Unit 3
Unit 3
Unit 3
Sc – INTERNET OF THINGS
SEMESTER-I
INTRODUCTION TO INTERNET OF
THINGS
MSC-IOT-103
All rights reserved. No Part of this book may be reproduced or transmitted, in any form or by
any means, without permission in writing from Mizoram University. Any person who does
any unauthorized act in relation to this book may be liable to criminal prosecution and civil
claims for damages. This book is meant for educational and learning purposes. The authors of
the book has/have taken all reasonable care to ensure that the contents of the book do not
violate any existing copyright or other intellectual property rights of any person in any
manner whatsoever. In the event the Authors has/ have been unable to track any source and if
any copyright has been inadvertently infringed, please notify the publisher in writing for
corrective action.
All rights reserved. No Part of this book may be reproduced in any form without permission
in writing from Team Lease Edtech Pvt. Ltd.
Unit – 3: An Architectural Overview of IoT 88
UNIT – 3: AN ARCHITECTURAL OVERVIEW OF IOT
Structure
3.1 Learning Objectives
3.2 Introduction
3.3 Building an architecture
3.4 Main design principles and needed capabilities
3.5 IoT Architecture outline
3.6 Standards considerations
3.7 Reference model and architecture
3.8 Various architectural views
3.8.1 Functional view
3.8.2 Information view
3.9 Other relevant architectural views
3.9.1 The Physical Entity View
3.9.2 The Context View
3.10 Constraints affecting design in IoT world
3.11 Summary
3.12 Self-Assessment Questions
3.13 Suggested readings
3.1 OBJECTIVES
The word “architecture” has much explanation. This chapter comes up with an introduction to
how we can use the term “architecture”, and then, how it co-relates to problems, interesting
applications, and actual M2M/IoT solutions. An architecture mainly refers to the main
conceptual elements description, the real elements of a target system, how they are associated
with each other, and principles needed for the architecture design. A conceptual element
involves an intended function, a data piece, or a service. An actual or real element refers to a
technology building block or a protocol. The term "reference architecture" refers to a broad
model that includes the most comprehensive collection of elements and relationships
applicable to the "Internet of Things." Or looking to solve a specific problem or construct a
target program, such as an instance built from a subset of the reference architecture, the
reference architecture has been used as a guide to design an applied architecture.
The applied architecture and reference architecture is used to develop the actual system
solution (Figure 3.1)
Figure 3.1
Problem domain
The top-level in the triangle describing the “problem domain”. The main goal of this domain
is to understand the applications, for example, using scenario building and use case analysis
for deriving requirements. Additionally, constraints are also identified with this. These
constraints are technical such as limited power availability in wireless sensor nodes, and also
non-technical, such as constraints coming from legislation or business.
Figure 3.2
Solution Domain
The solution domain will be defined at a lower level. Design goals and concepts are defined,
required functions are specified, conceptual perspectives are refined, and logical functio ns
and information partitions are established. More ever here is the place for a logical
architecture to be defined, or network architecture in the form of a network topology diagram
has been produced. Identifying relevant technology elements, such as operating systems and
protocols or protocol stacks, is also important at this stage. Finally, a system architecture
captures the entire system solution, which includes actual software and hardware elements as
well as documentation on how they will be designed, deployed, and provisioned.
3.4 MAIN DESIGN PRINCIPLES AND NEEDED CAPABILITIES
IoT architecture's overall goal is to create a horizontal structure of real-world networks that
are transparent, service-oriented, stable, and trustworthy. The design principles have a set of
interpretations and further expectations on needed technology solutions that follows.
i) Design for reuse of deployed IoT resources across different application domains.
