintenance makes sure that the dataflow is constant, all the devices are in operation and where they should be, and that nothing comes in the way of getting the most out of IoT in your smart facilities solution. 4. IoT Security The quality of security is one of the major key drivers of any type of development, and IoT data collection platforms are designed with privacy and security in mind. End-to-end security is employed from the sensors to the cloud application in terms of software, and from the factory to the location with no unknown software layers. Comprehensive security allows for protected integration to your cloud platform and ensures the continuity of its transmission. We at Haltian are overseeing security all the way from the manufacturing, where customer-specific encryption keys are installed in the software ensuring data integrity. We don‘t use any unknown software layers and interfaces. Our cloud partner for sensor operations is Amazon Web Services which means that our solution has gone through a thorough validation process and is tested regularly. 5. Easily integrated IoT ecosystem IoT ecosystem and value chains are rather long and complex, hence implementing that IoT solutions require various layers to talk to each other. A system that can deliver a cost-effective data collection solution for smart facilities with full integration to any cloud-based application is a massive forward driver. Haltian‘s Thingsee solution includes various sensors, gateways, cellular connectivity and software for device cloud. Our customers can have an IoT platform or cloud-based solution from another vendor, to which we integrate easily. The beauty of running a cloud-based solution is the ease of integration! Internet of Things Applications The Internet of Things (IoT) provides the ability to interconnect computing devices, mechanical machines, objects, animals or unique identifiers and people to transfer data across a network without the need for human-to-human or human-to-computer is a system of conversation. IoT applications bring a lot of value in our lives. The Internet of Things provides objects, computing devices, or unique identifiers and people's ability to transfer data across a network without the human-to-human or human-to-computer interaction. Downloaded by BENAZIR AE (arbenazir22@gmail.com) lOMoARcPSD|37383633
  • 10. A traffic camera is an intelligent device. The camera monitors traffic congestion, accidents and weather conditions and can access it to a common entrance. This gateway receives data from such cameras and transmits information to the city's traffic monitoring system. For example, the municipal corporation has decided to repair a road that is connected to the national highway. It may cause traffic congestion to the national highway. The insight is sent to the traffic monitoring system. The intelligent system analyzes the situation, estimate their impact, and relay information to other cities connected to the same highway. It generates live instructions to drivers by smart devices and radio channels. It creates a network of self-dependent systems that take advantage of real-time control. What is IoT? Downloaded by BENAZIR AE (arbenazir22@gmail.com) lOMoARcPSD|37383633
  • 11. IoT is a platform where embedded devices are connected to the Internet to collect and exchange data. It enables machines to interact, collaborate and learn from experiences like humans. IoT applications equipped billions of objects with connectivity and intelligence. Applications of IoT 1. Wearables Wearable technology is the hallmark of IoT applications and one of the earliest industries to deploy IoT. We have fit bits, heart rate monitors and smartwatches these days. Guardian glucose monitoring device has been developed to help people with diabetes. It detects glucose levels in our body, uses a small electrode called the glucose sensor under the skin, and relates it to a radiofrequency monitoring device. 2. Smart Home Applications The smart home is probably the first thing when we talk about the IoT application. The example we see the AI home automation is employed by Mark Zuckerberg. Alan Pan's home automation system, where a string of musical notes uses in-house functions. 3. Health care IoT applications can transform reactive medical-based systems into active wellness-based systems. Resources that are used in current medical research lack important real-world information. It uses controlled environments, leftover data, and volunteers for clinical trials. The Internet of Things improves the device's power, precision and availability. IoT focuses on building systems rather than just tools. Here's how the IoT-enabled care device works. Downloaded by BENAZIR AE (arbenazir22@gmail.com) lOMoARcPSD|37383633
  • 12. 4. Smart Cities Most of you have heard about the term smart city. Smart city uses technology to provide services. The smart city includes improving transportation and social services, promoting stability and giving voice to their citizens. The problems faced by Mumbai are very different from Delhi. Even global issues, such as clean drinking water, declining air quality, and increasing urban density, occur in varying intensity cities. Therefore, they affect every city. Governments and engineers use the Internet of Things to analyze the complex factors of town and each city. IoT applications help in the area of water management, waste control and emergencies. Example of a smart city - Palo Alto. Palo Alto, San Francisco, is the first city to acquire the traffic approach. He realized that most cars roam around the same block on the streets in search of parking spots. It is the primary cause of traffic congestion in the city. Thus, the sensors were installed at all parking areas in the city. These sensors pass occupancy status to the cloud of each spot. This solution involves the use of sensor arrays that collects data and uses it for many purposes. 5. Agriculture By the year 2050, the world's growing population is estimated to have reached about 10 billion. To feed such a large population, agriculture needs to marry technology and get the best results. There are many possibilities in this area. One of them is Smart Greenhouse. Farming techniques grow crops by environmental parameters. However, manual handling results in production losses, energy losses and labor costs, making it less effective. The greenhouse makes it easy to monitor and enables to control the climate inside it. Downloaded by BENAZIR AE (arbenazir22@gmail.com) lOMoARcPSD|37383633
  • 13. 6. Industrial Automation It is one of the areas where the quality of products is an essential factor for a more significant investment return. Anyone can re-engineer products and their packaging to provide superior performance in cost and customer experience with IoT applications. IoT will prove as a game-changer. In industrial automation, IoT is used in the following areas: o Product flow monitoring o Factory digitization o Inventory management o Safety and security o Logistics and Supply Chain Optimization o Quality control o Packaging customization Downloaded by BENAZIR AE (arbenazir22@gmail.com) lOMoARcPSD|37383633
  • 14. 7. Hacked Car A connected car is a technology-driven car with Internet access and a WAN network. The technology offers the user some benefits such as in-car infotainment, advanced navigation and fuel efficiency. 8. Healthcare Healthcare do real-time monitoring with the help of smart devices. It gathers and transfers health data such as blood pressure, blood sugar levels, weight, oxygen, and ECG. The patient can contact the doctor by the smart mobile application in case of any emergency. 9. Smart Retail IoT applications in retail give shoppers a new experience. Customers do not have to stand in long queues as the checkout system can read the tags of the products and deduct the total amount from the customer's payment app with IoT applications' help. 10. Smart Supply Chain Customers automate the delivery and shipping with a smart supply chain. It also provides details of real-time conditions and supply networks. 11. Smart Farming Farmers can minimize waste and increase productivity. The system allows the monitoring of fields with the help of sensors. Farmers can monitor the status of the area. Internet-connected devices go from 5 million to billions in just one year. Business Insider Intelligence estimates 24 billion IoT devices will install and generate more than 300 billion in revenue in the future. Internet of Things TechnologyTrends 2023 Now, let‘s move on to the top IoT trends that will determine the industry‘s development this year. 1. IoT Security The increasing number of devices connected to the internet brings new vulnerabilities and exposures to companies and private users. If one machine in an IoT ecosystem is compromised, other devices are automatically at risk, since they are all connected. Common IoT security issues include:  data leaks and data breaches  malware, ransomware, DDoS attacks  software weaknesses due to poor development  outdated software  device mismanagement. That‘s why cybersecurity should be prioritized when developing and implementing IoT solutions in all industries. The global IoT security spending is predicted to amount to $6.68 billion in 2023. Following are some trends that will help businesses and users improve their Internet of Things cybersecurity this year. Downloaded by BENAZIR AE (arbenazir22@gmail.com) lOMoARcPSD|37383633
  • 15.  Cybersecurity software — more enterprises will invest in software solutions that protect IoT devices from cyberattacks. An example of such software is Quantum IoT Protect by Check Point, which discovers risks, assesses them, and prevents unauthorized access.  Password management software — more digital businesses will leverage solutions that provide IoT credential management and eliminate threats connected with weak or default passwords. Credential hygiene is supported by periodically rotating passwords in the system and ensuring that they comply with security requirements.  Network security tools — more companies will enhance their network security with the help of firewalls, identity, and access management (IAM) products, remote access VPN, and other tools.  Government regulations — more countries will develop and enact laws and standards to regulate the production and usage of connected devices. IoT manufacturers and businesses will be obliged to comply with a range of security norms.  Cybersecurity strategy — business leaders will pay greater attention to developing in-house cybersecurity strategies. 2. Digital Twins and the Metaverse in Enterprises The technology of digital twins is quite young, but various enterprises with implemented IoT systems are already embracing it. In their essence, digital twins allow you to test a product, process, or business model based on collected data without risking real-world assets. For example, using a digital twin of some manufacturing process in a plant, workers can create various optimization models, test hypotheses, and predict possible issues. All this happens in a simulated reality, while in the real world the plant employees will apply only the most suitable optimization model and avoid unnecessary expenses. Digital twins can also simulate hacker attacks on IoT systems so that security experts can improve their means of data protection. The metaverse is an even younger concept, but it‘s gaining traction and is built, among other technologies, on digital twins. We can say that the metaverse technology is an expanded digital twin of a real-world space where people can interact with each other. In the near future, it will be possible not only to have fun, but also to work, study, go shopping, and have a doctor appointment in the metaverse. In fact, it can become a comprehensive digital twin of the reality we live in. 3. IoT in Healthcare The healthcare sector is experiencing considerable investments in digitalization, including IoT adoption. The Internet of Things has enormous potential to transform the entire industry as it allows for improved diagnostics and a personalized approach to treatment. No wonder an independent branch — the Internet of Medical Things (IoMT) as part of the general digital health concept — has appeared. Some IoT use cases that have become popular in hospitals around the world include:  medical wearables  patient data collection and analytics  smart diagnostic tools  robotic surgery machines  monitoring systems to supervise patients and control storage conditions in laboratories. Note: IoT advancements in healthcare and other industries are tightly coupled with machine learning, artificial intelligence, virtual reality, and other advanced technologies. The healthcare business model is also altered under the influence of IoT, bringing benefits both for patients and service providers: Downloaded by BENAZIR AE (arbenazir22@gmail.com) lOMoARcPSD|37383633
  • 16.  Reduced costs. Using IoT sensors, healthcare providers ensure continuous real-time monitoring for patients who require it. This way, they improve the quality of medical care and reduce its costs, because medical workers no longer need to regularly check patients‘ vital signs.  Improved disease control. When patients are under constant monitoring and caregivers have access to real- time data, it is possible to provide early diagnosis and preventive care. Combining this with constant monitoring of the therapy effectiveness, healthcare providers can help prevent serious complications.  Remote consultations. For some population groups (e.g., those living in remote areas) it‘s challenging to access medical institutions on time to get effective treatment. Such people can use IoT solutions paired with mobile applications to collect and communicate health data to doctors and receive consultation based on it.  Patient engagement. IoT in healthcare is shifting the focus to patients and their needs. Patients can now control their health conditions independently, and contact a medical specialist only if needed. This creates a new relationship model between doctor and patient, in which the latter becomes a partner in preventing and treating diseases. 4. Edge IoT The Internet of Things in many ways depends on cloud computing. Unfortunately, cloud services have significant drawbacks, such as low bandwidth and possible high latency, which may cause issues in real- time data processing. This is why numerous companies are currently investing in edge computing technology. 5. Governance and Regulation in the IoT Space Challenges of IoT A few of the challenges are as follows: · Boundary and technical limitation is a few areas of technology · Cybercrime · Intellectual Property Rights · More value must be extracted from the app instead of just concentrating on silicon-based technology · Technology standard is inconsistent and remains disjointed in the majority of the fields. · Not sufficient security for user data and their protection Downloaded by BENAZIR AE (arbenazir22@gmail.com) lOMoARcPSD|37383633
  • 17. UNIT II IOT ARCHITECTURE IoT reference model and architecture -Node Structure - Sensing, Processing, Communication, Powering, Networking - Topologies, Layer/Stack architecture, IoT standards, Cloud computing for IoT, Bluetooth, Bluetooth Low Energy beacons. Architecture of Internet of Things (IoT) Internet of Things (IoT) technology has a wide variety of applications and use of Internet of Things is growing so faster. Depending upon different application areas of Internet of Things, it works accordingly as per it has been designed/developed. But it has not a standard defined architecture of working which is strictly followed universally. The architecture of IoT depends upon its functionality and implementation in different sectors. Still, there is a basic process flow based on which IoT is built. So. here in this article we will discuss basic fundamental architecture of IoT i.e., 4 Stage IoT architecture. 4 Stage IoT architecture So, from the above image it is clear that there is 4 layers are present that can be divided as follows: Sensing Layer, Network Layer, Data processing Layer, and Application Layer. These are explained as following below. 1. Sensing Layer – The sensing layer is the first layer of the IoT architecture and is responsible for collecting data from different sources. This layer includes sensors and actuators that are placed in the environment to gather information about temperature, humidity, light, sound, and other physical parameters. These devices are connected to the network layer through wired or wireless communication protocols. 2. Network Layer – The network layer of an IoT architecture is responsible for providing communication and connectivity between devices in the IoT system. It includes protocols and technologies that enable devices to connect and communicate with each other and with the wider internet. Examples of network technologies that are commonly used in IoT include WiFi, Bluetooth, Zigbee, and cellular networks such as 4G and 5G. Additionally, the network layer may include gateways and routers that act as intermediaries between devices and the wider internet, and may also include security features such as encryption and authentication to protect against unauthorized access. 3. Data processing Layer – The data processing layer of IoT architecture refers to the software and hardware components that are responsible for collecting, analyzing, and interpreting data from IoT devices. This layer is responsible for receiving raw data from the devices, processing it, and making it available for further analysis or action.The data processing layer includes a variety of technologies and tools, such as data management systems, analytics platforms, and machine learning algorithms. These tools are used to extract meaningful insights from the data and make decisions based on that data.Example of a technology used in the data processing layer is a data lake, which is a centralized repository for storing raw data from IoT devices. Downloaded by BENAZIR AE (arbenazir22@gmail.com) lOMoARcPSD|37383633
