Chapter 2 ETI
Chapter 2 ETI
Internet of Things
Content
1.1 Embedded Systems:
• Embedded system concepts,
• Purpose of embedded systems,
• Architecture of embedded systems,
• Embedded processors-PIC, ARM, AVR,ASIC
1.2 IoT: Definition and characteristics of IoT
• Physical design of IoT,
Things of IoT,IoT Protocols
• Logical design of IoT,
IoT functional blocks,IoT Communication models, IoT Communication APIs,
• IoT Enabling Technologies,
• IoT levels and deployment templates,
• IoT Issues and Challenges, Applications
• IoT Devices and its features: Arduino, Uno, Raspberry Pi, Nodeµ
• Case study on IoT Applications using various Sensors and actuators
Embedded Systems:
OR
Self-Configuring
IoT devices may have self-configuring capability, allowing a large
number of devices to work together.
Interoperable Communication Protocols:
IoT devices may support a number of interoperable communication
protocols and can communicate with other devices and also with the
Unique Identity:
• Each loT device has a unique identity and a unique identifier
(such as an IP address or a URI).
• IoT systems may have intelligent interfaces which allows
communicating with users and the environmental contexts.
Link Layer
• Link layer protocols determine how the data is physically sent
over the network's physical layer or medium (e.g., copper wire,
coaxial cable, or a radio wave).
802.3- Ethernet:
• IEEE 802.3 is a collection of wired Ethernet standards for the
link layer.
• Example: Standards Ethernet Shared
Medium
802.3 10BASE5 coaxial cable
802.3.i 10BASE-T copper
twisted-pair
802.3.j 10BASE-F fiber optic
802.3ae 10 Gbit/s fiber optic
• The recent update 802.161 provides data rates of 100 Mbit/s for mobile
stations and 1 Gbit/s for fixed stations
802.15.4 LR-WPAN:
• 802.15.4 is a collection of standards for low-rate wireless personal
area networks (LR-WPANs).
• These standards form the basis of specifications for high level
communication protocols such as ZigBee.
• LR-WPAN standards provide data rates from 40 Kb/s to 250 Kb/s.
IPv4 has 32-bit address length IPv6 has 128-bit address length
Messages:
• HTTP messages are of two types:
1.Request
2.response.
• Both the message types follow the same
message format.
COAP: Constrained Application Protocol:
• CoAP is an application layer protocol for machine-to-machine
(M2M) applications.
• Like HTTP, COAP is a web transfer protocol and uses a request-
response model, however it runs on top of UDP instead of TCP.
• COAP uses a client-server architecture where clients
communicate with servers using connectionless datagrams.
• COAP is designed to easily interface with HTTP. Like HTTP,
COAP supports methods such as GET, PUT, POST, and
DELETE.
• CoAP, represented as two different
layers :
• Messages
• Request/Response.
Why MQTT
• It’s a lightweight protocol. So, it’s
easy to implement in software and fast in data transmission.
• Minimized data packets. Hence, low network usage.
• Low power usage, so saves device’s battery.
• It’s real time! That’s is specifically what makes it perfect for IoT
applications.
MQTT Components:
• Broker, server that handles the data transmission between the
clients.
• Topic, data device want to put or retrieve a messages.
• Message, data that a device receives “when subscribing” from a
topic or send “when publishing” to a topic.
• Publish, is the process a device does to send its message to the
broker.
• Subscribe, where a device does to retrieve a message from the
broker.
How MQTT works:
• Clients-Server based protocol.
• MQTT server is called a broker and the clients are simply the
connected devices.
• When a device (a client) wants to send data to the broker, we
call this operation a “publish”.
• When a device (a client) wants to receive data from the broker,
we call this operation a “subscribe”.
Example:
• A temperature sensor wants to send his readings to the broker.
• A phone/desktop application wants to receive this temperature.
• The device defines the topic it wants to publish on, ex: “temp”.
• Then, it publishes the message “temperature value”.
• The phone/desktop application subscribes to the topic “temp”.