Deployed IoT resources shall be able to be used in a wide range of various kinds of
applications. This tells that devices can be made application-independent and that the
basic services they exhibit in terms of sensing and actuation can be done in a
consistent way. The Benefit of a system design will be to provide an abstracted view
of these basic underlying services.
ii) Design for a set of support services that allow open service-oriented capabilities and
have been used by application development and execution. In general, the support
services will act as a representative environment for a donor where IoT applications
will be developed, as well as support for a few core service features that are critical
from an IoT perspective. Mechanisms for authorized use of services and resources,
authentication, and related identity protection will all be part of the open IoT
environment. Accessing IoT resources, publishing and exploring resources, tools for
modeling contextual data and data relevant to real-world objects, and capabilities to
include different layers of abstracted and complex services are among the main
support services required from an IoT perspective. Finally, details, event filtering, and
analytics, as well as complex service composition and resolution of mixed sensing
and actuation, should all be considered.
iii) Design for different abstraction levels which are hidden underlying heterogeneities
and complexities. As we have already seen, classic IoT solutions can involve a huge
number of various devices and associated sensor modalities, and involve a large set of
a variety of actors providing services and information that require to be composed and
accessed with different levels of aggregation. A system design may extremely benefit
from providing the necessary abstractions of underlying technologies, and data and
service representation, also granularity of information and services. This will make
system integrators and application developers ease their burden.
iv) Design for sensing and actors perform on different roles of providing and using
services across various business domains and value chains. As explored in earlier
chapters, there are many opportunities in the business context where IoT solutions are
deployed and running. IoT solutions shall run across a set of departments within an
enterprise, or a group of enterprises in a value system, even be provided in a truly
open environment. The first thing that requires is to provide a set of mechanisms that
assures security and trust. In turn, trust and identity man-management that refers to
the distinct stakeholders is a basic requirement. a second requirement is authentication
and authorization of access to use services and also be able to provide services. The
capability to be able to do auditing and to provide accountability so that stakeholders
can impose liability if the need occurs is the third requirement. The next basic
requirement is to ensure interoperability. This has been required at different levels
across the interaction points between the stakeholders. These various primary
requirements also giving opportunities for new market roles, like aggregator roles,
broker roles, and clearinghouses, all well known in other existing markets.
v) Design for ensuring trust, security, and privacy. Trust within IoT often implicit
reliability, which ensuring the availability of services and also dependability of the
services, and that data. security and privacy are the critical barriers for IoT adoption
and represent key areas to address when building solutions. Privacy is needed to be
ensured using the anonymization of data. Still, the authorities and agencies will need
support to get access to data and information for national security or public safety.
vi) Design for scalability, performance, and effectiveness.
Sensor information will be consisting of broader range of various characteristics. Data
may be very infrequent (e.g., alarms or detected abnormal events). Scalability is
inclusive of a large number of devices and amounts of data produced which are
required to be processed or stored. Performance aspects of importance include
consideration of mission-critical applications.
vii) Design for evolvability, heterogeneity, and simplicity of integration. Technology
is conditionally evolving, and has given the nature of IoT deployments in that devices
and sensor nodes are expected to be operational and in the field for several years.
Since especially device-oriented technologies used across industries are very
different, handling heterogeneity is also important. Integrate legacy devices by many
different protocols becomes a necessity, and gateways of various types and with
different capabilities will be a necessity to expose the capabilities of legacy devices
uniformly.
viii) Design for simplicity of management. One of the potential barriers for IoT
adaptation, simplicity of management is a crucial capability that needs to be precisely
taken care of when designing IoT solutions. To ease deployment of IoT devices,
autoconfiguration and auto-provisioning are playing a key role, and are also very
important to lower operating expenditures (OPEX).
ix) Design for different service delivery models. IoT with the broad range of possible
applications clearly benefits from elasticity in the deployment of solutions, all to meet
the long-tail aspect. Cloud and virtualization technologies play a key role in
delivering future IoT services.
x) Design for lifecycle support. planning, development, deployment, and execution are
the phases of the lifecycle. The most important aspects of management are
implementation performance, design-time tools, and run-time management.
Taking into account these design concepts, detailed use cases, and targeted
implementations, it is important to define criteria that form the basis for
comprehensive architectural design.
Like IoT solutions, there is no single commonly recognized view of IoT architecture.
Attempting to create a single architecture results in a large range of discretionary and
contractual conditions, which vary depending on the issue or implementation in question.