  • 18. 4. Application Layer – The application layer of IoT architecture is the topmost layer that interacts directly with the end-user. It is responsible for providing user-friendly interfaces and functionalities that enable users to access and control IoT devices.This layer includes various software and applications such as mobile apps, web portals, and other user interfaces that are designed to interact with the underlying IoT infrastructure. It also includes middleware services that allow different IoT devices and systems to communicate and share data seamlessly.The application layer also includes analytics and processing capabilities that allow data to be analyzed and transformed into meaningful insights. This can include machine learning algorithms, data visualization tools, and other advanced analytics capabilities. IoT node IoT node Within the IoT (Internet of Things) ecosystem, buildings can be considered as basic cells of the city and can provide valuable and relevant information about the city. It means that they‘re just another object in this is environment. We are therefore interested in the information it generates. The main two features of an IoT node are to manage the interconnection between the building and the rest of the network and to recollect the information generated by itself (all the relevant systems inside the building). In other words, the IoT nodes are the elements within an IoT ecosystem than allow the connection of the physical world with the Internet. These kinds of devices are conceived as hubs of information from multiple sensors with diverse origins. This information has to be stored (only data considered of interest), processed based on his value, and make it available to higher-level systems (or smart city platforms) through private networks or Internet, for the provision of basic services through open, free and (as far as possible) standardised protocols. Regarding processing capabilities, it‘s a good practice to apply edge computing on nodes, because IoT produces a large amount of data that needs to be processed and analysed so it can be used (for decision making). The purpose of edge computing is to move computing services closer to the source of the data, and that fits perfectly on IoT devices. In the specific case of the city of Terrassa, the device chosen was the Industrial PC-BL2 BPC 1000 - 2404777 (https://www.phoenixcontact.com/es-es/productos/box-pc-bl2-bpc-1000-2404777) Downloaded by BENAZIR AE (arbenazir22@gmail.com) lOMoARcPSD|37383633
  • 19. In addition to meeting the requirements of an IoT node, in our case we had additional needs for the further management and monitoring of these devices, such as: - The operating system used by the IoT node must be Open Source. - The operating system must be compatible with the corporate monitoring system. - The Operating System must be compatible with the corporate automation system. - The device must be compatible with our image distribution system. - Ability to be installed in a communications rack. 1: What is the IoT, and What Does it Do? It‘s probably best to start talking about the entirety of the Internet of Things with a definition. The Internet of Things is the ecosystem made by connecting every kind of device to the internet for the purposes of acquiring data, control and automation, remote sensing, and more without human intervention. It‘s a very broad definition, but that speaks to just how far reaching the potential applications are. Philosophically speaking, it‘s about making all the information of the world accessible and being able to act on it in ways that save human effort and make our lives better and more efficient. This is why people often distinguish between ―smart‖ and ―dumb‖ devices in reference to the IoT. Every object that we interact with every single day has some form of data inherent to it. Without a means to sense, capture, process, and send that information, most of these objects remain dumb objects. There is something meaningful that they can measure about themselves, or that can be controlled and automated, but the electronics and software are not in place. Now, thanks to increasingly more affordable sensors, it‘s no longer impractical to outfit nearly everything with wireless microcomputer hardware that can harvest that meaningful information or be remote controlled by the cloud. If you have ever looked at your running shoes and wondered exactly how many steps you‘ve taken in them, you can start to see the broad horizon of what the IoT can do. This is the kind of meaningful information inherent to an object that the IoT is designed for. The possibilities are endless. What the IoT is really about, therefore, is solving very human problems in elegant ways. What if a pill can be outfitted with sensors to take and share measurements inside the body, eliminating the problem of an invasive scope? What if your refrigerator can tell you when you‘re at the store that you need a gallon of milk? What if your garden can alert you that it‘s thirsty, or your front door can remind you that you forgot to lock it? And then, what if you can lock it with your phone, anywhere on planet earth? This is what the IoT is built to solve. Everything around us is better when its properties are known, when it‘s controllable, and when it can alert us to problems before they become problems. In short – the IoT means a better, more convenient life for people in ways great and small. Imagination really is the only limit. 2: Architecting the IoT with the Node / Gateway / Cloud Model The IoT is the result of a lot of devices operating in coordination with each other, sometimes asynchronously or agnostic of each other. They operate at different levels, and each take custody of different aspects of data‘s journey to and from the internet. Downloaded by BENAZIR AE (arbenazir22@gmail.com) lOMoARcPSD|37383633
  • 20. There are all sorts of devices in the IoT, but they can very generally be broken down into three roles: Nodes, Gateways, and Cloud Services. Together, they form a chain that gets data where it needs to go: Nodes at the smart device, Gateways positioned within range to provide the uplink/downlink with the internet, and the Cloud to store data, manipulate it, and initiate actions down to nodes again. IoT Nodes – Sensing and Controlling The most numerous type of device in the IoT can be referred to as the node. These are all the exciting devices that are providing sensor data, or devices that are being controlled from the cloud. This means things like door locks, security sensors, temperature sensors, and more. Put simply, the node is the ―thing‖ in Internet of Things, and until recently they were a practical impossibility. Nodes tend to be either lightweight sensor devices, which primarily gather status information over a pre-programmed interval, or middleweight devices which also offer controllable functions (like a door lock which can be toggled, traffic lights whose patterns can be adjusted, or industrial equipment which can be disabled if a fault is triggered. The IoT node as we know it today, in its most minimal use case, can be a sensor embedded in an object that is never serviced again across the life of the device. They can be wireless and operated on a coin cell battery for years. What seemed impossible just a few years ago is now quickly becoming standard. And that‘s thanks to incredible innovations in low-power operation of wireless modules. Laird Connectivity‘s BL654, for example, is a product that comes from a long line of Bluetooth modules that support Bluetooth Low Energy (BLE). BLE, introduced in the Bluetooth v4.0 specification, enables infrequent status-type messaging between Bluetooth devices with long sleep cycles in between messages. Downloaded by BENAZIR AE (arbenazir22@gmail.com) lOMoARcPSD|37383633
  • 21. The BL654 consumes 4.8 mA power at peak transmission. But during deep sleep, which can be configured to last a very long time, it only consumes 0.4µA – about 12,000x less power. This is leaps ahead of the kind of power savings that were possible even just a decade ago, and it‘s part of the reason that the IoT is finally beginning to live up to its promise. Not all nodes are light on power consumption – they can be bigger, more complicated devices that run on AC power as well. However, the ability to put a sensor into virtually anything and give it years of battery life is the primary driver for the explosion of smart devices that we see now. It also creates a challenge, because a low power wireless hub is needed that can support lots of devices connecting infrequently. And there are lots of approaches to doing that, which we refer to as gateways. IoT Gateways – The Launch Pad to the Web The IoT gateway is the central hub for sensors that collects their data, and they come in many forms. They interface directly with sensors and provide the path for that data to go to the cloud. Gateways can be designed to operate in so many ways that it can be hard to generalize. In some cases they may listen passively, and the sensor operates without even knowing the gateway is there. In some cases they may establish bidirectional communication with the sensor, allowing the sensor to be controlled by the cloud through the gateway. A gateway may be a small unit collocated with the sensors on- site, or it may be the massive cellular tower miles away. Much of this depends on what wireless technology is used, all of which have advantages and disadvantages. Most IoT devices communicate over either Wi-Fi, LTE, Bluetooth, or LoRaWAN. These technologies vary in their available throughput, their range, their power consumption, and more. Selecting the right technology for a given use case is an important early decision for an IoT implementation, as well. For those who are especially protective of their data, LoRaWAN may make the most sense as it allows you to build a private network without relying on a big public gateway, like a cellular tower. For a smart home installation, where the components are all nearby, a short-range Bluetooth gateway can offer adequate coverage at a substantially smaller power consumption and send the data to the internet over home internet service. If higher throughput is needed (like a group of security cameras that are capturing live video), a Wi-Fi gateway can provide coverage over a whole facility to capture that video and send over Ethernet to the server that catalogs that video. Importantly, gateways are often multi-protocol for this reason. Gather sensor data over Bluetooth and send it to the internet over Ethernet. Connect industrial hardware over serial port to a gateway, and control that gateway via a Wi-Fi connection to the internet. The purpose of a gateway is to bridge devices and make them accessible, and this very often means supporting multiple types of connectivity. Laird Connectivity‘s IG60, for example, supports Wi-Fi, Downloaded by BENAZIR AE (arbenazir22@gmail.com) lOMoARcPSD|37383633
  • 22. Bluetooth, Ethernet, Serial, and USB connection, because retrofitting IoT connectivity to an existing system can mean having to resolve lots of different protocols and connector types to connect to the cloud. Cloud Services – The Brains of the Operation The cloud aspect of IoT is where real intelligence happens, and what makes the IoT more than just a collection of devices talking to each other. The cloud is composed of the storage and processing in a data center that allows data to be pulled in from a gateway and to be manipulated or analyzed in software. This tends to be a subscription type service such as Amazon Web Services or Microsoft Azure, although it‘s possible to host the cloud storage and computing independently on your own server. The major advantage of suppliers like Amazon and Microsoft is the worldwide access, content distribution, and ability to scale which enables very large and flexible IoT applications. The cloud, more than anything, is about gaining insights into the data around us to make meaningful changes that make things better. Consider the following example: A factory is outfitted with sensors on all of its manufacturing equipment to keep a watchful eye on operations. The factory‘s administrators can see when equipment is running, when it stops, gather machine codes that the equipment spits out if there is a fault, and more. All of this by itself is already useful – the ability to see this all in one dashboard removes the need to have inspectors constantly examining the equipment. Centralized information is a major efficiency advantage. However, with the cloud, the factory administrators can go much farther. A well-crafted cloud application can look for trends in that information. Maybe it‘s discovered that a stamping machine routinely goes down every night between 10 and 10:30. And it‘s also discovered that the materials that stamping machine needs are being scanned in at the wrong loading location. The solution becomes obvious: change the process so that those materials are loaded at a different location, making sure the needed parts are in the right place at the right time to eliminate outages. A problem which was hiding in plain sight becomes obvious when the data is analyzed. The solution becomes immediately apparent. This is the philosophy behind the many ways that the cloud can be used to make all kinds of things work better, smarter, and more efficiently. It also allows tasks that would have required human time and effort to be automated, making people‘s lives easier and decreasing errors. The applications are truly limitless, and the cloud is what enables this. 4: Breaking the Model – Designing to Your Specific Use Case There is no limit to the kinds of intelligence and control you can achieve with your devices. While we‘ve focused largely on lightweight sensors that make up the majority of devices, there is no limit to what can be achieved in the IoT. It‘s an exercise in creativity, and in manufacturers‘ ability to identify what‘s useful to them and how to leverage it towards a better way to get things done. Downloaded by BENAZIR AE (arbenazir22@gmail.com) lOMoARcPSD|37383633
  • 23. While the node/gateway/cloud model seems inherently to move from the most lightweight and distributed up to the most powerful and centralized, that‘s only one way to approach the IoT. There are lots of ways to build an IoT solution. In extreme cases, you may not have a centralized gateway at all. For example, consider a warehouse with several industrial freezers. It may be that maintenance workers on site already have regular tasks that must be performed every few hours. Since workers will be visiting each refrigeration unit several times a day, it may make the most sense to log data on a sensor at each freezer and manually collect it via a smartphone or other handheld device at each visit. In this case, the smartphone or handheld serves as a temporary gateway, and data transfer only happens when it‘s initiated in person. It‘s much different from a central gateway scenario, but it may be the most sensible option for that OEM. Standardizing the IoT Smart objects produce large volumes of data. This data needs to be managed, processed, transferred and stored securely. Standardization is key to achieving universally accepted specifications and protocols for true interoperability between devices and applications. The use of standards:  ensures interoperable and cost-effective solutions  opens up opportunities in new areas  allows the market to reach its full potential The more things are connected, the greater the security risk. So, security standards are also needed to protect the individuals, businesses and governments which will use the IoT. IoT and Cloud Computing One component that improves the success of the Internet of Things is Cloud Computing. Cloud computing enables users to perform computing tasks using services provided over the Internet. The use of the Internet of Things in conjunction with cloud technologies has become a kind of catalyst: the Internet of Things and cloud computing are now related to each other. These are true technologies of the future that will bring many benefits. Due to the rapid growth of technology, the problem of storing, processing, and accessing large amounts of data has arisen. Great innovation relates to the mutual use of the Internet of Things and cloud technologies. In combination, it will be possible to use powerful processing of sensory data streams and new monitoring services. As an example, sensor data can be uploaded and saved using cloud computing for later use as intelligent monitoring and activation using other devices. The goal is to transform data into insights and thus drive cost-effective and productive action. Benefits And Functions of IoT Cloud: There are many benefits of combining these services – 1. IoT Cloud Computing provides many connectivity options, implying large network access. People use a wide range of devices to gain access to cloud computing resources: mobile devices, tablets, laptops. This is convenient for users but creates the problem of the need for network access points. 2. Developers can use IoT cloud computing on-demand. In other words, it is a web service accessed without special permission or any help. The only requirement is Internet access. 3. Based on the request, users can scale the service according to their needs. Fast and flexible means you can expand storage space, edit software settings, and work with the number of users. Due to this characteristic, it is possible to provide deep computing power and storage. 4. Cloud Computing implies the pooling of resources. It influences increased collaboration and builds close connections between users. Downloaded by BENAZIR AE (arbenazir22@gmail.com) lOMoARcPSD|37383633