Then, it receives the message that the device has published.
Advanced Message Queuing Protocol (AMQP):
• AMQP is an application layer protocol for business messaging, supports
point-to-point and publisher/subscriber models, routing and queuing.
• AMQP brokers receive messages from publishers (e.g., devices or
applications that generate data) and route them over connections to
consumers (applications that process data).
• Publishers publish the messages, which then distribute message copies to
queues.
• Messages are either delivered by the broker to the consumers which have
subscribed to the queues or the consumers can pull the messages from the
queues.
XMPP: Extensible Messaging and Presence Protocol
• XMPP protocol for real-time communication and streaming
XML data between network entities.
• XMPP powers wide range of applications including
messaging, presence, gaming, multi- party chat and
voice/video calls.
• XMPP allows sending small chunks of XML data from one
network entity to another in real-time.
• XMPP is a decentralized protocol and uses a client-server
architecture.
• XMPP supports both client-to-server and server-to- server
communication paths.
• In the context of IoT, XMPP allows real-time communication
between IoT devices.
Data Distribution Service (DDS):
• DDS, standard for device-to-device
communication.
• It Enables scalable, real-time, reliable
performance.
• DDS uses a publish-subscribe model
where publishers (e.g. devices that
generate data) create topics to which
subscribers (e.g., devices that want to
consume data) can subscribe.
Cache-able:
• Cache constraint requires that the data within a response to a
request be implicitly or explicitly labeled as cache-able or
non-cache-able.
• If a response is cache-able, then a client cache is given the
right to reuse that response data for later, equivalent requests.
• Caching can partially or completely eliminate some
interactions and improve efficiency and scalability.
Layered System:
• This constrains the behavior of each component cannot see
beyond the immediate layer with which they interacting.
• For example, a client cannot tell whether it is connected
directly to end server, or to an intermediary along the way.
• System scalability can be improved by allowing intermediaries
to respond to requests instead of the end server, without the
client having to do anything different.
Uniform Interface:
• It requires that the method of communication between a client
and a server must be uniform.
• Resources are identified in the requests , when a client holds a
representation of a resource it has all the information required
to update or delete the resource (provided the client has
required permissions).
Code on demand:
• Servers can provide executable code or scripts for clients to
execute in their context.
• This is the only constraint that is optional.
• A RESTful web service is a "web API" implemented using HTTP
and REST principles.
• RESTful web API has a base URI (http://example.com/api/tasks/).
• The clients send requests to these URIS using the methods defined
by HTTP protocol (eg. GET, POST etc), A RESTful web service
can support various internet media types ( eg. JSON,XML),
Communication between client and server using
REST APIs.
Interactions in the request-response model used by REST.
WebSocket based communication
API:
• Websocket APIs follow the exclusive
pair communication model.
• WebSocket APIs allow bi-
directional, full duplex
communication and do not require
new connection to be setup for each
message to be sent.
• Websocket communication begins
with a connection setup request sent
by the client to the server.
WebSocket based communication API:
• The request (called websocket handshake) is sent over HTTP
and the server interprets it.
• Websocket protocol, the server responds to the websocket
handshake response.
• After the connection setup client and server can send
data/mesages to each other in full duplex mode.
• Websocket API reduce the network traffic as there is no
overhead for connection setup and termination requests for each
message.
• Websocket suitable for IoT applications that have latency or
high throughput requirements.
• So Web socket is most suitable IoT Communication APIs for
IoT System.
IoT Enabling Technologies:
Motion sensors:
• Used for security purposes, automatic door controls,
automatic parking systems, automated sinks,
automated toilet flushers, hand dryers, energy
management systems, etc.
• HC-SR501 passive infrared (PIR) sensor is a popular
motion sensor.
Gas sensors:
• Used to detect toxic gases.
• The sensing technologies most commonly used are
electrochemical, photo-ionisation etc.
Smoke sensors:
• Used in homes and industries.