Even then, by recommending a single vision of the main functional capabilities, the defined
core features that are needed when constructing an M2M or IoT solution can now be held
together in a broader sense. see Figure 3.3 which provides high-level summary of the topic.
Figure 3.3
Asset Layer
The lowest level layer includes the real-world entities that are subject to being monitored and
controlled and also having digital representations and identities. Assets can also be a more
virtual character, being subjective representations of parts of the real world that are of interest
to a person or an organization.
Resource Layer
This layer provides the critical functionalities of sensing, actuation, and embedded identities.
Communication Layer
This layer allows communication between services and the various computing infrastructures
that host and execute service support and application logic. Different types of networks
realize the connectivity, such as a Local Area Network (LAN) and a Wide Area Network
(WAN).
This Layer support services that perform a common and routine tasks that are provided by
this layer. Generally, data storage for anything from raw information to knowledge
representations, and processing capabilities like data and event capture, filtering, and stream
processing are different core common services for many IoT applications.
Data and Information Layer
The primary goal of this layer is to provide a more abstract set of functions as are to capture
knowledge and allows advanced control logic support.
Application Layer
This Layer, in turn, provides the specific IoT applications. There is an open-ended array of
different applications, such as smart metering in the Smart Grid, vehicle tracking, building
automation.
Business Layer
The final layer in the architecture outline, which supports the operations of any enterprise,
organization, or individual that is interested in IoT applications.
Management
deals with the management of various parts of the system solution associated with its
operation, administration, maintenance, and provisioning. it inclusive of management of
devices, the general Information Technology (IT) infrastructure, communications networks,
and also configuration and provisioning data, the performance of services delivered, etc.
Security
It is ensuring the protection of the system, its information, and services, from external threats.
Security measures are generally needed across all layers because they will provide
communication and information security. The Main capabilities are Trust and identity
management, and authentication and authorization.
Here processing happens from a topological perspective, can be done in a very distributed
manner and at various levels of complexity. Basic event filtering and simpler aggregation,
like data averaging, can happen in individual sensor nodes in WSANs, contextual metadata
(like location and temporal information) can be added to sensor readings, and further
aggregation may happen higher up in the network topology. This functional group hence
represents the vertical flow of data into knowledge, the abstraction of data and services in
different levels, and the processing of extracting knowledge.
3.6 STANDARDS CONSIDERATIONS
The standards are developed across various kinds of industries. There are many
standardization organizations and bodies, both proper Standards Development Organizations
(SDO) and also special interest groups that develop standards specifications. Various national
and international bodies ratify standard,
by SDOs, whereas Standard requirements formed by special interest groups and alliances are
usually accepted and implemented by market actors such as technology manufacturers.
From an M2M and IoT perspective, will find a difference between standards developed
within the Information and Communications Technology (ICT) industry, and standards
developed within a specific industry segment, like the Health, Transportation, or Electricity
industry segments.
The ICT industry has been developing technologies that are targeting in used by different
other industry segments, and the applied IoT industry segments make use of the ICT
standards to varying degrees in developing their standards. Some standardization activities
focus on the implementation of particular pieces of technology, such as specific protocols,
while others define whole processes or portions of systems. The phase of a standard's
lifecycle.
Standards are typically formed as a result of joint studies between academia and industry. An
another side, technology selection for standardization has happened as part of regulatory or
legislative processes.
Within the European Union, the European Commission has been issued Mandates that can
have a direct impact on the choice of technology, which hence precedes any subsequent
standardization activity. So finally, technology selection not only happens in the process of
standardization.
It uses multiple sub-models to characterize the domain, as seen in (Figure 3.5). The key
principles or entities in the associated domain are captured in the domain model of an
architecture model. The domain model adds descriptions about the relationship between the
definitions as these common language references start. The architecture of a knowledge
model is built on the basis of these principles and relationships.
In the case of the Internet of Things, a domain model describes the key principles of a certain
area of interest. Even if the details of an ARM can shift or evolve over time, these principles
are supposed to remain constant. It encapsulates the fundamental characteristics and
relationships between the principles. The domain model can also be used to facilitate human
correspondence through domains.