  • 24. 5. As the number of IoT devices and automation in use grows, security concerns emerge. Cloud solutions provide companies with reliable authentication and encryption protocols. 6. Finally, IoT cloud computing is convenient because you get exactly as much from the service as you pay. This means that costs vary depending on use: the provider measures your usage statistics. A growing network of objects with IP addresses is needed to connect to the Internet and exchange data between the components of the network. It is important to note that cloud architecture must be well-designed since reliability, security, economy, and performance optimization depends upon it. Using well-designed CI/CD pipelines, structured services, and sandboxed environments results in a secure environment and agile development. Comparison of Internet of Things and Cloud Computing: Cloud is a centralized system helping to transfer and deliver data and files to data centers over the Internet. A variety of data and programs are easy to access from a centralized cloud system. The Internet of Things refers to devices connected to the Internet. In the IoT, data is stored in real-time, as well as historical data. The IoT can analyze and instruct devices to make effective decisions, as well as track how certain actions function. Cloud computing encompasses the delivery of data to data centers over the Internet. IBM divides cloud computing into six different categories: 1. Platform as a Service (PaaS) – The cloud contains everything you need to build and deliver cloud applications so there is no need to maintain and buy equipment, software, etc. 2. Software as a Service (SaaS) – In this case, applications run in the cloud and other companies operate devices that connect to users‘ computers through a web browser. 3. Infrastructure as a Service (IaaS) – IaaS is an option providing companies with storage, servers, networks and hubs processing data for each use. 4. Public cloud – Companies manage spaces and provide users with quick access through the public network. 5. Private cloud – The same as a public cloud, but only one person has access here, which can be an organization, an individual company, or a user. 6. Hybrid cloud – Based on a private cloud, but provides access to a public cloud. What is a beacon? A beacon is a small Bluetooth radio transmitter, powered by batteries. Beacons are similar to a lighthouse in functionality. These small hardware devices incessantly transmit Bluetooth Low Energy (BLE) signals. The Bluetooth enabled smartphones are capable of scanning and displaying these signals. Beacons could be deployed on store-fronts, real estate properties, amusement parks, events and other public venues to broadcast contextually-relevant advertisements and notifications. Downloaded by BENAZIR AE (arbenazir22@gmail.com) lOMoARcPSD|37383633
  • 25. What is a BLE beacon? It is important to understand the difference between classic Bluetooth and Bluetooth Low Energy to appreciate BLE beacons. Classic Bluetooth consumes high power and transmits to long ranges, which is suited for Bluetooth headsets and speakers. However, Bluetooth Low Energy transmits less data over a smaller range, hence consuming much less power. BLE beacons transfers small amounts of data at regular intervals of time. How does a Bluetooth beacon work? To understand how beacons work let's take an example of a coffee shop with beacon deployment. 1. Let‘s assume, beacons are deployed at the entrance of a coffee shop 2. These beacons transmit signals in its range. The range of beacons vary from 20m to 300m. (Know more about the range of Beaconstac beacons) 3. Smartphones in the range of beacons is itself indicating that the smartphones are nearby. 4. The smartphone then sends the ID number attached to the signal to the cloud server 5. The server responds with the action linked to the beacon ID. It could be a notification introducing a new appetizer in the cafe, combo deals, video of coffee making or a feedback form! 6. These notifications drive customers to a webpage, a form, a phone number or whatever you plan to do. Downloaded by BENAZIR AE (arbenazir22@gmail.com) lOMoARcPSD|37383633
  • 26. What is Bluetooth? Bluetooth simply follows the principle of transmitting and receiving data using radio waves. It can be paired with the other device which has also Bluetooth but it should be within the estimated communication range to connect. When two devices start to share data, they form a network called piconet which can further accommodate more than five devices. Points to remember for Bluetooth:  Bluetooth Transmission capacity 720 kbps.  Bluetooth is Wireless.  Bluetooth is a Low-cost short-distance radio communications standard.  Bluetooth is robust and flexible.  Bluetooth is cable replacement technology that can be used to connect almost any device to any other device.  The basic architecture unit of Bluetooth is a piconet. Bluetooth Architecture: The architecture of Bluetooth defines two types of networks: 1. Piconet 2. Scatternet Piconet: Piconet is a type of Bluetooth network that contains one primary node called the master node and seven active secondary nodes called slave nodes. Thus, we can say that there is a total of 8 active nodes which are present at a distance of 10 meters. The communication between the primary and secondary nodes can be one-to-one or one-to-many. Possible communication is only between the master and slave; Slave-slave communication is not possible. It also has 255 parked nodes, these are secondary nodes and cannot take participation in communication unless it gets converted to the active state. Scatternet: It is formed by using various piconets. A slave that is present in one piconet can act as master or we can say primary in another piconet. This kind of node can receive a message from a master in one piconet and deliver the message to its slave in the other piconet where it is acting as a master. This type of node is referred to as a bridge node. A station cannot be mastered in two piconets. Downloaded by BENAZIR AE (arbenazir22@gmail.com) lOMoARcPSD|37383633
  • 27. Bluetooth protocol stack: Types of Bluetooth Various types of Bluetooth are available in the market nowadays. Let us look at them.  In-Car Headset: One can make calls from the car speaker system without the use of mobile phones.  Stereo Headset: To listen to music in car or in music players at home.  Webcam: One can link the camera with the help of Bluetooth with their laptop or phone.  Bluetooth-equipped Printer: The printer can be used when connected via Bluetooth with mobile phone or laptop.  Bluetooth Global Positioning System (GPS): To use GPS in cars, one can connect their phone with car system via Bluetooth to fetch the directions of the address. Advantage:  It is a low-cost and easy-to-use device.  It can also penetrate through walls.  It creates an Ad-hoc connection immediately without any wires.  It is used for voice and data transfer. Disadvantages:  It can be hacked and hence, less secure.  It has a slow data transfer rate: of 3 Mbps.  It has a small range: 10 meters.  Bluetooth communication does not support routing.  The issues of handoffs have not been addressed. Applications:  It can be used in laptops, and in wireless PCs, printers. Downloaded by BENAZIR AE (arbenazir22@gmail.com) lOMoARcPSD|37383633
  • 28.  It can be used in wireless headsets, wireless PANs, and LANs.  It can connect a digital camera wirelessly to a mobile phone.  It can transfer data in terms of videos, songs, photographs, or files from one cell phone to another cell phone or computer.  It is used in the sectors of Medical health care, sports and fitness, Military. UNIT III PROTOCOLS AND WIRELESS TECHNOLOGIES FOR IOT PROTOCOLS: NFC, SCADA and RFID, Zigbee MIPI, M-PHY, UniPro, SPMI, SPI, M-PCIe GSM, CDMA, LTE, GPRS, small cell. Wireless technologies for IoT: WiFi (IEEE 802.11), Bluetooth/Bluetooth Smart, ZigBee/ZigBee Smart, UWB (IEEE 802.15.4), 6LoWPAN, Proprietary systems-Recent trends. Near Field Communication (NFC) NFC stands for Near Field Communication. It enables short range communication between compatible devices. At least one transmitting device and another receiving device is needed to transmit the signal. Many devices can use the NFC standard and are considered either passive or active. So NFC devices can be classified into 2 types: 1. Passive NFC devices – These include tags, and other small transmitters which can send information to other NFC devices without the need for a power source of their own. These devices don‘t really process any information sent from other sources, and can not connect to other passive components. These often take the form of interactive signs on walls or advertisements. 2. Active NFC devices – These devices are able to both the things i.e. send and receive data. They can communicate with each other as well as with passive devices. Smartphones the best example of active NFC device. Card readers in public transport and touch payment terminals are also good examples of the technology. How does NFC work? Like other wireless signals Bluetooth and WiFi, NFC works on the principle of sending information over radio waves. Near Field Communication is another standard for wireless data transition which means devices must adhere to certain specifications in order to communicate with each other properly. The technology used in NFC is based on older technology which is the RFID (Radio-frequency identification) that used electromagnetic induction in order to transmit information. This creates one major difference between NFC and Bluetooth/WiFi. NFC can be used to induce electric currents within passive components rather than just send data. This means that their own power supply is not required by passive devices. Instead they can be powered by the electromagnetic field produced by an active NFC component when it comes into range. NFC technology unfortunately does not command enough inductance to charge our smartphones, but QI charging is based on the same principle. The transmission frequency is 13.56 megahertz for data across NFC. Data can be sent at either 106, 212, or 424 kilobits per second which is quick enough for a range of data transfers like contact details to swapping pictures and music. The NFC standard currently has three distinct modes of operation to determine what sort of information will be exchanged between devices. 1. The most common used in smartphones is the peer-to-peer mode. Exchange of various piece of information is allowed between 2 devices. In this mode both devices switch between active when sending data and passive when receiving. Downloaded by BENAZIR AE (arbenazir22@gmail.com) lOMoARcPSD|37383633
  • 29. 2. The second mode i.e. read/write mode is a one-way data transmission. The active device, possibly your smartphone, links up with another device in order to read information from it. NFC advertisement tags use this mode. 3. The third mode of operation is card emulation. The NFC device can function as a smart or contactless credit card and make payments or tap into public transport systems. Comparisons with Bluetooth – There are several important technological differences between NFC and bluetooth but NFC has some significant benefits in certain circumstances. The major advantage of NFC over bluetooth is that it requires much less power consumption than Bluetooth. This makes NFC perfect for passive devices, such as the advertising tags as they can operate without a major power source. But this power saving does have some major drawbacks. First and the foremost is that the range of transmission of NFC is much shorter than Bluetooth which is a major drawback. NFC has a range of around 10 cm, just a few inches whereas Bluetooth connections can transmit data up to 10 meters or more from the source. Another drawback is that NFC is quite a bit slower than Bluetooth. NFC can transmit data at a maximum speed of just 424 kbit/s, whereas Bluetooth 2.1 can transmit 2.1 Mbit/s and with Bluetooth Low Energy around 1 Mbit/s . NFC has one another major advantage i.e. faster connectivity. It uses inductive coupling(i.e. the absence of manual pairing) which takes less than one tenth of a second to establish a connection between two devices. While modern Bluetooth connects pretty fast, NFC is still super handy for certain scenarios as mobile payments. Samsung Pay, Android Pay, and even Apple Pay use NFC technology though Samsung Pay works a bit differently than the others. While Bluetooth works better for connecting devices together for file transfers, sharing connections to speakers, and more, we anticipate that NFC will always have a place in this world thanks to mobile payments — a quickly expanding technology. SCADA: Supervisory Control and Data Acquisition SCADA stands for Supervisory Control and Data Acquisition. It is a computer system designed to gather and analyse real-time data. It is used to control and monitor the equipment and manufacturing processes in various industries in different fields such as water and waste control, telecommunications, oil and gas refining, power generation, and transportation. SCADA systems were used for the first time in the 1960s. SCADA controls the functioning of equipment involved in manufacturing, production, fabrication, development, and more. It is also used for infrastructural processes such as gas and oil distribution, electrical power distribution, water distribution, and more. Thus, it has reduced human intervention to a great extent. Furthermore, it is also used by industrial organizations to accomplish the followings tasks. Downloaded by BENAZIR AE (arbenazir22@gmail.com) lOMoARcPSD|37383633
  • 30. o To control industrial processes locally as well as at remote locations o To monitor, gather and process real-time data o To interact with devices such as sensors, valves, motors, pumps, and more using human-machine interface (HMI) software o It comprises both software and hardware It comprises both software and hardware, different industries have different requirements, so there may be some differences in their SCADA systems, but still, some features are common for all, such as: o Graphic interface o Process mimic o Real-time checking o Alarm system o Data acquisition o Data analysis o Report generator How SCADA Systems Work: Let us take an example of a leak on a pipeline. When a pipeline starts leaking, the SCADA system gathers information and forwards it to a central site and thus alerts the home station about the leak. It also analyses the situation, such as how big is the leak and how much water is being released. A SCADA system can be very simple such as which are used to monitor the environmental conditions of a small office building or complex or can be very advanced such as which are used to monitor the activity in a nuclear power plant or the activity of a municipal water system. Introduction of Radio Frequency Identification (RFID) Radio Frequency Identification (RFID) is a form of wireless communication that incorporates the use of electromagnetic or electrostatic coupling in the radio frequency portion of the electromagnetic spectrum to uniquely identify an object, animal or person. It uses radio frequency to search ,identify, track and communicate with items and people. it is a method that is used to track or identify an object by radio transmission uses over the web. Data digitally encoded in an RFID tag which might be read by the reader. This device work as a tag or label during which data read from tags that are stored in the database through the reader as compared to traditional barcodes and QR codes. It is often read outside the road of sight either passive or active RFID. Downloaded by BENAZIR AE (arbenazir22@gmail.com) lOMoARcPSD|37383633
  • 31. Kinds of RFID : There are many kinds of RFID, each with different properties, but perhaps the most fascinating aspect of RFID technology is that most RFID tags have neither an electric plug nor a battery. Instead, all of the energy needed to operate them is supplied in the form of radio waves by RFID readers. This technology is called passive RFID to distinguish it from the(less common) active RFID in which there is a power source on the tag. UHF RHID ( Ultra-High Frequency RFID ). It is used on shipping pallets and some driver‘s licenses. Readers send signals in the 902-928 MHz band. Tags communicate at distances of several meters by changing the way they reflect the reader signals; the reader is able to pick up these reflections. This way of operating is called backscatter. HF RFID (High-Frequency RFID ). It operates at 13.56 MHz and is likely to be in your passport, credit cards, books, and noncontact payment systems. HF RFID has a short-range, typically a meter or less because the physical mechanism is based on induction rather than backscatter. There are also other forms of RFID using other frequencies, such as LF RFID(Low-Frequency RFID), which was developed before HF RFID and used for animal tracking There are two types of RFID : 1. Passive RFID – Passive RFID tags does not have thier own power source. It uses power from the reader. In this device, RF tags are not attached by a power supply and passive RF tag stored their power. When it is emitted from active antennas and the RF tag are used specific frequency like 125-134MHZ as low frequency, 13.56MHZ as a high frequency and 856MHZ to 960MHZ as ultra-high frequency. 2. Active RFID – In this device, RF tags are attached by a power supply that emits a signal and there is an antenna which receives the data. means, active tag uses a power source like battery. It has it‘s own power source, does not require power from source/reader. Working Principle of RFID : Generally, RFID uses radio waves to perform AIDC function. AIDC stands for Automatic Identification and Data Capture technology which performs object identification and collection and mapping of the data. An antenna is an device which converts power into radio waves which are used for communication between reader and tag. RFID readers retrieve the information from RFID tag which detects the tag and reads or writes the data into the tag. It may include one processor, package, storage and transmitter and receiver unit. Working of RFID System : Every RFID system consists of three components: a scanning antenna, a transceiver and a transponder. When the scanning antenna and transceiver are combined, they are referred to as an RFID reader or interrogator. There are two types of RFID readers — fixed readers and mobile readers. The RFID reader is a network-connected device that can be portable or permanently attached. It uses radio waves to transmit signals that activate the tag. Once activated, the tag sends a wave back to the antenna, where it is translated into data. The transponder is in the RFID tag itself. The read range for RFID tags varies based on factors including the type of tag, type of reader, RFID frequency and interference in the surrounding environment or from other RFID tags and readers. Tags that have a stronger power source also have a longer read range. Downloaded by BENAZIR AE (arbenazir22@gmail.com) lOMoARcPSD|37383633
