IOT introduction
-
Upload
xinoe -
Category
Technology
-
view
283 -
download
0
Transcript of IOT introduction
Internet of Things| A Place Where Machines talk toMachines
Definition
The Internet of Things (IoT) is a scenario in which objects, animals or people
are provided with unique identifiers and the ability to transfer data over a
network without requiring human-to-human or human-to-computer interaction.
A thing, in the Internet of Things, can be a person with a heart monitor
implant, a farm animal with a bio-chip transponder, an automobile that has built-
in sensors to alert the driver when tire pressure is low -- or any other natural or
man-made object that can be assigned an IP address and provided with the
ability to transfer data over a network.
Architecture of IoT
Sensor Layer
Lowest Abstraction Layer Incorporated to measure physical quantities Interconnects the physical and digital world Collects and process the real time information
Gateway and Network Layer
Robust and High performance network infrastructure Supports the communication requirements for latency, bandwidth or security Allows multiple organizations to share and use the same network independently
Management Service Layer
Capturing of periodic sensory data Data Analytics (Extracts relevant information from massive amount of raw data) Streaming Analytics ( Process real time data) Ensures security and privacy of data.
Application Layer
Provides a user interface for using IoT. Different applications for various sectors like Transportation, Healthcare, Agriculture, Supply chains, Government, Retail etc.
Major Challenges
Big Data Explosion Countless components Security & Privacy Advanced Internet Protocol Power efficiency
Internet connected things
IOT- Enabling Technologies
RFID Sensor Smart Tech Nano Tech
To identify and track the data of things
To collect and process the data to detect the changes in the physical status of things
To enhance the power of the network by devolving processing capabilities to different part of the network.
To make the smaller and smaller things have the ability to connect and interact.
Applications of IOT
Network
Biosensor taken by people
Equipment in public placeHouse
Regional Office
Virtual EnvironmentTransportation Vehicle
Scenario: Shopping
(2) When shopping in the market, the goods will introduce themselves.
(1) When entering the doors, scanners will identify the tags on her clothing.
(4) When paying for the goods, the microchip of the credit card will communicate with checkout reader.
(3) When moving the goods, the reader will tell the staff to put a new one.
Scenario: Smart Home
Scenario: E-Healthcare
Scenario: Smart Cars
Scenario: Smart Farms
Current Scenario
Future Scenario
Major Components of IOT
Major Components of IOT: (Client Server Model)
NetworkResult
ClientServer
Client machineServer machine
Socket Programming
Minimum Requirement- Linux OS (Lib. Header iles)
Server and Client
IP and Port No.
What is Socket?
Sockets are communication points on the same or different computers to exchange data. Sockets are supported by Unix, Windows, Mac, and many other operating system.
Sockets allow communication between two different processes on the same or different machines. To be more precise, it's a way to talk to other computers using standard Unix file descriptors.
What is Socket Address?
Socket address is a combination of IP address and Port number
What is Port?
• One of the circuit connection points on a front end processor or local intelligent controller
Dest.
Host
Port
SRC
HostTCP
What is Port?At the transport layer, an address is needed to choose among
multiple processes running on the destination host called Port Number
Destination Port Number for delivery Source Port Number for reply
TCP or UDPPort Port Port Port
Process 1 Process 2 Process 3 Process 4
Port# Data
Data
Packet
Port Number Port is represented by a positive (16-bit ) integer value
between 0 and 65,535
Some ports have been reserved to support common / well known services
ftp 21/tcp telnet 23/tcp smtp 25/tcp login 513/tcp
User level process/services generally use port number value >= 1024
Socket Types
1) Stream Sockets:
Delivery in a networked environment is guaranteed. If you send through the stream socket three items "A, B, C", they will arrive in the same order - "A, B, C".
These sockets use TCP (Transmission Control Protocol) for data transmission.
If delivery is impossible, the sender receives an error indicator.
Socket Types
Datagram Sockets:
Delivery in a networked environment is not guaranteed.
They're connectionless because you don't need to have an open connection as in Stream Sockets - you build a packet with the destination information and send it out.
They use UDP (User Datagram Protocol).
Server and Client Programming Concept
- Server
Create a socket with socket () Bind the socket to an address using the bind() Listen for connections with the listen() Accept a connection with the accept() Send and Receive, use read() and write() system calls
- Client
Create a socket with the socket() Connect socket to the address of server using connect()
system call Send and receive data, use read() and write() system calls
Socket programming- Flow
socket()
connect()
send()
recv()
close()
..