To describe the domain model, the Unified Modeling Language (UML) Class diagrams are
used, to present the relationships between the main concepts of the IoT domain model. The
Class diagrams contain boxes that represent the various classes of the model connected by
continuous lines or arrows. Arrows or lines represent relationships between the respective
classes. Each class is a descriptor of a set of objects which have similar structure, behavior,
and relationships. A class contains a name such as class A in figure 3.6, and a set of attributes
and operations. Only the class name and attributes are needed for the description of the IoT
domain model. In notation representation, a box with two rooms, one consists of the class
name and the other has attributes.
Figure 3.6
Three kind of Devices are essential for defining IoT Domain Model:
1. Sensors: These are either basic or complex devices that use a transducer to transform
physical properties such as temperature into electrical signals. These Devices convert analog
electrical signals into digital signals, For example, a video camera is a complex sensor that
could detect and recognize people.
2. Actuators: These are basic and complicated devices that use a transducer to
transform electrical signals into a physical property transition, such as turning on a switch or
moving a motor. These Devices were inclusive of potential communication capabilities,
processing, storage of intermediate commands, and conversion of digital signals to analog
electrical signals.
3. Tags: Tags typically identify the Physical Entity which is attached to. Tags are either
Physical Entities or Devices but not both, as the domain model shows. A good example is an
RFID(Radio Frequency Identification) tag, while a tag as a physical entity is a paper-printed
immutable barcode or Quick Response (QR) code. Either electronic Devices or a paper-
printed entity tag contains a unique identifier that can be read using optical means (bar
codes/QR codes) or radio signals (RFID tags). In the case of writable RFID tags, the reader
Device is usually a sensor, except in some cases, a sensor and an actuator together.
The IoT Information Model, like the IoT Domain Model, can be expressed using UML
diagrams. Each class in a UML diagram has zero or more attributes, as previously stated.
These attributes are basic forms such as integers or text strings, and they are represented by
red text under the class name. The IoT Information Model keeps track of the most important
details about Virtual Entities and their properties. These characteristics can be static or
dynamic, and they can be entered into the device in a variety of ways, including manually
entering data or reading data from a sensor connected to the Virtual Entity. The Relationship
class in the high-level IoT information model provides information about the unique
relationship between a Virtual Entity and a related Service.
The Functional View of a Reference Architecture explains the interfaces, functional elements
of an FG, and relationships between the components, while the IoT Functional Model's key
purpose is to explain the Functional Groups (FG) and their relationship with the ARM. The
Functional View is drawn from the Functional Model and high-level specifications in most
cases. These Functional Groups have been explained deeply in functional view.
Safety: Device security is application- or domain-specific, and it's usually linked to an IoT
machine with actuators that may theoretically affect living things (humans, animals). A
designer of the device or system should follow the below two steps:
Privacy: The most important aspect of an IoT framework is to protect user privacy. Identity
Management, Authentication, Authorization, and Trust & Reputation are the practical
elements that can be used to achieve privacy.
Trust: “Generally, an entity is said to „trust' a second entity because the first entity believes
that the second entity will behave precisely as the first entity expects,” according to the
Internet Engineering Task Force (IETF) Internet Security Glossary (Shirey 2007). As can be
seen, trust and reputation can be expressed by a ranking. The behavior of technological
components engaging with each other is then influenced by this ranking.
A Reference Architecture captures the components of an architecture that are used to track
and communicate with the real environment, such as instructions, design rules, and required
pieces. The whole process is iterative, as seen in the diagram, which ensures that the real
implemented system in the field offers useful input for design and technical decisions, as well
as possible future possibilities and existing system limitations, which are fed back to the
concrete architectures. The general essentials of various concrete architectures will then be
combined and added to the Reference Architecture's progression.
Through planning, constructing, engineering, and analyzing the various components of the
actual structure, a concrete architecture can be further elaborated and mapped into real-world
components. The whole process is iterative, as the real implemented implementation in the
field offers invaluable input on design and technical decisions, existing system constraints,
and possible future opportunities that are fed back to the conceptual architectures, as seen in
the diagram.