  • 32. Features of RFID :  An RFID tag consists of two-part which is an microcircuit and an antenna.  This tag is covered by protective material which acts as a shield against the outer environment effect.  This tag may active or passive in which we mainly and widely used passive RFID. Application of RFID :  It utilized in tracking shipping containers, trucks and railroad, cars.  It uses in Asset tracking.  It utilized in credit-card shaped for access application.  It uses in Personnel tracking.  Controlling access to restricted areas.  It uses ID badging.  Supply chain management.  Counterfeit prevention (e.g., in the pharmaceutical industry). Advantages of RFID :  It provides data access and real-time information without taking to much time.  RFID tags follow the instruction and store a large amount of information.  The RFID system is non-line of sight nature of the technology.  It improves the Efficiency, traceability of production.  In RFID hundred of tags read in a short time. Disadvantages of RFID :  It takes longer to program RFID Devices.  RFID intercepted easily even it is Encrypted.  In an RFID system, there are two or three layers of ordinary household foil to dam the radio wave.  There is privacy concern about RFID devices anybody can access information about anything.  Active RFID can costlier due to battery. What is ZigBee Protocol? The ZigBee wireless technology is basically a openly available global standard to address the uniques needs of low-power, low-cost wireless M2M(machine-to-machine) networks and also Internet-of-Things(IoT). It operates on IEEE 802.15.4 physical radio specification and operates even in unlicensed band including 2.4 GHz, 900 MHz and 868 MHz. Applications of ZigBee Technology Because of its three major USPs of being low-cost, low-power consumption and having faster wireless connectivity, the ZigBee protocol caters to a lot of applications like industrial automation, home automation, smart metering, smart grids etc. Also with it low-power requirements, it ensures seamless operation of various sensor equipments offering years of battery-life. Here are some of the areas where ZigBee is widely used.  Industrial Automation: ZigBee offers a faster and low-cost communication that can communicate with almost all devices in factories and centralise them at one place making it easy for you to monitor every process and thereby optimise the control process. ZigBee protocol also finds its presence in many medical and scientific equipments such as personal chronic monitoring, sports and fitness trackers, and can even be used for remote patient monitoring.  Smart Metering and Smart Grid Monitoring: In case of smart metering, ZigBee is used for better energy consumption response, security over power theft, pricing support etc. Additionally in case of smart grids, ZigBee is even used for reactive power management, fault locations, remote temperature monitoring, etc.  Home Automation: ZigBee is one of the most widely used protocol in most of the home automation equipments. Right from offering lighting system solutions, sensor responsive solutions to security solutions and surveillance, ZigBee has its presence everywhere. Downloaded by BENAZIR AE (arbenazir22@gmail.com) lOMoARcPSD|37383633
  • 33. WhatisM-PHY? M-PHY interface supports data rates greater than 5 Gbps. In M-PHY, clock signal is embedded with data frame using 8b/10b encoding technique. It is optical friendly interface. It supports data transfer in two modes viz. burst mode and continuous mode and supports both HS (High Speed)/LS (Low Speed) modes. Low speed mode supports both PWM (Pulse Width Modulation) and NRZ (Non Return to Zero) signaling modes. It supports large amplitude and small amplitude drive strengths. It supports two types of modules (Type-I and Type-II). As shown in the figure, M-PHY link consists of minimum two uni-directional lanes. Each lane consists of M-TX module which communicates with M-RX module on another chip via two differential lines. The differential lines carry both HS and LS signals. Following are the features of M-PHY physical layer protocol developed by MIPI Alliance. • Supports signaling speeds from 10 kbit/sec to 11.6 Gbit/sec per lane and supports 1-4 lanes • Serial interface with embedded clock using 8b10b symbol encoding/decoding scheme • M-PHY supports various states viz. LS burst, HS burst, STALL, HIBERN8 and SLEEP • Supports Type-I and Type-II LS modes BenefitsoradvantagesofM-PHYlayer Following are the benefits or advantages of M-PHY layer: ➨It offers improved performance and effective power management. ➨It is robust against RF interference and generates low RF emission. Downloaded by BENAZIR AE (arbenazir22@gmail.com) lOMoARcPSD|37383633
  • 34. ➨For power saving, M-PHY uses low power modes, switchable termination and programmable low amplitude. ➨It offers high speed greater than 5 Gbps with the help of differential signaling. ➨It requires fewer signal wires (i.e. fewer pins) as it uses 8b/10b encoding in which clock is embedded with data. ➨It provides more bandwidth per pin in addition to improvement in power efficiency. ➨To support flexible bandwidth, M-PHY supports variable number of links/sub-links/data lanes. WhatisUniproprotocol? The UNIPRO specifications with versions 1.4, 1.41, 1.6, 1.8 and 2.0 are published by MIPI Alliance. It is used with M-PHY with specifications 2.0, 3.0, 4.1 and 5.0. Uniport stack is used in wide range of applications which include UFS (Universal Flash Storage) developed by JEDEC for mass storage devices, Uniport-M (Unipro with M-PHY), Uniport-D (Unipro with D-PHY), CSI-3 (Camera Serial Interface-3) , DSI-2 (Display Serial Interface-2), GBT etc. UFS uses Unipro as link layer and M-PHY as physical layer. The Unipro or Uniport-M target devices are smartphones, digital cameras, tablets, multimedia devices etc. Following are the features of Unipro Interface developed by MIPI Alliance. • Supports multiple physical layers within single network similar to TCP/IP. • Unipro v2.0 uses M-PHY HS-G5. This increases bandwidth up to 23.32 Gbps per lane and per direction. • Payload length has been increased from 272 to 1144 in Unipro L2 layer • Latency is decreased by up to 8 ms in V2.0 compare to Unipro v1.8 specifications. BenefitsoradvantagesofUnipro Following are the benefits or advantages of Unipro: ➨It offers low power consumption due to introduction of six power modes and hibernation. ➨It is flexible in changing chip to chip lane routing based on traffic BW (Bandwidth) and latency requirements. Number of lanes and operational speed of lanes can be scaled dynamically in Unipro. ➨It offers enhanced QoS with the help of CPort arbitration and data link layer pre-emption. Downloaded by BENAZIR AE (arbenazir22@gmail.com) lOMoARcPSD|37383633
  • 35. ➨It along with physical layer offers high speed data communication in gigabits per second, low pin count, smaller silicon area, data reliability and congestion management. ➨Unipro supports various traffic classes both in real time or non real time. ➨It offers high performance and low EMI. WhatisSPMIprotocol? SPMI is the short form of System Power Management Interface. The specifications of SPMI are defined and managed by MIPI Alliance. It is 2 wire bi-directional interface with lines SDATA and SCLK. It supports multi-master and multi-slave configurations. In this protocol, Slaves work in two modes viz. request capable and non-request capable. It monitors performance of the processor in given load condition and application of usage. It also controls various supply voltages as per performance level requirements. enefitsoradvantagesofSPMI Following are the benefits or advantages of SPMI: ➨It replaces point to point topology with bus architecture. Hence it reduces pin counts of SoCs. ➨Multi master/slave feature allows chipset partitioning based on hardware complexity and load distribution. ➨Use of ACK/NACK allows confirmity to correct completion of commands. ➨It offers high speed. ➨It offers low latency. ➨It offers real time control of voltage as well as frequency. DrawbacksordisadvantagesofSPMI Following are the drawbacks or disadvantages of SPMI: ➨SPMI v2.0 devices are not compatible with SPMI v1.0 devices. Downloaded by BENAZIR AE (arbenazir22@gmail.com) lOMoARcPSD|37383633
  • 36. ➨Like other serial communication interfaces, it is also affected by noise, reset issues, board layout and minor differences in its implementations. This sometimes results into bus errors and system malfunctioning. SPI Protocol SPI stands for the Serial Peripheral Interface. It is a serial communication protocol that is used to connect low-speed devices. It was developed by Motorola in the mid-1980 for inter-chip communication. It is commonly used for communication with flash memory, sensors, real-time clock (RTC), analog-to-digital converters, and more. It is a full-duplex synchronous serial communication, which means that data can be simultaneously transmitted from both directions. The main advantage of the SPI is to transfer the data without any interruption. Many bits can be sent or received at a time in this protocol. In this protocol, devices are communicated in the master-slave relationship. The master device controls the slave device, and the slave device takes the instruction from the master device. The simplest configuration of the Serial Peripheral Interface (SPI) is a combination of a single slave and a single master. But, one master device can control multiple slave devices. SPI Interface The SPI protocol uses the four wires for the communication. There are shown in the figure. 1. MOSI: MOSI stands for Master Output Slave Input. It is used to send data from the master to the slave. 2. MISO: MISO stands for Master Input Slave Output. It is used to send data from the slave to the master. 3. SCK or SCLK (Serial Clock): It is used to the clock signal. 4. SS/CS (Slave Select / Chip Select): It is used by the master to send data by selecting a slave. Advantages of SPI 1. The main advantage of the SPI is to transfer the data without any interruption. 2. It is simple hardware. Downloaded by BENAZIR AE (arbenazir22@gmail.com) lOMoARcPSD|37383633
  • 37. 3. It provides full-duplex communication. 4. There is no need for a unique address of the slave in this protocol. 5. This protocol does not require precise oscillation of slave devices because it uses the master's clock. 6. In this, software implementation is very simple. 7. It provides high transfer speed. 8. Signals are unidirectional. 9. It has separate lines of MISO and MOSI, so the data can be sent and received at the same time. Disadvantages of SPI 1. Usually, it supports only one master. 2. It does not check the error like the UART. 3. It uses more pins than the other protocol. 4. It can be used only from a short distance. 5. It does not give any acknowledgment that the data is received or not. Applications of SPI o Memory: SD Card, MMC, EEPROM, and Flash. o Sensors: Temperature and Pressure. o Control Devices: ADC, DAC, digital POTS, and Audio Codec. o Others: Camera Lens Mount, Touchscreen, LCD, RTC, video game controller, etc. GSM - Protocol Stack GSM architecture is a layered model that is designed to allow communications between two different systems. The lower layers assure the services of the upper-layer protocols. Each layer passes suitable notifications to ensure the transmitted data has been formatted, transmitted, and received accurately. The GMS protocol stacks diagram is shown below − Downloaded by BENAZIR AE (arbenazir22@gmail.com) lOMoARcPSD|37383633
  • 38. MS Protocols Based on the interface, the GSM signaling protocol is assembled into three general layers −  Layer 1 − The physical layer. It uses the channel structures over the air interface.  Layer 2 − The data-link layer. Across the Um interface, the data-link layer is a modified version of the Link access protocol for the D channel (LAP-D) protocol used in ISDN, called Link access protocol on the Dm channel (LAP-Dm). Across the A interface, the Message Transfer Part (MTP), Layer 2 of SS7 is used.  Layer 3 − GSM signalling protocol‘s third layer is divided into three sublayers − o Radio Resource Management (RR), o Mobility Management (MM), and o Connection Management (CM). MS to BTS Protocols The RR layer is the lower layer that manages a link, both radio and fixed, between the MS and the MSC. For this formation, the main components involved are the MS, BSS, and MSC. The responsibility of the RR layer is to manage the RR-session, the time when a mobile is in a dedicated mode, and the radio channels including the allocation of dedicated channels. The MM layer is stacked above the RR layer. It handles the functions that arise from the mobility of the subscriber, as well as the authentication and security aspects. Location management is concerned with the procedures that enable the system to know the current location of a powered-on MS so that incoming call routing can be completed. The CM layer is the topmost layer of the GSM protocol stack. This layer is responsible for Call Control, Supplementary Service Management, and Short Message Service Management. Each of these services are treated as individual layer within the CM layer. Other functions of the CC sublayer include call establishment, selection of the type of service (including alternating between services during a call), and call release. BSC Protocols The BSC uses a different set of protocols after receiving the data from the BTS. The Abis interface is used between the BTS and BSC. At this level, the radio resources at the lower portion of Layer 3 are changed from the RR to the Base Transceiver Station Management (BTSM). The BTS management layer is a relay function at the BTS to the BSC. The RR protocols are responsible for the allocation and reallocation of traffic channels between the MS and the BTS. These services include controlling the initial access to the system, paging for MT calls, the handover of calls between cell sites, power control, and call termination. The BSC still has some radio resource management in place for the frequency coordination, frequency allocation, and the management of the overall network layer for the Layer 2 interfaces. To transit from the BSC to the MSC, the BSS mobile application part or the direct application part is used, and SS7 protocols is applied by the relay, so that the MTP 1-3 can be used as the prime architecture. MSC Protocols At the MSC, starting from the BSC, the information is mapped across the A interface to the MTP Layers 1 through 3. Here, Base Station System Management Application Part (BSS MAP) is said to be the equivalent set of radio resources. The relay process is finished by the layers that are stacked on top of Layer 3 protocols, they are BSS MAP/DTAP, MM, and CM. This completes the relay process. To find and connect to the users across the network, MSCs interact using the control-signalling network. Location registers are included in the MSC databases to assist in the role of determining how and whether connections are to be made to roaming users. Downloaded by BENAZIR AE (arbenazir22@gmail.com) lOMoARcPSD|37383633
  • 39. Each GSM MS user is given a HLR that in turn comprises of the user‘s location and subscribed services. VLR is a separate register that is used to track the location of a user. When the users move out of the HLR covered area, the VLR is notified by the MS to find the location of the user. The VLR in turn, with the help of the control network, signals the HLR of the MS‘s new location. With the help of location information contained in the user‘s HLR, the MT calls can be routed to the user. Code Division Multiple Access (CDMA) – One channel carries all transmissions simultaneously. There is neither division of bandwidth nor division of time. For example, if there are many people in a room all speaking at the same time, then also perfect reception of data is possible if only two person speak the same language. Similarly, data from different stations can be transmitted simultaneously in different code languages. LTE Overview LTE stands for Long Term Evolution and it was started as a project in 2004 by telecommunication body known as the Third Generation Partnership Project (3GPP). SAE (System Architecture Evolution) is the corresponding evolution of the GPRS/3G packet core network evolution. The term LTE is typically used to represent both LTE and SAE. LTE evolved from an earlier 3GPP system known as the Universal Mobile Telecommunication System (UMTS), which in turn evolved from the Global System for Mobile Communications (GSM). Even related specifications were formally known as the evolved UMTS terrestrial radio access (E-UTRA) and evolved UMTS terrestrial radio access network (E-UTRAN). First version of LTE was documented in Release 8 of the 3GPP specifications. A rapid increase of mobile data usage and emergence of new applications such as MMOG (Multimedia Online Gaming), mobile TV, Web 2.0, streaming contents have motivated the 3rd Generation Partnership Project (3GPP) to work on the Long-Term Evolution (LTE) on the way towards fourth-generation mobile. The main goal of LTE is to provide a high data rate, low latency and packet optimized radioaccess technology supporting flexible bandwidth deployments. Same time its network architecture has been designed with the goal to support packet-switched traffic with seamless mobility and great quality of service. LTE Evolution Year Event Mar 2000 Release 99 - UMTS/WCDMA Mar 2002 Rel 5 - HSDPA Mar 2005 Rel 6 - HSUPA Year 2007 Rel 7 - DL MIMO, IMS (IP Multimedia Subsystem) November 2004 Work started on LTE specification January 2008 Spec finalized and approved with Release 8 2010 Targeted first deployment Downloaded by BENAZIR AE (arbenazir22@gmail.com) lOMoARcPSD|37383633