• With the advent of the IoT, adding a wireless
connection to smoke detectors enables additional
features that increase safety and convenience.
Pressure sensors:
• Used in IoT systems to monitor systems and devices that are driven by
pressure signals.
• When pressure range is beyond the threshold level, the device alerts the
user about the problems that should be fixed.
• For example,BMP180 is a popular digital pressure sensor for use in
mobile phones, PDAs, GPS navigation devices and outdoor equipment.
Accelerometer sensors:
Used in smartphones, vehicles,
aircrafts and other applications to detect
orientation of an object, shake, tap, tilt,
motion, positioning, shock or vibration.
Image sensors:
• Used in digital cameras, medical imaging systems, night-vision
equipment, thermal imaging devices, radars, media house and biometric
systems.
• In the retail industry, these sensors are used to monitor customers
visiting the store through IoT network.
• In offices and corporate buildings, they are used to monitor employees
and various activities
IR sensors:
• Used to measure the heat emitted by objects.
• They are used in various IoT projects including
healthcare to monitor blood flow and blood pressure,
smartphones to use as remote control and other
functions, wearable devices to detect amount of light, thermometers to
monitor temperature and blind-spot
Proximity sensors:
• Detect the presence or absence of a nearby object without any physical
contact.
• Different types of proximity sensors are inductive, capacitive,
photoelectric, ultrasonic and magnetic.
• These are mostly used in object counters, process monitoring and
control.
Stepper Motor: Stepper motors are DC motors that
move in discrete steps. They have multiple coils that are
organized in groups called “phases”. By energizing
each phase in sequence, the motor will rotate, one step
at a time.
DC motors:
• Direct Current motor is the most common actuator
used in electronics projects.
• They are simple, cheap, and easy to use.
• DC motors convert electrical into mechanical
energy.
• They consist of permanent magnets and loops of
wire inside.
• When current is applied, the wire loops generate a
magnetic field, which reacts against the outside field
of the static magnets
Linear Actuator:
• It creates motion in a straight line, in contrast to
the circular motion of a conventional electric motor.
• Linear actuators are used in machine tools and
industrial machinery etc.
Relay:
• A relay is an electrically operated switch. Many relays use an
electromagnet to mechanically operate a switch.
• The advantage of relays is that it takes a relatively small amount of
power to operate the relay coil, but the relay itself can be used to
control motors, heaters, lamps or AC circuits which themselves can
draw a lot more electrical power.
Solenoid:
• A solenoid is simply a specially designed electromagnet.
• Solenoids are inexpensive, and their use is primarily limited to on-
off applications such as latching, locking, and triggering.
• They are frequently used in home appliances (e.g. washing machine
valves), office equipment (e.g. copy machines), automobiles (e.g.
door latches and the starter solenoid), and factory automation.
Applications-Domain Specific IoTs Home Automation:
• Smart Lighting: helps in saving energy by adapting the lighting to
the ambient conditions and switching on/off or diming the light when
needed.
• Forest Fire Detection: Forest fire can cause damage to natural resources,
property and human life. Early detection of forest fire can help in minimizing
damage.
• River Flood Detection: IoT based river flood monitoring system uses a no.
of sensor nodes that monitor the water level and flow rate sensors.
Retail:
• Inventory Management: IoT systems enable remote monitoring of
inventory using data collected by RFID readers.
• Smart Payments: Solutions such as contact-less payments powered
by technologies such as Near Field Communication(NFC) and
Bluetooth.
• Smart Vending Machines: Sensors in a smart vending machines
monitors its operations and send the data to cloud which can be used
for predictive maintenance.
Logistics:
• Route generation & scheduling: IoT based system backed by
cloud can provide first response to the route generation queries and
can be scaled upto serve a large transportation network.
• Fleet Tracking: Use GPS to track locations of vehicles in real-time.
• Shipment Monitoring: IoT based shipment monitoring systems use
sensors such as temp, humidity, to monitor the conditions and send
data to cloud, where it can be analyzed to detect food spoilage.