The IoT architecture model is interconnected with the IoT Reference Architecture as shown
in Figure 3.9. This figure depicts two facets of the IoT ARM:
Figure 3.8
Architecture Reference
Model (ARM)
IoT Reference
Model
understand
guides
steer
Unified IoT Reference
Requirements Architecture
guides with
extrapolate
Best P ractices
Compliant
Business Scenarios, Application define
define Domain-Specific
existing architectures & specific
Architectures
stakeholders Requirements
(Figure 3.9) The IoT reference model guides the process of creating an IoT Reference
Architecture because it includes at least the IoT Domain model that impacts several
architecture components.
Figure 8.1 depicts the functional view of the IoT Reference Architecture. It is made up of
Functional Groups (FGs), each of which contains a set of Functional Components (FCs). It's
important to note that not all FCs are used in an IoT architecture.
ii) Network FC is in charge of message routing and forwarding, as well as the required
translations of identifiers and addresses. If and only if the higher levels above the
networking layer use node or service identifiers, translations have taken place
between MAC and/or physical network identifiers and network layer identifiers
between network layer addresses and high-level human-readable host/node identifiers
between node/service identifiers and network locators
iii) The End-to-End Communication FC is responsible for the end-to-end transport of
application layer messages via various network and MAC/PHY layers.
IoT Service functional group
The IoT Service FG contains two FCs: The IoT Service FC and the IoT Service Resolution
FC
i) IoT Service FC
This FC is made up of utility implementations that link similar and related
Resources. This FC has Services for a Sensor style Resource that accept requests
from a User and return the Sensor Resource value in a synchronous or
asynchronous manner, such as subscription/notification.
ii) The IoT Service Resolution FC
This FC includes the functions needed to create an IoT Services directory that allows
for complex control of IoT Service descriptions as well as discovery, lookup, and
resolution of IoT Services through other Active Digital Artifacts.
This FG provides a set of functions that enable users to communicate with physical objects
through the use of Virtual Entity resources.
This FG is responsible for the integration of business processes with IoT-related services.
It consists of two FCs:
The Process Modelling FC provides the right tools for modeling a business process
that utilizes IoT-related services.
The Process Execution FC contains the implementation environment for the Method
Modelling FC's process templates, which implements such processes using the
Service Organisation FG to resolve high-level application specifications to particular
IoT resources.
The Security FG provides critical functions for ensuring an IoT system's security and privacy.
The following FCs are included in it:
The Identity Management FC In an IoT device operated by this FC, the various names of
the involving Services or Users.
The Trust & Reputation FC Manages and measures the provider confidence levels based
on the credit ratings of different participating actors in an IoT environment.
This FG is responsible for the management of the system as a whole. It consists of the
following FCs:
i) The Configuration FC In an IoT environment, this is where the configuration of the
FCs and Devices is held. The part collects and preserves the current configuration of
all FCs and equipment in a historical archive, distinguishing between current and
historical configurations.
ii) The Fault FC Specific part fault detection activates fault analysis and fault recovery
procedures in the Fault FC, which ensures the Fault FC detects, logs, isolates, and
corrects system-wide faults.
iii) The Member FC In an IoT scheme, it handles participation details for the relevant
bodies.
iv) The State FC is similar to Configuration FC in that it gathers and logs state
information from current FCs, which can be used for fault detection, performance
estimation, and forecast, as well as billing.
v) The Reporting FC It is responsible for generating compact reports about the device
state depending on the data.
3.8.2 Information view
The view of the information consists of
(a) The definition of the information handled by the IoT system;
(b) the manner in which the information was handled by the system;
in other words, the information life cycle and flow, such as how the information is produced,
stored, and deleted, and the information handling components.