  • 40. Facts about LTE  LTE is the successor technology not only of UMTS but also of CDMA 2000.  LTE is important because it will bring up to 50 times performance improvement and much better spectral efficiency to cellular networks.  LTE introduced to get higher data rates, 300Mbps peak downlink and 75 Mbps peak uplink. In a 20MHz carrier, data rates beyond 300Mbps can be achieved under very good signal conditions.  LTE is an ideal technology to support high date rates for the services such as voice over IP (VOIP), streaming multimedia, videoconferencing or even a high-speed cellular modem.  LTE uses both Time Division Duplex (TDD) and Frequency Division Duplex (FDD) mode. In FDD uplink and downlink transmission used different frequency, while in TDD both uplink and downlink use the same carrier and are separated in Time.  LTE supports flexible carrier bandwidths, from 1.4 MHz up to 20 MHz as well as both FDD and TDD. LTE designed with a scalable carrier bandwidth from 1.4 MHz up to 20 MHz which bandwidth is used depends on the frequency band and the amount of spectrum available with a network operator.  All LTE devices have to support (MIMO) Multiple Input Multiple Output transmissions, which allow the base station to transmit several data streams over the same carrier simultaneously.  All interfaces between network nodes in LTE are now IP based, including the backhaul connection to the radio base stations. This is great simplification compared to earlier technologies that were initially based on E1/T1, ATM and frame relay links, with most of them being narrowband and expensive.  Quality of Service (QoS) mechanism have been standardized on all interfaces to ensure that the requirement of voice calls for a constant delay and bandwidth, can still be met when capacity limits are reached.  Works with GSM/EDGE/UMTS systems utilizing existing 2G and 3G spectrum and new spectrum. Supports hand-over and roaming to existing mobile networks. Advantages of LTE  High throughput: High data rates can be achieved in both downlink as well as uplink. This causes high throughput.  Low latency: Time required to connect to the network is in range of a few hundred milliseconds and power saving states can now be entered and exited very quickly.  FDD and TDD in the same platform: Frequency Division Duplex (FDD) and Time Division Duplex (TDD), both schemes can be used on same platform.  Superior end-user experience: Optimized signaling for connection establishment and other air interface and mobility management procedures have further improved the user experience. Reduced latency (to 10 ms) for better user experience.  Seamless Connection: LTE will also support seamless connection to existing networks such as GSM, CDMA and WCDMA.  Plug and play: The user does not have to manually install drivers for the device. Instead system automatically recognizes the device, loads new drivers for the hardware if needed, and begins to work with the newly connected device.  Simple architecture: Because of Simple architecture low operating expenditure (OPEX). LTE - QoS LTE architecture supports hard QoS, with end-to-end quality of service and guaranteed bit rate (GBR) for radio bearers. Just as Ethernet and the internet have different types of QoS, for example, various levels of QoS can be applied to LTE traffic for different applications. Because the LTE MAC is fully scheduled, QoS is a natural fit. Evolved Packet System (EPS) bearers provide one-to-one correspondence with RLC radio bearers and provide support for Traffic Flow Templates (TFT). There are four types of EPS bearers:  GBR Bearer resources permanently allocated by admission control  Non-GBR Bearer no admission control Downloaded by BENAZIR AE (arbenazir22@gmail.com) lOMoARcPSD|37383633
  • 41.  Dedicated Bearer associated with specific TFT (GBR or non-GBR)  Default Bearer Non GBR, catch-all for unassigned traffic GPRS - Overview General Packet Radio System is also known as GPRS is a third-generation step toward internet access. GPRS is also known as GSM-IP that is a Global-System Mobile Communications Internet Protocol as it keeps the users of this system online, allows to make voice calls, and access internet on-the-go. Even Time- Division Multiple Access (TDMA) users benefit from this system as it provides packet radio access. GPRS also permits the network operators to execute an Internet Protocol (IP) based core architecture for integrated voice and data applications that will continue to be used and expanded for 3G services. GPRS supersedes the wired connections, as this system has simplified access to the packet data networks like the internet. The packet radio principle is employed by GPRS to transport user data packets in a structure way between GSM mobile stations and external packet data networks. These packets can be directly routed to the packet switched networks from the GPRS mobile stations. In the current versions of GPRS, networks based on the Internet Protocol (IP) like the global internet or private/corporate intranets and X.25 networks are supported. Who owns GPRS ? The GPRS specifications are written by the European Telecommunications Standard Institute (ETSI), the European counterpart of the American National Standard Institute (ANSI). Key Features Following three key features describe wireless packet data:  The always online feature - Removes the dial-up process, making applications only one click away.  An upgrade to existing systems - Operators do not have to replace their equipment; rather, GPRS is added on top of the existing infrastructure.  An integral part of future 3G systems - GPRS is the packet data core network for 3G systems EDGE and WCDMA. Goals of GPRS GPRS is the first step toward an end-to-end wireless infrastructure and has the following goals:  Open architecture  Consistent IP services  Same infrastructure for different air interfaces  Integrated telephony and Internet infrastructure  Leverage industry investment in IP  Service innovation independent of infrastructure Benefits of GPRS Higher Data Rate GPRS benefits the users in many ways, one of which is higher data rates in turn of shorter access times. In the typical GSM mobile, setup alone is a lengthy process and equally, rates for data permission are restrained to 9.6 kbit/s. The session establishment time offered while GPRS is in practice is lower than one second and ISDN-line data rates are up to many 10 kbit/s. Downloaded by BENAZIR AE (arbenazir22@gmail.com) lOMoARcPSD|37383633
  • 42. Easy Billing GPRS packet transmission offers a more user-friendly billing than that offered by circuit switched services. In circuit switched services, billing is based on the duration of the connection. This is unsuitable for applications with bursty traffic. The user must pay for the entire airtime, even for idle periods when no packets are sent (e.g., when the user reads a Web page). In contrast to this, with packet switched services, billing can be based on the amount of transmitted data. The advantage for the user is that he or she can be "online" over a long period of time but will be billed based on the transmitted data volume. What is a small cell? A small cell is a low-cost radio access point with low radio frequency (RF) power output, footprint and range. It can be deployed indoors or outdoors, and in licensed, shared or unlicensed spectrum. Small cells deliver high-quality, secure cellular coverage indoors and out, complementing the macro network to improve coverage, add targeted capacity, and support new services and user experiences. There are various types of small cell, with varying ranges, power levels and form factors, according to use case. The smallest units are for indoor residential use; the largest are urban or rural outdoor picocells. In the 5G Era, small cells will be deployed in a far wider range of scenarios than in the past, and the form factors and architectures will be extremely varied. A recent SCF work item provides concise definitions of 5G small cells and the small cell network architecture and product types. What are IEEE 802.11 networks? IEEE 802.11 standard, popularly known as WiFi, lays down the architecture and specifications of wireless LANs (WLANs). WiFi or WLAN uses high-frequency radio waves instead of cables for connecting the devices in LAN. Users connected by WLANs can move around within the area of network coverage. IEEE 802.11 Architecture The components of an IEEE 802.11 architecture are as follows −  Stations (STA) − Stations comprises of all devices and equipment that are connected to the wireless LAN. A station can be of two types− o Wireless Access Point (WAP) − WAPs or simply access points (AP) are generally wireless routers that form the base stations or access. o Client. Clients are workstations, computers, laptops, printers, smartphones, etc.  Each station has a wireless network interface controller.  Basic Service Set (BSS) − A basic service set is a group of stations communicating at the physical layer level. BSS can be of two categories depending upon the mode of operation− o Infrastructure BSS − Here, the devices communicate with other devices through access points. o Independent BSS − Here, the devices communicate in a peer-to-peer basis in an ad hoc manner.  Extended Service Set (ESS) − It is a set of all connected BSS.  Distribution System (DS) − It connects access points in ESS. Downloaded by BENAZIR AE (arbenazir22@gmail.com) lOMoARcPSD|37383633
  • 43. Frame Format of IEEE 802.11 The main fields of a frame of wireless LANs as laid down by IEEE 802.11 are −  Frame Control − It is a 2 bytes starting field composed of 11 subfields. It contains control information of the frame.  Duration − It is a 2-byte field that specifies the time period for which the frame and its acknowledgment occupy the channel.  Address fields − There are three 6-byte address fields containing addresses of source, immediate destination, and final endpoint respectively.  Sequence − It a 2 bytes field that stores the frame numbers.  Data − This is a variable-sized field that carries the data from the upper layers. The maximum size of the data field is 2312 bytes.  Check Sequence − It is a 4-byte field containing error detection information. What Is UWB? Ultra-wideband (UWB) is a short-range wireless communication protocol—like Wi-Fi or Bluetooth—uses radio waves of short pulses over a spectrum of frequencies ranging from 3.1 to 10.5 GHz in unlicensed applications. The term UWB is used for a bandwidth (BW) that is larger or equal to 500 MHz or a fractional bandwidth (FBW) greater than 20% where FBW = BW/fc, where fc is the center frequency. Downloaded by BENAZIR AE (arbenazir22@gmail.com) lOMoARcPSD|37383633
  • 44. The Advantages of Ultra-Wideband Technology The very wide bandwidth of UWB signals enables superior indoor performance over traditional narrow- band systems. Some of this bandwidth's features are highlighted below:  The wide bandwidth provides immunity against the channel effect in a dense environment and enables very fine time-space resolutions for highly accurate indoor positioning of the UWB nodes, e.g., the new iPhone 11.  The low spectral density, below environmental noise, ensures a low probability of signal detection and increases the security of communication.  High data rates can be transmitted over a short distance using UWB.  UWB systems can co-exist with already-deployed narrowband systems. UWB Transmission Two different approaches are adopted for data transmission:  Ultra-short pulses in the picosecond range, which covers all frequencies simultaneously (also called impulse radios)  Subdividing the total UWB bandwidth into a set of broadband Orthogonal Frequency Division Multiplexing (OFDM) channels What is 6LoWPAN? 6LoWPAN is an IPv6 protocol, and It‘s extended from is IPv6 over Low Power Personal Area Network. As the name itself explains the meaning of this protocol is that this protocol works on Wireless Personal Area Network i.e., WPAN. WPAN is a Personal Area Network (PAN) where the interconnected devices are centered around a person‘s workspace and connected through a wireless medium. You can read more about WPAN at WPAN. 6LoWPAN allows communication using the IPv6 protocol. IPv6 is Internet Protocol Version 6 is a network layer protocol that allows communication to take place over the network. It is faster and more reliable and provides a large number of addresses. 6LoWPAN initially came into existence to overcome the conventional methodologies that were adapted to transmit information. But still, it is not so efficient as it only allows for the smaller devices with very limited processing ability to establish communication using one of the Internet Protocols, i.e., IPv6. It has very low cost, short-range, low memory usage, and low bit rate. It comprises an Edge Router and Sensor Nodes. Even the smallest of the IoT devices can now be part of the network, and the information can be transmitted to the outside world as well. For example, LED Streetlights. Downloaded by BENAZIR AE (arbenazir22@gmail.com) lOMoARcPSD|37383633
  • 45.  It is a technology that makes the individual nodes IP enabled.  6LoWPAN can interact with 802.15.4 devices and also other types of devices on an IP Network. For example, Wi-Fi.  It uses AES 128 link layer security, which AES is a block cipher having key size of 128/192/256 bits and encrypts data in blocks of 128 bits each. This is defined in IEEE 802.15.4 and provides link authentication and encryption. Basic Requirements of 6LoWPAN: 1. The device should be having sleep mode in order to support the battery saving. 2. Minimal memory requirement. 3. Routing overhead should be lowered. Features of 6LoWPAN: 1. It is used with IEEE 802.15,.4 in the 2.4 GHz band. 2. Outdoor range: ~200 m (maximum) 3. Data rate: 200kbps (maximum) 4. Maximum number of nodes: ~100 Advantages of 6LoWPAN: 1. 6LoWPAN is a mesh network that is robust, scalable, and can heal on its own. 2. It delivers low-cost and secure communication in IoT devices. 3. It uses IPv6 protocol and so it can be directly routed to cloud platforms. 4. It offers one-to-many and many-to-one routing. 5. In the network, leaf nodes can be in sleep mode for a longer duration of time. Disadvantages of 6LoWPAN: 1. It is comparatively less secure than Zigbee. 2. It has lesser immunity to interference than that Wi-Fi and Bluetooth. 3. Without the mesh topology, it supports a short range. Applications of 6LoWPAN: 1. It is a wireless sensor network. 2. It is used in home-automation, 3. It is used in smart agricultural techniques, and industrial monitoring. Security and Interoperability with 6LoWPAN:  Security: 6LoWPAN security is ensured by the AES algorithm, which is a link layer security, and the transport layer security mechanisms are included as well.  Interoperability: 6LoWPAN is able to operate with other wireless devices as well which makes it interoperable in a network. What Is Proprietary Technology? Downloaded by BENAZIR AE (arbenazir22@gmail.com) lOMoARcPSD|37383633
  • 46. Proprietary technology is any combination of processes, tools, or systems of interrelated connections that are the property of a business or individual. These combinations provide a benefit or competitive advantage to the owners of proprietary technologies. Companies capable of developing useful proprietary technologies in-house are rewarded with a valuable asset and can either use it exclusively or profit from the sale of licensing their technology to other parties. UNIT IV IOT PROCESSORS Services/Attributes: Big-Data Analytics for IOT, Dependability,Interoperability, Security, Maintainability. Embedded processors for IOT :Introduction to Python programming -Building IOT with RASPERRY PI and Arduino. 26 Role of Big Data in IoT Companies make use of IoT devices to collect data. Since the data stored by IoT devices are in unstructured form, Big Data processes this collected data on a real-time basis and also stores them using several storage technologies. Therefore, the need to get big data in IoT is compelling. IoT big data processing occurs in four sequential steps 1. A Group of unstructured data is generated by IoT devices and stored in the big data system. 2. A big data system is a shared distributed database where a huge amount of data is stored. 3. Stored data is analyzed using analytic tools like Hadoop MapReduce or Spark 4. Then, Generate the reports of analyzed data. How Do IoT and Big Data Impact Each Other? IoT and Big Data carry an inter-dependency relationship and hugely impact each other. As IoT grows, it gives rise to the demand for big data capabilities. An increase in the amount of data every day requires more advanced and innovative storage solutions resulting in updating an organization‘s big data storage infrastructure. Big data and IoT have a closely knitted future. It is evident that the two fields will generate new solutions and opportunities that will have a long-lasting impact. How are IoT and Big Data Together Beneficial for Companies? IoT and Big Data help companies in different sectors to make efficient and well-informed decisions and thus offer better services/products. IoT with Big data helps companies to  Examine data  Reveal data trends  Find unseen data patterns  Find hidden data correlations  Reveal new information Helps to increase the ROI for the companies IoT in Big Data analytics helps businesses to extract information to get better business insights. Better business insights help in taking better decisions that result in high ROI. Due to an increase in demand for data storage, companies are switching to big data cloud storage which lowers the implementation cost. Downloaded by BENAZIR AE (arbenazir22@gmail.com) lOMoARcPSD|37383633
  • 47. Reshapes the future of the e-health system The features of Big Data in IoT are reshaping the upcoming generation of the e-health care system and developing an innovative solution in the healthcare field. Big data will now lead to data-driven research instead of hypothesis-driven research. IoT will control and analyze the connection between sensors and existing big data. Revolution in Manufacturing Companies In manufacturing companies, due to improper working of equipment and machines, they may end up producing fewer products as they used to do earlier. Installing IoT sensors in the equipment can collect operation data on the machine. This data will help to find out which equipment is working properly and which requires repair. Hence, a business will never fall short of products. Benefits in the Transportation Industry Installing IoT sensors in vehicles provide data regarding fuel efficiency, tracking the location of the vehicle, delivery routes, and other information that helps in improving organizational productivity. Weather Forecast With the help of IoT, we can collect big data from weather and satellites to know about the amount of wind and sunlight we can expect within a particular time period. Due to these predictive analytics and machine learning advances, we are capable of predicting weather conditions and taking actions according to that to meet the demand. Facilitate the Energy Revolution For grid operators, intelligent sensors constantly check the temperature of underground cables which helps in taking immediate countermeasures if the cable temperature rises up. Big data is used to generate findings of power grid components such as input-output curves of transformers that help companies to take action at the right time and prevent load intervention in the power grid. In this section, we will discuss in-depth how these distinct components help in the functioning of the IoT system.  Sensors/Devices The sensors or devices collect the data from the environment they are present in. For eg, reading the temperature, analyzing location, etc.  Connectivity After collecting the data, we need to transfer it for processing, so how to transfer it? The sensor/device can be connected to the cloud through various methods - satellite, WiFi, Bluetooth, direct connection to the internet or ethernet, etc. We can choose any of these methods to transfer the data to the cloud.  Data Processing Downloaded by BENAZIR AE (arbenazir22@gmail.com) lOMoARcPSD|37383633