.
socket()
bind()
listen()
accept()
recv()
send()
close()
wait for connection request from next client
Client Server
What is Machine to Machine (M2M) Communication?
The Machine to Machine concept(communications inter-machines) implies the association of information and communication technologies (ICT), smart and communicating objects, as well as specialized software to interact, with the enterprise’s information system, without human intervention.
What is cloud computing?
The practice of using a network of remote servers hosted on the Internet to store, manage, and process data, rather than a local server or a personal computer.
Clouds can be classified as public, private, and hybrid
Cloud computing types
IOT Standard Protocols
Protocols
• TCP• UDP
What Connects Internet of things…?
TCP Vs UDP
ROLE OF WIRELESS COMMUNICATION IN IOT
Bluetooth :
wireless technology standard for exchanging data over short distances (using short-wavelength UHF radio waves in the ISM band from 2.4 to 2.485 GHz) from fixed and mobile devices, and building personal area networks (PANs).
Bluetooth Technologies in IOT
Bluetooth LE | Bluetooth Smart (IEEE 802.15.4)
Bluetooth Smart/ Bluetooth LE :
Bluetooth Smart is an application-friendly technology supported by every major operating system.
The technology costs less and offers flexible development architecture for creating applications to bring everyday objects like heart-rate monitors, toothbrushes, and shoes into the connected world and have them communicate with applications that reside on the Bluetooth Smart compatible smartphones, tablets, or similar devices those consumers already own.
Zigbee :ZigBee is based on an IEEE 802.15.4 standardIts low power consumption limits transmission distances to 10–100 meters line-of-sight,ZigBee devices can transmit data over long distances by passing data through a mesh network of intermediate devices to reach more distant ones.
ZigBee is typically used in low data rate applications that require long battery life and secure networking
ZigBee has a defined rate of 250 kbit/s, best suited for intermittent data transmissions from a sensor or input device.
Wi-Fi
Wi-Fi is the name of a popular wireless networking technology that uses radio waves to provide wireless high-speed Internet and network connections.
Wi-max
WiMAX (Worldwide Interoperability for Microwave Access) is a wireless communications standard designed to provide 30 to 40 megabit-per-second data rates.
SATCOM
Satcom (which stands for "satellite communication") is an artificial satellite that is used to help telecommunication by reflecting or relaying signals into space and back down to Earth.
It is the most powerful form of radio and can cover far more distance and wider areas than other radios.
It can also communicate with words, pictures and other forms of information.
RFID
Radio-frequency identification (RFID) is the wireless use of electromagnetic fields to transfer data, for the purposes of automatically identifying and tracking tags attached to objects.
ETHERNET
Ethernet is the most commonly used local area network technology deployed with transmission speeds heading upwards into the gigabits range.
Ethernet is the most widely installed local area network (LAN) technology.
GSM- Global System for Mobile Communication
GSM digitizes and compresses data, then sends it down a channel with two other streams of user data, each in its own time slot.
It operates at either the 900 MHz or 1800 MHz frequency band.
GPRS- General Packet Radio Service
General packet radio service (GPRS) is a packet oriented mobile data service on the 2G and 3G cellular communication system's global system for mobile communications (GSM)
GPS- Global Positioning System
The Global Positioning System (GPS) is a space-based satellite navigation system that provides location and time information in all weather conditions, anywhere on or near the earth where there is an unobstructed line of sight to four or more GPS satellites
GROUPING OF STATIONS / CELLULAR NETWORK :
A cellular network or mobile network is a wireless network distributed over land areas called cells, each served by at least one fixed-location transceiver, known as a cell site or base station.
In a cellular network, each cell uses a different set of frequencies from neighboring cells, to avoid interference and provide guaranteed bandwidth within each cell.
CELL SIGNAL ENCODING
To distinguish signals from several different transmitters, following concepts are used:
Frequency division multiple access (FDMA) Code division multiple access (CDMA)
FDMA, TDMA & CDMA
RELAY ACCESS POINT :
A wireless repeater (also called wireless range extender) takes an existing signal from a wireless router or wireless access point and rebroadcasts it to create a second network.
TARGET WAKE TIME:
Target Wake Time (TWT) is a function that permits an AP to define a specific time or set of times for individual stations to access the medium.
The STA (client) and the AP exchange information that includes an expected activity duration to allow the AP to control the amount of contention and overlap among competing STA.
The AP can protect the expected duration of activity with various protection mechanisms.
1G, 2G, 3G and 4G(LTE) mobile networks:
LTE- Long Term Evaluation
IPv4 Vs IPv6:
Thank YouHave Fun ;)