Unit 2 Fundamentals of Iot Mechanisms and Key Technologies
Unit 2 Fundamentals of Iot Mechanisms and Key Technologies
Unit 2 Fundamentals of Iot Mechanisms and Key Technologies
Unit 2
Fundamentals of IoT Mechanisms and Key Technologies
IoT stands for internet of things. Most simply, it refers to physical objects linked through
wired and wireless networks. More specifically, it refers to the collection of internet-
connected devices that are able to communicate autonomously over the internet, without
needing a person to initiate the communication.
You might be asking yourself, how is this different from the “internet” as most people
commonly understand the term? Well, it really isn't that different -- it's just a way of talking
about the internet with a specific focus on "things" instead of people.
What does IoT stand for and what does it mean?
Consultancy McKinsey & Company offered this basic description of IoT: “Sensors and
actuators embedded in physical objects are linked through wired and wireless networks, often
using the same Internet Protocol (IP) that connects the internet.”
Kevin Ashton, who coined the term internet of things, preferred the term internet for things.
While not widely used, this term provides a helpful way to understand the concept behind
IoT. Think of the "normal" internet you access from your PC or smartphone as the internet
for people and IoT as an internet of interrelated computing devices, mechanical and digital
machines, objects, etc.
The internet of things is everywhere. It is used in a range of industries and has both corporate
and consumer uses. Today, for example, automobiles often have dozens of sensors that
collect and transfer data for safety, maintenance, entertainment, fleet management and other
purposes. These internet-connected cars are considered part of the internet of things, because
they communicate with other devices over the internet based on input from the environment,
not just from direct human manipulation.
How does IoT work?
IoT works through a combination of wireless networking technology, physical devices,
advanced data analytics and cloud computing. The basic process of how IoT works is as
follows:
The thermostat has a sensor that reads the temperature in the room.
The thermostat stores and processes that data.
If the temperature exceeds a certain value, the thermostat automatically regulates the
temperature to some predefined value.
IoT DR SHIKHA GAUTAM
Data. IoT technologies provide myriad ways to collect data about the physical world.
Data is the fuel of IoT and is why it is so important.
Device. The actual, physical components or things in the internet of things that collect
this data.
Analytics. The process of making collected data useful by turning raw data into
actionable insights.
Connectivity. Makes sharing data and insights possible, increasing the value of that
data. This is the internet in internet of things.
Closely related terms anyone getting acquainted with the concept of IoT should be aware of:
Edge computing
Big data analytics
Artificial intelligence
Machine learning
Supply chain management
Digital twin
Machine-to-machine
Operational technology
Ambient intelligence
Radio frequency identification
Near field communication
Person-to-person
Machine-to-human
Specific types of IoT and its applications:
Embedded System
1. Wireless Sensor Network (WSN):
A WSN comprises distributed devices with sensors which are used to monitor the
environmental and physical conditions. A wireless sensor network consists of end nodes,
routers and coordinators. End nodes have several sensors attached to them where the data is
passed to a coordinator with the help of routers. The coordinator also acts as the gateway that
connects WSN to the internet.
Example -
It is a way of delivering applications over the internet as a service. Instead of installing and
maintaining software, you simply access it via the internet, freeing yourself from complex
software and hardware management.
SaaS Applications are sometimes called web-based software on demand software or hosted
software.
SaaS applications run on a SaaS provider’s service and they manage security availability and
performance.
Ex: Google Docs, Gmail, office etc.
3. Big Data Analytics:
It refers to the method of studying massive volumes of data or big data. Collection of data
whose volume, velocity or variety is simply too massive and tough to store, control, process
and examine the data using traditional databases.
Big data is gathered from a variety of sources including social network videos, digital images,
sensors and sales transaction records.
Several steps involved in analyzing big data -
Data cleaning
Munging
Processing
Visualization
Examples -
Bank transactions
Data generated by IoT systems for location and tracking of vehicles
E-commerce and in Big-Basket
Health and fitness data generated by IoT system such as a fitness bands
4. Communications Protocols:
They are the backbone of IoT systems and enable network connectivity and linking to
applications. Communication protocols allow devices to exchange data over the network.
Multiple protocols often describe different aspects of a single communication. A group of
protocols designed to work together is known as a protocol suite; when implemented in
software they are a protocol stack.
They are used in
Data encoding
Addressing schemes
5. Embedded Systems:
It is a combination of hardware and software used to perform special tasks.
It includes microcontroller and microprocessor memory, networking units (Ethernet Wi-Fi
adapters), input output units (display keyword etc.) and storage devices (flash memory).
IoT DR SHIKHA GAUTAM
Digital camera
DVD player, music player
Industrial robots
Wireless Routers etc.
Identification also links objects to information associated with the particular object that can
be retrieved from a server. It enables the object to communicate with other objects through
the Internet in the same or different scope. There should be a way to coordinate the identities
of all IOT objects in the scope to allow secure inter-object communication. Identity
management is required for three main parties: the user, object identities, and relationships,
IoT DR SHIKHA GAUTAM
depending on the certain principles that apply to object identity. It must also deal with unique
challenges in the IOT model.
On the one hand, identification is significant for the IOT to name and match services with
their scope, the challenges regarding applying each object with a unique identity, and
representation and storing of exchanged information. On the other hand, addressing the IOT
objects is necessary to differentiate between object ID or name and its address, referring to
the object address within a communication network. There are addressing methods for IOT
objects like IPv4, IPv6, and 6LoWPAN addresses, as well as many former identification
methods such as Radio Frequency Identification (RFID), Bluetooth, Barcode/2D code, Near
Field Communication (NFC), Electronic product codes (EPC), IP address, etc. Identification
methods give each object within the network a clear and unique identity.
IOT applications can mainly provide four types of services; Identity related services,
Information aggregation services, Collaborative Aware services, and Ubiquitous services.
The Identity related services are concerned with object identity information, whereas
Information aggregation is used to collect, summarize, and process all the information from
objects and send it back to the application. Moreover, Collaborative Aware services are used
to turn the collected information into a decision and send appropriate responses to the
devices. The last service is Ubiquitous services, which are responsible for providing
Collaborative-Aware services immediately to anyone at any time and place.
Smart Services™ optimize the ability to leverage advanced IoT technologies, access and
capture data from virtually all sensors, devices, machines, and equipment throughout the
organization, and generate actionable intelligence that enhances business performance and
operational efficiency.