  • 48. Once the data is loaded on the cloud, the software processes it to get the required insights. If the data is favorable or it is as per expectation then nothing to worry about. But what if not? Here is, when the user interface comes.  User Interface After looking at the data insights, a user can react if it is not going as expected. For eg, if you are monitoring the room temperature from a far location and it is too high as per requirement, then you can maintain it through some apps or trigger some warnings in the home. Introduction of Embedded Systems | Set-1 Before going to the overview of Embedded Systems, Let‘s first know the two basic things i.e embedded and system, and what actually do they mean. System is a set of interrelated parts/components which are designed/developed to perform common tasks or to do some specific work for which it has been created. Embedded means including something with anything for a reason. Or simply we can say something which is integrated or attached to another thing. Now after getting what actual systems and embedded mean we can easily understand what are Embedded Systems. Embedded System is an integrated system that is formed as a combination of computer hardware and software for a specific function. It can be said as a dedicated computer system has been developed for some particular reason. But it is not our traditional computer system or general-purpose computers, these are the Embedded systems that may work independently or attached to a larger system to work on a few specific functions. These embedded systems can work without human intervention or with little human intervention. Three main components of Embedded systems are: 1. Hardware 2. Software 3. Firmware Some examples of embedded systems:  Digital watches  Washing Machine  Toys  Televisions  Digital phones  Laser Printer  Cameras  Industrial machines  Electronic Calculators  Automobiles  Medical Equipment Application areas of Embedded System: Mostly Embedded systems are present everywhere. We use it in our everyday life unknowingly as in most cases it is integrated into the larger systems. So, here are some of the application areas of Embedded systems:  Home appliances  Transportation  Health care  Business sector & offices Downloaded by BENAZIR AE (arbenazir22@gmail.com) lOMoARcPSD|37383633
  • 49.  Defense sector  Aerospace  Agricultural Sector Important Characteristics of an Embedded System: 1. Performs specific task: Embedded systems perform some specific function or tasks. 2. Low Cost: The price of an embedded system is not so expensive. 3. Time Specific: It performs the tasks within a certain time frame. 4. Low Power: Embedded Systems don‘t require much power to operate. 5. High Efficiency: The efficiency level of embedded systems is so high. 6. Minimal User interface: These systems require less user interface and are easy to use. 7. Less Human intervention: Embedded systems require no human intervention or very less human intervention. 8. Highly Stable: Embedded systems do not change frequently mostly fixed maintaining stability. 9. High Reliability: Embedded systems are reliable they perform tasks consistently well. 10. Use microprocessors or microcontrollers: Embedded systems use microprocessors or microcontrollers to design and use limited memory. 11. Manufacturable: The majority of embedded systems are compact and affordable to manufacture. They are based on the size and low complexity of the hardware. Block Structure Diagram of Embedded System: Embedded System Advantages of Embedded System:  Small size.  Enhanced real-time performance.  Easily customizable for a specific application. Downloaded by BENAZIR AE (arbenazir22@gmail.com) lOMoARcPSD|37383633
  • 50. Disadvantages of Embedded System:  High development cost.  Time-consuming design process.  As it is application-specific less market available. Python programming powers intuitive interfaces of intelligent and effective Internet of Things (IoT) systems that are paramount in remote sensor networks, big data and data analysis, automation, and machine learning. IoT applications function efficiently with the help of Python libraries/packages which include: NUMPY Numpy is a scientific computing package that helps to create datasets to test with the time series data in IoT. Numpy features are used in IoT to read sensor bulk data from the database inbuilt functions in the system SOCKETS AND MYSQLDB Sockets that facilitate networking in IoT devices include TCP/IP and UDP, which are compatible to work with Python packages. TCP/IP and UDP act as transport layer protocols for communication. The MySQLdb is a go-to relational format database that helps in the development of remote stores for the IoT system. MATPLOTLIB To get data insights, matplotlib visualizes the most paramount operations by giving a variety of graphs to represent the data. REQUESTS, TKINTER AND TENSORFLOW To make HTTP calls and parse responses in Python, the request package acts as a major protocol for data exchanges. Tkinter GUI puts the aspects of Python script in a controlled distribution, which enables functional testing and repeated executions in IoT Python devices. Therefore, the numerical computations of machine learning initiated into the IoT systems utilize the representation in data flow graphs dealing with huge non-linear datasets and deep learning aspects. IOT DEVICES USED TO DEVELOP APPLICATIONS IN IOT  Raspberry Pi Model 3  Intel Edison  Arduino IOT SENSORS SIMULATORS USED IN PYTHON PROGRAMMING INCLUDE: MQ TELEMETRY TRANSPORT (MQTT) SENSOR SIMULATOR MQTT protocol for the IoT in Python enables high-speed data exchange with low payload communication between the devices. User-friendly requests of MQTT are made directly in Python. Data is collected in real- time and easily analyzed in mathematical computation libraries like matplotlib. The diagram below shows the steps used for the data flow: Downloaded by BENAZIR AE (arbenazir22@gmail.com) lOMoARcPSD|37383633
  • 51. Data logging using MQTT (install using pip install paho-mqtt) Python is displayed below: import paho.mqtt.client as mqtt #Callback for received data from server def on_connect(data_iot, user, events): print(―connected with code‖ + str(events)) data = mqtt.Client() Data.on_connect = on_connect Data.on_message = on_message data.loop_forever() IoT using Raspberry Pi IoT using raspberry pi mainly include what is an IoT, Raspberry pi, IOT design methodology, etc. What is the Internet of Things? The Internet of Things (IoT) is a scenario in which objects, animals or people are provided with single identifiers and the capability to automatically transfer and the capability to automatically transfer data more to a network without requiring human-to-human or human-to-computer communication. IoT has evolved from the meeting of wireless technologies, micro-electromechanical systems (MEMS) and the internet. Internet of Things Downloaded by BENAZIR AE (arbenazir22@gmail.com) lOMoARcPSD|37383633
  • 52. IoT Design Methodology All web application is developed natively in Java Programming Language. It includes java technologies similar to JSP, servlets, hibernate, and web services, etc., the latest version of net beans IDE is basically used for web application development. Additional technologies like bootstrap, javascript, jQuery, etc are used to handle UI and client-side validations. Cisco provided APIs are used to develop application related to Cisco IP phones. IOT uisng Raspberry Pi Five steps are used in web applications  Installing Apache Webserver  Create a My SQL database system  Developed web application For the GUI (Graphical User Interface)  Write lots of PHP, JAVA script, CSS and Python Programs for the Web Application  Host Web application on our Web server Raspberry Pi The history of the Raspberry Pi was basically introduced in 2006. Its main concept is based on Atmel ATmega644 which is particularly designed for educational use and intended for Python. A Raspberry Pi is of small size i.e., of a credit-card-sized single-board computer, which is developed in the United Kingdom(U.K) by a foundation called Raspberry Pi. The main motto of this foundation is to promote the teaching of basic computer science in the education institutes and also in developing countries. The first generation of Raspberry (Pi 1) was released in the year 2012, which has two types of models namely model A and model B. Raspberry Pi In the subsequent year, A+ and B+ models were released. Again in 2015, Raspberry Pi2 model B was released and an immediate year Raspberry Pi3 model B was released in the market. Raspberry Pi can be plugged into a TV, computer monitor, and it uses a standard keyboard and mouse. It is user-friendly as it can be handled by all the age groups. It does everything you would expect a desktop computer to do like word-processing, browsing the internet spreadsheets, playing games to playing high Downloaded by BENAZIR AE (arbenazir22@gmail.com) lOMoARcPSD|37383633
  • 53. definition videos. It is used in many applications like in a wide array of digital maker projects, music machines, parent detectors to the weather station and tweeting birdhouses with infrared cameras. All models feature on a Broadcom system on a chip (SOC), which includes chip graphics processing unit GPU(a Video Core IV), an ARM-compatible and CPU. The CPU speed ranges from 700 MHz to 1.2 GHz for the Pi 3 and onboard memory range from 256 MB to 1 GB RAM. An operating system is stored in the secured digital SD cards and program memory in either the MicroSDHC or SDHC sizes. Most boards have one to four USB slots, composite video output, HDMI and a 3.5 mm phone jack for audio. Some models have WiFi and Bluetooth. The Raspberry Pi Foundation provides Arch Linux ARM and Debian distributions for download, and promotes Python as the main programming language, with support for BBC BASIC, Java, C, Perl, Ruby, PHP, Squeak Smalltalk, C++, etc. The following are essential to get started  Video cable to suit the TV or monitor used  SD card containing Linux Operating system  Power supply (see Section 1.6 below)  USB keyboard  TV or monitor (with DVI, HDMI, Composite or SCART input) Recommended optional extras include  Internet connection, Model B only: LAN (Ethernet) cable  USB mouse  Powered USB hub  Internet connection, Model A or B: USB WiFi adaptor What is a System on Chip? A system on chip is a complex IC that integrates the functional elements into a single chip or chipset. It is a programmable processor on a chip memory, accelerating function hardware, software, hardware, and analog components. System on Chip Benefits of SoC  Lower power consumption  Reduces size  Reduces overall system cost Downloaded by BENAZIR AE (arbenazir22@gmail.com) lOMoARcPSD|37383633
  • 54.  Increases performance Internet Gateway Device Internet Gateway Device has the ability to route data approaching from the WSN network to the internet and Send data coming from the internet to the WSN network. It is like a Wi-Fi router for the Internet of Things. In the internet gateway device, we use raspberry pi model B, it features a quad-core ARM Cortex- A7 CPU is running at 900MHz (for a 6x presentation improve on the first generation Raspberry Pi Model B+) and 1GB of LPDDR2 SDRAM (for a 2x memory increase). And yes, there is total compatibility with Raspberry Pi1 we are secured. Broadcom‘s new SoC, the BCM2836, is the key factor. Five steps we are using Internet Gateway Device  Port Linux operating system on Raspberry Pi  Modify Linux to work with Our Prototype  Developed Python Library for Communication of RPI with Xbee ZB  Wrote Program from sensors and Device controlling  Create WI-FI functionality on RPI for Internet Connection WSN Nodes A wireless sensor network (WSN) consists of three main components: nodes, gateways, and software. The spatially dispersed measurement nodes interface with the sensors to monitor assets or their surroundings. The acquired information is wirelessly transmitted to the gateway, which provides a connection to the wired globe where you can collect, procedure, analyze, and present your measurement information using the software. Routers are an individual type of dimension node that you can use to expand the distance and dependability in a WSN. Sensors can be dispersed on the roads, vehicles, hospitals, buildings, people and allow dissimilar applications such as medical services, battlefield operations, disaster response, disaster relief, and environmental monitoring. IoT Applications  Weather security and temperature cam  The working doctor who props with raspberry pi  Sensually an air quality monitoring hat  Beer and wine fridge of awesomeness  Raspberry pi Internet doorbell  Internet of things toilet  Train your rat behavioral science at home  Pebbly smart doorbell  The raspberry pi microwave This is all about IoT using Raspberry Pi. Currently, IoT is made up of a loose collection of different, purpose-built networks. Today‘s cars, intended, for example, have multiple networks to control engine function, safety features, communication systems, and so on. Commercial and residential buildings also have various control systems for heating, venting, and air condition (HVAC), telephone service, security, and lighting. As IoT evolves, these networks and a lot of others will be connected with additional security, analytics, and management capabilities. This will allow IoT to become even more powerful in what it can help people achieve. Furthermore, any queries regarding this concept or electrical and electronics projects, please give your valuable suggestions by commenting in the comment section below. Photo Credits:  System on Chip directindustry  IOT goodworklabs Downloaded by BENAZIR AE (arbenazir22@gmail.com) lOMoARcPSD|37383633
  • 55. Introduction Connected devices around the world are increasing by billions every year. The Arduino IoT Cloud is a platform that allows anyone to create IoT projects, with a user friendly interface, and an all in one solution for configuration, writing code, uploading and visualization. In this article, we will take a look at some different components of the Arduino IoT Cloud, and provide a general overview. But if you‘re itching to get started and explore the Arduino IoT Cloud yourself, that is also perfectly fine! You can always come back here for more information!  Go to Arduino IoT Cloud IoT Cloud Documentation The Arduino IoT Cloud has several pages of documentation available. Below you will find a list of some popular pages:  To find all tutorials & articles, visit the Arduino IoT Cloud Documentation page.  For a technical overview, list of features, and API guide, visit the Arduino IoT Cloud Cheat Sheet.  For API & SDK Documentation, visit the developer reference at Arduino IoT Cloud API. Features Below is a list of Arduino IoT Cloud features.  Data Monitoring - learn how to easily monitor your Arduino's sensor values through a dashboard.  Variable Synchronisation - variable synchronisation allows you to sync variables across devices, enabling communication between devices with minimal coding.  Scheduler - schedule jobs to go on/off for a specific amount of time (seconds, minutes, hours).  Over-The-Air (OTA) Uploads - upload code to devices not connected to your computer.  Webhooks - integrate your project with another service, such as IFTTT.  Amazon Alexa Support - make your project voice controlled with the Amazon Alexa integration.  Dashboard Sharing - share your data with other people around the world. Compatible Hardware To use the Arduino IoT Cloud, a cloud compatible board is required. You can choose between using an official Arduino board, or a board based on the ESP32 / ESP8266 microcontroller. The Arduino IoT Cloud currently supports connection via Wi-Fi, LoRaWAN® (via The Things Network) and mobile networks. Downloaded by BENAZIR AE (arbenazir22@gmail.com) lOMoARcPSD|37383633
  • 56. All cloud-compatible Arduino boards come with a hardware secure element (such as the ECC508 cryptochip), where you can store your security keys. Wi-Fi Official Arduino boards only supports the 2.4GHz frequency band for transmitting data. The following boards connect to the Arduino IoT Cloud via Wi-Fi.  MKR 1000 WiFi  MKR WiFi 1010  Nano RP2040 Connect  Nano 33 IoT  GIGA R1 WiFi  Portenta H7  Portenta H7 Lite Connected  Portenta Machine Control  Nicla Vision  Opta. Connection via Wi-Fi is an easy alternative, and your credentials can safely be entered during the configuration of a project. This type of connection is most suitable for low-range projects, where you connect your board to the cloud via your home/work/school router. LoRaWAN® The following boards connect to the Arduino IoT Cloud via The Things Stack, a LoRaWAN® Network Server connected to thousands of public LoRa® gateways.  MKR WAN 1300  MKR WAN 1310 Connection via LoRaWAN® is recommended for low-power projects in both remote and urban areas, where Wi-Fi or other popular connectivity types are not available. The MKR WAN 1300/1310 boards are equipped with a LoRa radio module and has a slot for an antenna. With the right low-power configuration, the board can send data to the cloud for months on a single battery. To learn more about setting up LoRaWAN® devices, visit the Configuring LoRaWAN® devices in the Arduino Cloud guide. GSM / NB-IoT Boards The MKR GSM 1400 and MKR NB 1500 require a SIM card to connect to the cloud, as they communicate over the mobile networks.  MKR GSM 1400  MKR NB 1500 Downloaded by BENAZIR AE (arbenazir22@gmail.com) lOMoARcPSD|37383633