• Remote Vehicle Diagnostics: Systems use on-board IoT devices for
collecting data on Vehicle operation’s (speed, RPMetc.,) and status
of various vehicle sub systems.
Agriculture:
• Smart Irrigation: to determine moisture amount in soil.
• Green House Control: to improve productivity.
Industry:
• Machine diagnosis and prognosis
• Indoor Air Quality Monitoring
• USB -- This is a common connection port for peripheral devices of all types
(including your mouse and keyboard). Model A has one, and Model B has
two.
• Power -- This is a 5v Micro USB power connector into which you can plug
operating system (OS) installed is required for booting the device. They are
available for purchase from the manufacturers, but you can also download
• Ethernet -- This connector allows for wired network access and is only
▪ In 1999, the FBI CART case load goes beyond 2000 case
examining, 17 terabytes of information.
▪ Identification:
• It recognizes an incident from indicators and determines its type.
▪ Preservation:
• Preservation stage corresponds to "freezing the crime scene".
• It consists in stopping or preventing any activities that can
damage digital information being collected.
• Preservation involves operations such as preventing people from
using computers during collection, stopping ongoing deletion
processes, and choosing the safest way to collect information.
Six Phases of RMDFR are as follows:
▪ Collection:
• Collection stage consists in finding and collecting digital information
that may be relevant to the investigation.
• Since digital information is stored in computers, collection of digital
information through equipment's containing the information, or
recording the information on some medium.
• Collection may involve copying or printing out contents of files from
a server, recording of network traffic, and so on.
▪ Examination:
• Examination stage consists in a " in-depth systematic search of
evidence" relating to the incident being investigated.
• The outputs of examination are data objects found in the collected
information.
• They may include logfiles, data files containing specific phrases,
times-stamps, and so on.
Six Phases of RMDFR are as follows:
▪ Analysis:
• The aim of analysis is to “draw conclusions based on evidence
found".
▪ Reporting:
▪ This entails writing a report outlining the examination process and
pertinent data recovered from the overall investigation.
Abstract Digital Forensic Model (ADFM):
• Reith, Carr, Gunsh proposed Abstract Digital Forensic model in
2002.
Phases of ADFM model are as follows:
• Identification –it recognizes an incident from indicators and
determines its type.
• Preparation –it involves the preparation of tools, techniques, search
warrants and monitoring authorization and management support
• Approach strategy –formulating procedures and approach to use in
order to maximize the collection of untainted evidence while
minimizing the impact to the victim
• Preservation–it involves the isolation, securing and preserving the
state of physical and digital evidence
Phases of ADFM model are as follows:
• Collection –This is to record the physical scene and duplicate digital
evidence using standardized and accepted procedures
• Examination –An in-depth systematic search of evidence relating to
the suspected crime. This focuses on identifying and locating
potential evidence.
• Analysis –This determines importance and probative value to the
case of the examined product
• Presentation -Summary and explanation of conclusion
• Returning Evidence –Physical and digital property returned to
proper owner
Integrated Digital Investigation Process (IDIP):
• Model has 5 groups and 17 phases are proposed by Carrier and
Safford.
The phases of IDIP are as follows:
▪ Readiness phase:
• The goal of this phase is to ensure that the operations and
infrastructure are able to fully support an investigation.
• It includes two phases:
1. Operations Readiness phase
2. Infrastructure Readiness phase
▪ Deployment phase:
• This phase provides mechanism for an incident to be detected and
confirmed.
• It includes two phases:
1. Detection and Notification phase: where the incident is detected
and then appropriate people notified.
2. Confirmation and Authorization phase: which confirms the
incident and obtains authorization for legal approval to carry out a
search warrant.
Physical Crime Investigation phase:
• In this phase, invesigator collect and analyze the physical evidence
and reconstruct the actions that took place during the incident.
• It includes six phases:
▪ The goal is to collect and analyze the digital evidence that was
obtained from the physical investigation phase and through any other
future means. Here, primary focus is on the digital evidence.