  • 57. Connection through mobile networks can be considered in remote areas where there's no Wi-Fi, or in mobile projects (such as cargo tracking). For more information, visit the Arduino SIM page. Note that a secured connection is a memory intense operation, so there's not a lot of memory for the user application (e.g. around 2.6 kB on the MKR GSM 1400). Using a lot of IoT Cloud variables may cause the sketch to run out of memory on boards which don't offload the SSL stack and make it crash. ESP32 / ESP8266 The Arduino IoT Cloud supports a wide range of third party boards based on the ESP32 and ESP8266 microcontrollers with support for Wi-Fi. To set them up, simply choose the third party option in the device setup. Configuring third party boards. To learn more about ESP32/ESP8266 support and how to set it up, visit the Connecting ESP32 & ESP8266 to Arduino Cloud IoT guide. Ethernet The Arduino IoT Cloud supports connection via Ethernet on a number of devices. The options to connect via Ethernet are the following:  Connect with the Portenta H7 in combination with an Ethernet compatible carrier/shield (see below).  Connect with the Opta. To connect with the Portenta H7 board, you will need one of the following shields/carriers: Downloaded by BENAZIR AE (arbenazir22@gmail.com) lOMoARcPSD|37383633
  • 58.  Portenta Vision Shield Ethernet  Portenta Machine Control To enable communication via Ethernet with the Portenta H7, while configuring your device, you need to select the "Ethernet" option. If your device is already configured as a Wi-Fi device, you need to remove it before configuring it to Ethernet communication. Choose the Ethernet option. Please note that older hardware such as the Ethernet Shield Rev2 and MKR ETH Shield are currently not supported by the Arduino IoT Cloud. Support If you have any problems with the Arduino IoT Cloud, you can browse through common troubleshooting issues and find information on different features in the Arduino Help Center. If you don‘t find the answer you are looking for, we are always happy to help you with any question regarding our products! Go to Arduino Help Center A Walk Through the Configuration Setting up the Arduino IoT Cloud. Setting up the Arduino IoT Cloud and accessing the different features available involves a few simple steps. So let‘s take a look at how to go from start to finish! Downloaded by BENAZIR AE (arbenazir22@gmail.com) lOMoARcPSD|37383633
  • 59. 1. Creating an Arduino Account To starting using the Arduino IoT cloud, we first need to log in or sign up to Arduino. 2. Go to the Arduino IoT Cloud After we have signed up, you can access the Arduino IoT Cloud from any page on arduino.cc by clicking on the four dots menu in the top right corner. You can also go directly to the Arduino IoT Cloud. Navigating to the cloud. 3. Creating a Thing The journey always begin by creating a new Thing. In the Thing overview, we can choose what device to use, what Wi-Fi network we want to connect to, and create variables that we can monitor and control. This is the main configuration space, where all changes we make are automatically generated into a special sketch file. The Thing overview. Downloaded by BENAZIR AE (arbenazir22@gmail.com) lOMoARcPSD|37383633
  • 60. 4. Configuring a Device Devices can easily be added and linked to a Thing. The Arduino IoT Cloud requires your computer to have the Arduino Create Agent installed. The configuration process is quick and easy, and can be done by clicking on the “Select device” button in the Thing overview. Here, we can choose from any board that has been configured, or select the “Configure new device” option. Configuring a device. We can also get a complete overview of our devices by clicking the “Devices" tab at the top of the Arduino IoT Cloud interface. Here we can manage and add new devices. The device tab. 5. Creating Variables The variables we create are automatically generated into a sketch file. There are several data types we can choose from, such as int, float, boolean, long, char. There‘s also special variables, such Downloaded by BENAZIR AE (arbenazir22@gmail.com) lOMoARcPSD|37383633
  • 61. as Temperature, Velocity, Luminance that can be used. When clicking on the “Add variable” button, we can choose name, data type, update setting and interaction mode. Creating variables. 6. Connecting to a Network To connect to a Wi-Fi network, simply click the “Configure” button in the network section. Enter the credentials and click “Save”. This information is also generated into your sketch file! Entering network credentials. Downloaded by BENAZIR AE (arbenazir22@gmail.com) lOMoARcPSD|37383633
  • 62. 7. Editing the Sketch Now that we have configured variables, devices and network settings, we can get to programming our devices! An automatically generated sketch file can be found in the “Sketch” tab. It has the same structure as a typical .ino file, but with some additional code to make the connection to your network and to the cloud. A sketch that, for example, reads an analog sensor, and use the cloud variable to store it. When the sketch has been uploaded, it will work as a regular sketch, but it will also update the cloud variables that we use! Additionally, each time we create a variable that has the Read & Write permission enabled, a function is also generated, at the bottom of your sketch file. Each time this variable changes, it will execute the code within this function! This means that we can leave most of the code out of the loop() and only run code when needed. To upload the program to our board, simply click the "Upload" button. Editing a sketch in the cloud editor. The editor also has a Serial Monitor Tool, which can be opened by clicking the magnifying glass in the toolbar. Here you can view information regarding your connection, or commands printed via Serial.print() . Downloaded by BENAZIR AE (arbenazir22@gmail.com) lOMoARcPSD|37383633
  • 63. The Serial Monitor Tool. After we have successfully uploaded the code, we can open the “Serial Monitor” tab to view information regarding our connection. If it is successful, it will print “connected to network_name” and “connected to cloud”. If it fails to connect, it will print the errors here as well. The cloud editor is a mirrored "minimal" version of the Web Editor. Any changes you make will also be reflected in the Web Editor, which is more suitable for developing more advanced sketches. 8. Creating a Dashboard Now that we have configured the device & network, created variables, completed the sketch and successfully uploaded the code, we can move on to the fun part: creating dashboards! Visualize your data. Downloaded by BENAZIR AE (arbenazir22@gmail.com) lOMoARcPSD|37383633
  • 64. Dashboards are visual user interface for interacting with your boards over the cloud, and we can setup many different setups depending on what your IoT project needs. We can access our dashboards by clicking on the “Dashboards” tab at the top of the Arduino IoT Cloud interface, where we can create new dashboards, and see a list of dashboards created for other Things. Navigating to dashboards. If we click on “Create new dashboard”, we enter a dashboard editor. Here, we can create something called widgets. Widgets are the visual representation of our variables we create, and there are many different to choose from. Below is an example using several types of widgets. The different widgets available. When we create widgets, we also need to link them to our variables. This is done by clicking on a widget we create, select a Thing, and select a variable that we want to link. Once it is linked, we can either Downloaded by BENAZIR AE (arbenazir22@gmail.com) lOMoARcPSD|37383633
  • 65. interact with it, for example a button, or we can monitor a value from a sensor. As long as our board is connected to the cloud, the values will update! Let's say we have a temperature widget that we want to link to the temperature variable inside the Cloud project thing. Linking a variable to a widget. Note that not all widgets and variables are compatible. A switch and an integer can for example not be linked, and will not be an option while setting up your dashboard. We can also have several things running at once, depending on your Arduino IoT Cloud plan, which we can include in the same dashboard. This is a great feature for tracking multiple boards in for example a larger sensor network, where boards can be connected to different networks around the world, but be monitored from the same dashboard. UNIT V CASE STUDIES Industrial IoT, Home Automation, smart cities, Smart Grid, connected vehicles, electric vehicle charging, Environment, Agriculture, Productivity Applications, IOT Defense What Is Industrial IoT (IIoT)? Industrial IoT is an ecosystem of devices, sensors, applications, and associated networking equipment that work together to collect, monitor, and analyze data from industrial operations. Analysis of such data helps increase visibility and enhances troubleshooting and maintenance capabilities. It can also increase efficiencies, reduce costs, and improve safety and security. Why should organizations consider adopting industrial IoT? Industrial IoT enables organizations to get a wealth of actionable data from their operations. When properly aggregated and analyzed, the data helps them better control operations, with the potential to: Downloaded by BENAZIR AE (arbenazir22@gmail.com) lOMoARcPSD|37383633
  • 66.  Improve worker safety  Increase production uptime by predictive maintenance of machinery  Maintain product quality  Help ensure regulatory compliance  Improve operational efficiencies  Accelerate response times with real-time collection and processing of operational data Major considerations for adopting IIoT Depending on where an organization is in its digital transformation, it may need to replace analog information sources with digital, securely network these sources, and develop applications that can ingest the data and generate actionable insights. Network equipment The switches, routers, and wireless equipment that connect IIoT devices must provide the needed bandwidth and be able to withstand punishing physical conditions on factory floors or outdoors. This equipment must support the communication protocols in use to provide visibility and help monitor each endpoint. Network equipment should also be able to run edge applications to respond to emerging situations in real time and to extract, curate, and transmit operations data to applications in a data center or the cloud. Explore Cisco Industrial IoT portfolio Centralized connectivity deployment and monitoring For organizations to efficiently monitor and scale their deployments, centralized visibility of device connectivity is of paramount importance. Organizations need to be able to deploy and configure connectivity to their edge devices and equipment quickly and accurately. They also need to efficiently update configurations by enabling secure remote access to equipment and troubleshoot issues by monitoring alerts. Learn about Cisco IoT Operations Dashboard Asset tracking and monitoring Continuous tracking and monitoring of IIoT devices, assets, and facilities is essential to keep them up and running efficiently. Such visibility helps you quickly identify potential issues that could impact your operations, worker safety, and revenue. For example, tracking whether equipment is running inordinately hot or a door has been left open allows you to take corrective actions before irreversible damage is done. Discover Cisco Industrial Asset Vision Strong cybersecurity All connected devices increase the threat surface. Operational devices are especially vulnerable, and an attack could have grave consequences. Robust security based on the zero-trust model is a must. This model requires you to establish trust parameters by identifying and profiling connected endpoints. You also segment the network into zones and continuously monitor each endpoint's behavior to make sure it remains trustworthy. If anomalous behavior is found that might indicate an endpoint is infected, you can then take appropriate steps to mitigate any risk. See Cisco IoT/OT security solutions The role of IT in industrial IoT IIoT malfunctions can have a major impact on operations, ranging from production downtime to compromising worker safety or damaging the environment. IIoT installations benefit from rigorous IT processes, tools, and best practices. IT can scale and secure IIoT deployments to help ensure success. Downloaded by BENAZIR AE (arbenazir22@gmail.com) lOMoARcPSD|37383633
  • 67. A reliable network Organizations rely more and more on the quantity and quality of data they get from their operations. IT must strive to ensure that a reliable network with sufficient bandwidth capacity is in place so time-sensitive data can be transmitted without delay to applications in data centers or the cloud. The network that connects IIoT devices and sensors needs to support diverse physical channels. For example, although Ethernet cables may connect devices commonly found on the factory floor, wireless technologies such as 5G, 4G LTE, NFC, RFID, Bluetooth, NB-IOT, LoRaWAN, and Wi-SUN may also be required for connectivity. Intelligent network control The network for IIoT must be kept highly available. IIoT devices may be numerous and spread across a large geographical area, but a network controller can automate networking equipment deployment and keep configurations consistent, and firmware updated. It can also help ensure that devices are performing to expectations—and guide administrators to take corrective actions if not. Network controllers that have served IT well in the past could serve IIoT equally well. Security for critical resources As IT and IIoT networks converge, security practices must also converge. Protecting IIoT is best done with a comprehensive, integrated security solution rather than a multitude of point products. The same proven security tools that IT has deployed over the years can benefit IIoT as well. IoT Home Automation In this article, we will discuss the overview of IoT home automation. And will focus on smart lighting, smart appliances, intrusion detection, smoke/gas detector, etc. Let‘s discuss it one by one. Overview :  Home automation is constructing automation for a domestic, mentioned as a sensible home or smart house. In the IoT home automation ecosystem, you can control your devices like light, fan, TV, etc.  A domestic automation system can monitor and/or manage home attributes adore lighting, climate, enjoyment systems, and appliances. It is very helpful to control your home devices.  It‘s going to in addition incorporates domestic security such as access management and alarm systems. Once it coupled with the internet, domestic gadgets are a very important constituent of the Internet of Things.  A domestic automation system usually connects controlled devices to a central hub or gateway.  The program for control of the system makes use of both wall-mounted terminals, tablet or desktop computers, a smartphone application, or an online interface that may even be approachable off-site through the Internet.  Smart Home automation refers to the use of technology to control and automate various functions in a home, such as lighting, heating, air conditioning, and security. In the context of IoT (Internet of Things) and M2M (Machine-to-Machine) communications, home automation systems can be controlled and monitored remotely through a network connection.  One of the key benefits of IoT-enabled home automation is the ability to control and monitor a wide range of devices and systems from a single, centralized location, such as a smartphone or tablet. This can include everything from lighting and temperature control to security cameras and alarm systems.  Another advantage of IoT-enabled home automation is the ability to remotely monitor and control devices, even when away from home. This can be useful for controlling energy consumption and ensuring the safety and security of the home.  IoT-enabled home automation systems typically involve the use of smart devices, such as thermostats, light bulbs, and security cameras, that can be controlled and monitored through a centralized hub or app. These smart devices can communicate with each other and with the centralized hub using wireless protocols such as Zigbee, Z-Wave, and Bluetooth. Downloaded by BENAZIR AE (arbenazir22@gmail.com) lOMoARcPSD|37383633
  • 68.  In addition, IoT-enabled home automation systems can integrate with other smart home technologies, such as voice assistants like Alexa and Google Home, to provide additional functionality and convenience.  Overall, IoT-enabled home automation can provide many benefits to homeowners, including increased convenience, energy efficiency, and security. However, it is important to ensure the security of these systems, as they may be vulnerable to hacking and other cyber threats. Components : Here, you will see the smart home components like smart lighting, smart appliances, intrusion detection, smoke/gas detector, etc. So, let‘s discuss it. Component-1 : Smart Lighting –  Smart lighting for home helps in saving energy by adapting the life to the ambient condition and switching on/off or dimming the light when needed.  Smart lighting solutions for homes achieve energy saving by sensing the human movements and their environments and controlling the lights accordingly. Component-2 : Smart Appliances –  Smart appliances with the management are here and also provide status information to the users remotely.  Smart washer/dryer can be controlled remotely and notify when the washing and drying are complete.  Smart refrigerators can keep track of the item store and send updates to the users when an item is low on stock. Component-3 : Intrusion Detection –  Home intrusion detection systems use security cameras and sensors to detect intrusion and raise alerts.  Alert can we inform of an SMS or an email sent to the user.  Advanced systems can even send detailed alerts such as an image shoot or short video clips. Component-4 : Smoke/gas detectors –  Smoke detectors are installed in homes and buildings to detect smoke that is typically an early sign of Fire.  It uses optical detection, ionization for Air sampling techniques to detect smoke.  Gas detectors can detect the presence of harmful gases such as CO, LPG, etc.  It can raise alerts in the human voice describing where the problem is. ioT in Smart Home and Smart City Application Implementing IoT system in home and city leads them to become as smart home and smart city. Smart home or smart city make life quite easier and smarter. A smart home system can be something that makes our life quite easy. Starting from energy management where the power controls system in the AC appliances where we use the thermostat, all this is managed to cut down the power consumption that's taking place. A door management system, security management system, water management system are the part of this as well. Still, these are vital things that stand out in the smart home system. The limitation of IoT in smart home application stops where our imagination stops. Anything that we wish to automate or want to make our life easier can be a part of smart home, a smartphone system as well. Downloaded by BENAZIR AE (arbenazir22@gmail.com) lOMoARcPSD|37383633
  • 69. Now, a smart home usually is going to be a base of a smart city. The smart city is an evolution of a smart home. Here, it is not just the sensors of a single home that is connected, here its correlation or a network or a connection between various organizations, various domains as well as multiple segments of that city as a whole. In the smart city, the life of every single dependent becomes more comfortable and in tune really help to develop that city to greater extends as such. Now, the key factor for a smart city is government support as well, and if the governments are willing to take this step, then we hope we would see a smart city completely build on the Internet of Things. IoT Smart Agriculture Domain Another important domain for Iot is the agriculture domain where IoT system plays vital role for soil and crop monitoring and provides a proper solution accordingly. Using smart farming through IoT technologies helps farmer to reduce waste generation and increase the productivity. Downloaded by BENAZIR AE (arbenazir22@gmail.com) lOMoARcPSD|37383633
  • 70. There are several IoT technologies available that work on agriculture domain. Some of them are: o Drones for field monitoring o Sensor for soil monitoring o Water pump for water sully o Machines for routine operation Smart Irrigation System One of the parts of smart agriculture using IoT is smart irrigation system. In the smart irrigation system, IoT checks the moisture level in the environment or in the water lanes that the farmer has created. Now, let's understand the working process of this smart irrigation system. Usually, the two main IoT devices that used here is the Arduino board and the Raspberry Pi. The Raspberry Pi becomes the main processing unit, and an Arduino board is placed from each of water channels. These Arduino boards themselves connect to multiple sensors which are part of this water channel so what these sensors check the moisture present in these lanes as such. So, let's say a specific lane does not meet the minimum required moisture then the Arduino board would send a signal to the Raspberry Pi. Again all these devices are connected on the same wireless router network, and the Raspberry Pi would identify the lack of moisture and pass a signal to the relay. The relay, in turn, would initiate the water pump and the water would be parked now to ensure that water is not wasted. The smart irrigation system would be a gate control system and only that gate will open where the moister is less. Once the sensors detect that the moisture level has gone beyond the required limit, it would again transmit another signal to the Raspberry Pi asking it to stop the pump as well. So, this helps a farmer to save a lot of water and also makes life quite easier as well. So, after this, the farmer only task is to either setting up new plans or creating new water channels. Downloaded by BENAZIR AE (arbenazir22@gmail.com) lOMoARcPSD|37383633
  • 71. Smart Grid in Action The businesses, services and private citizens that require electricity from the grid, and therefore stand to benefit when municipalities adopt smart grid technologies, span every resident, city service and critical Downloaded by BENAZIR AE (arbenazir22@gmail.com) lOMoARcPSD|37383633
  • 72. infrastructure installation. While we won't cover every use case, some key examples can help to illustrate the impact of the movement to the smart grid. Smart grid allows a power company to assess system health in significantly more detail than was previously possible. For instance, with smart meters the power company can discover real time power demands with a granularity and accuracy that is simply not possible with older technology. This can allow them to better predict and respond to sudden increases in demand, which can help to prevent blackouts. In the event that a blackout does occur, IoT devices that use cellular and RF technology installed in transformers and substations can automatically redirect power. That can allow for a faster, easier fix versus having to dispatch service personnel in a truck each time the power goes out. As stated on SmartGrid.gov: “A smarter grid will add resiliency to our electric power system and make it better prepared to address emergencies such as severe storms, earthquakes, large solar flares, and terrorist attacks. Because of its two- way interactive capacity, the Smart Grid will allow for automatic rerouting when equipment fails or outages occur.” This idea of smart grid mitigating the effects of a terrorist attack is an interesting one and a topic we‘ll cover in a later section. For now it would be informative to look at how smart grid can benefit a city. How Smart Cities Are Adopting Smart Grid Technology Smart city applications are vast, and include everything from smart city lighting, energy management and intelligent traffic management to water treatment and wastewater management. Sensors in traffic lights can send information back to a central authority for decision making. Even better, with intelligent traffic systems, both surface traffic and public transportation can be managed with routing and traffic lighting to improve or eliminate congestion. IoT sensors in streetlights can also adjust off and on timing and brightness according to real time conditions. Plus or minus a few watts might not sound like much. However, when considering the thousands or tens of thousands of streetlights that can be found in any given city, the savings and environmental impact quickly add up. Those same sensors can also send out an alert if a light needs servicing. No need to wait for a call from an angry customer complaining about street lights being out. Additionally, with a sophisticated remote management solution, technicians can remotely troubleshoot the issue and determine whether or not to send a truck. In the past, a truck roll – a highly expensive proposition compared to a fast firmware fix or reboot from a management system in the home office – was inevitable. Smart meters enable demand response which lets home and business owners see real time pricing information so that they can adjust their energy usage accordingly. For example, switching off the AC, or turning down the thermostat in winter. Most of all smart meters will benefit electric car owners. With real time pricing information EV owners will be able to charge their cars when electricity is the cheapest and avoid charging, if possible, during times of peak demand. The Top Three Benefits of Smart Grid Downloaded by BENAZIR AE (arbenazir22@gmail.com) lOMoARcPSD|37383633
  • 73. While there are numerous benefits to smart grid the following three instances show just how useful an updated power grid can be. 1. Smart Grid Enables Renewable Energy Generation Traditional energy grids are designed to transmit electricity from a large, centralized power station to a wide network of homes and businesses in the area. At this stage, the electric grid is not designed to accept inputs from homes and businesses that are generating power via solar panels or windmills. A smart grid is designed to accept power from renewable resources. Crucially, the smart grid in conjunction with wirelessly enabled smart meters can keep track of how much energy a net-positive establishment is generating and reimburse them accordingly. The smart grid also allows for monitoring of solar panels and equipment as well. We mentioned earlier that a smart grid can mitigate the effects of a disaster such as a terrorist attack or natural disaster on a power station, a feat that‘s possible due to decentralized energy generation. Under the traditional model, a small number of power plants powered a city. This left these services vulnerable to threats that would result in widespread blackouts and energy shortages. With a decentralized model, even if the centralized power plant is taken offline, multiple alternative sources, including wind and solar, can supplant the resources in the grid. This decentralized system is much harder to take offline and can provide a robustness that‘s not possible when one plant is powering an entire city. 2. Better Billing, Better Predictions Smart meters offer two benefits. First, via wireless IoT devices they can collect a tremendous amount of data, data that utility companies have never had access to before. Utilities can use that information to better forecast when electricity demands will be high and from what areas the demand will be highest. Second, for consumers the smart grid means more efficient billing. Previously the costs of electricity during peak demand were averaged out among communities and neighborhoods. Now, if you use electricity while rates are high you‘ll be billed for it. And if you turn off appliances and save electricity, your bill will drop accordingly. This increases the incentive for everyone to use electricity responsibly. 3. Smart Grid is More Resilient A US DOE (Department of Energy) report suggests that every year power outages in the United States cost businesses about $150 billion. While that’s only an estimate, even if only $50 billion a year lost these outages are a problem which must be solved. Downloaded by BENAZIR AE (arbenazir22@gmail.com) lOMoARcPSD|37383633
  • 74. With smart grid technology, power can be automatically rerouted as soon as a blackout happens, minimizing the effects on households and businesses. IoT sensors can also report on the condition of equipment so that repairs can be made before failure. Utilities can notify their customers (via email/social media) when there is an outage instead of reactively responding to customer calls reporting outages. Connected Vehicles Connectivity will be at the heart of next generation vehicles. Whether it will be real-time traffic flow information, mapping, infotainment or remote access to emergency services, all these services will require connectivity. Connected vehicle applications and services have distinctive features; they need to operate globally and usually have a very long ‗device‘ lifetime, however can be integrated with local intelligent transport solutions and need to comply with local security and emergency regulations. Connected vehicle and smart transport applications have the potential to bring substantial benefits to consumers, including making travel safer, reducing congestion, and providing real time information to passengers. The GSMA is working with mobile operators and automotive OEMs to align the industry and wider ecosystem around a common approach to security and network connectivity to accelerate the growth of the Connected Vehicle market. Governments can help encourage the development of the connected vehicle and intelligent transport ecosystems by:  Introducing incentives for innovation and investment  Leading with light-touch regulation that will allow the market to scale while building trust and confidence of consumers  Promoting research and development programmes for connected and autonomous vehicles  Supporting services, applications and network industry-led standards and interoperability Downloaded by BENAZIR AE (arbenazir22@gmail.com) lOMoARcPSD|37383633
  • 75. The Role of the IoT in EV Charging Stations is Two-Fold First, the IoT can be used to remotely monitor and manage charging station operations. This includes monitoring charger availability, managing user access, and providing real-time updates on charger status. Second, the IoT can be used to provide data that can be used to improve the efficiency of charging station operations. This data can be used to optimize charger utilization, identify areas for improvement, and track trends over time. The benefits of using the IoT in EV charging stations are numerous and far-reaching. By leveraging the power of the IoT, we can make EV charging stations more efficient, easier to use, and more reliable. How IoT can Track Electric Vehicle Charging Stations to Decrease Grid Load As electric vehicles (EVs) become more prevalent, it‘s important to have a way to track charging stations to decrease grid load. The internet of things (IoT) can be used for this purpose. Charging an EV takes a lot of power, and if many people are charging their EVs at the same time, it can put a strain on the grid. By tracking charging stations with IoT, we can see when they‘re being used and how much power is being drawn. This information can be used to regulate the flow of power so that the grid isn‘t overloaded. IoT can also be used to monitor the status of charging stations and their batteries. If there‘s a problem with a station, it can be fixed quickly before it causes any disruptions. Top Benefits of using IoT in Electric Vehicle Charging Stations The benefits of using IoT in electric vehicle charging station The use of IoT in electric vehicle charging stations is currently a hot topic in the industry, with many companies looking to implement this technology. The main benefits are as follows: 1. It helps to save money by reducing energy costs. 2. It helps to reduce carbon emissions by reducing the amount of electricity being consumed. 3. It helps to improve customer satisfaction by providing them with accurate information about their vehicle‘s charging status even when they‘re away from home or work. What Is the Internet of Military Things (IoMT) The Internet of Military Things (IoMT) and the Internet of Battlefield Things (IoBT) are networks of sensors, wearables, and IoT devices that use cloud and edge computing to increase military capabilities and safety. IoMT and IoBT incorporate strong edge architecture that uses biometrics, environmental sensors, and other connected devices to communicate data quickly, allowing military personnel to respond and perform better on the battlefield. The network of interconnected entities or ―things‖ in the military domain constantly communicate, coordinate, learn, and interact with the physical environment, increasing intelligence and allowing for more informed decision-making. Downloaded by BENAZIR AE (arbenazir22@gmail.com) lOMoARcPSD|37383633
  • 76. IoT Military Applications IoT military applications include connected ships, tanks, planes, drones, soldiers, and operating bases that all work together in a cohesive network to increase situational awareness, risks assessment, and response time. As military operations become more unpredictable and complex, utilizing IoT technology can help personnel make more informed decisions and take more calculated actions. Here are a few of the most transformative IoT military applications:  Collecting Battlefield Intelligence: IoT enables soldiers to survey the battlefield through unmanned aerial drones utilizing cameras and sensors. Soldiers are able to capture images, trace the landscape, locate enemies, and send real-time data to a command center–all in an effort to keep an eye on the battlefield and make more strategic judgments.  Base Security: Drones can be used for border patrols to alert military staff in the event of an intruder. If there is a violation or threat, utilizing unmanned devices prevents personnel losses, as they can be operated over a distance.  Monitoring Soldier Health: Through the use of sensors in military uniforms, a soldier‘s heart rate, body temperature, and thermal distribution can be monitored. The collected data about a soldier‘s physical and mental health can then be shared with doctors in real-time, allowing for the arrangement of any necessary aid in advance on a per-soldier basis. Additionally, biometrics as well as behavior elements such as speech patterns, body dynamic patterns, and more can be used to create a model of a soldier‘s current condition, which is essential in the case of a critical intervention.  Equipment and Fleet Management: Regularly maintaining vehicles and efficient transportation is essential in successful military operations. Utilizing the data collected by IoT devices can help track supplies out on the battlefield. Elements like position, fuel efficiency, engineer status, damage level, and other parameters enable the quick identification of inconsistencies and solutions. This ultimately enables lower transportation costs as well as less need for human intervention, and creates more reliable fleets. Furthermore, with the integration of sensors onto weapons and unmanned equipment, soldiers can know when to reload and surveillance on enemy grounds can be more safely conducted.  Smart Bases: Enemies may attempt at accessing military bases through stolen badges or appearing as civilians. Using IoT fingerprinting and other biometric data, a person‘s true identity can be found. Other IoT sensors can be incorporated into military bases to increase performance, efficiency, and convenience of services on an isolated military base. Automated screening of resources, in addition to the smart management of water and electricity, can all help optimize operations.  More Advanced Training: Utilizing IoT devices, military personnel can be more prepared for the real battlefield. Through movement sensors, acoustic sensors, and other methods, personnel can be screened during preparation and send data to coaches who can better train them. Elements such as Downloaded by BENAZIR AE (arbenazir22@gmail.com) lOMoARcPSD|37383633
  • 77. AR remote training to create more realistic battlefield simulation with VR-fitted equipment can really transform the training environment for a soldier and allow for better evaluation. Downloaded by BENAZIR AE (arbenazir22@gmail.com) lOMoARcPSD|37383633