Information Description
The knowledge that is treated by an IoT method. Virtual entity background information, such
as attributes (simple or complex) represented by sections of the IoT Information model. The
performance of IoT Service itself is another major part of the information provided by the
IoT device. A sensor or a tag service, for example. Descriptions of the virtual entity in
general, which not only include attributes coming from IoT Devices (e.g. ownership
information). Associations of Virtual Entities with other Virtual Entities (e.g., Room #12 is
on Floor #7) The type of resource (e.g. sensor), identity, related Services, and Devices may
all be included in Resource Descriptions. Descriptions of devices, such as their functionality
(e.g. sensors, radios). Composed Service descriptions that follow the model of a complicated
service being made up of simplified services. The phases of a business process using other
IoT-related resources are described by the IoT Business Process Model. Keys, identity pools,
policies, confidence models, credibility ratings, and other security details For
fault/performance purposes, configuration snapshots, reviews, membership records, and so
on, management information such as state information derived from organizational FCs is
used.
Figure 3.11 depicts the procedure. Changes in the physical properties of the Physical Entities
of Interest are converted into electrical signals by sensors on the devices. On the unit level,
these electrical signals are converted into one or more values (Figure 3.11a). The metadata
information, such as units of measurement, timestamps, and location information, is then
added to these values (Figure 3.11b). A software feature (Resource) on the computer or on
the network provides these enhanced values. The resource shows that IoT Services are
working hard to formalize access to this enriched data (Figure 3.11c). At this stage, basic
attributes like location and time are used to interpret the data, and this sort of metadata is
always sufficient for some IoT applications or usage in larger systems. As this enhanced
information is further correlated with certain Physical Entities in the form of Virtual Entity
characteristics such as basic or complex, static or dynamic, it becomes background
information. Help information such as associations between certain attributes and IoT
Services adds to the Virtual Entity's context information (Figure 3.11d).
Figure 3.11
Information handling
The exchange of information between FCs follows the interaction patterns as shown in
Figure 3.12
A B
A B
Request
Push Response
T ime
(a) (b)
SA SB C SA SC B P
Subscribe Subscribe
Subscribe
Subscribe
Notify Notify
Notify
Publish
Notify
Figure 3.12
• Push: If the contact information for component B is already configured in component
A, an FC (A) will attempt to push information to another FC (B), and component B should
listen for those information pushes.
• Request/Response: FC (A) sends a message to another FC (B), and B responds after
A has served the request. The relationship is generally synchronous since A must wait for
an answer from B before moving on to the next step/task. However, in practice, this
constraint can be achieved by having parts of component A wait while other parts perform
other tasks. Component B could be required to accommodate simultaneous requests and
responses from several modules, putting additional demands on the system or network that
hosts the FC.
Subscribe/Notify:
Multiple subscriber components (SA, SB) will subscribe for information from component
C, and C will alert the relevant subscribers when the requested information is available.
This is usually asynchronous, so after each subscriber receives the content, they can go
about their business. However, in order to receive the asynchronous answer, a subscriber
must have certain listening components. The state records, such as which subscribers
requested which information and their contact information, must also be maintained by the
aim variable C. The Subscribe/Notify pattern is used where one component is the host of
information required by several other components. The subscribers only need to create a
Subscribe/Notify relationship with one part after that. From the perspective of the
subscribers, the Publish/Subscribe approach is a more flexible option if one or more
components are knowledge sources or hosts.
• Publish/Subscribe: A third party, known as broker B, mediates subscription and
publishing between information consumers (subscribers) and information producers
(Pub/Sub pattern) (publishers). Subscribers such as SA and SB ask the broker about the
information they want to use, and the broker explains the information's various assets. The
broker moves the published content to the subscribers whose needs fit the published
information, and the publisher publishes information and metadata to the broker.
The Deployment and Operational View is determined by the use case and specifications. The
Devices view as Physical Entities installed in the parking lot, as well as the occupancy
symbol, are seen in Figure 3.13. Each of the eight metal/car presence sensors is attached to
one of two sensor nodes (node#1 and node#2). Wireless or wired networking has been used
to link the two sensor nodes to the payment station. The payment station serves as a user
interface for the driver to pay and receive a payment receipt, as well as a networking portal
that uses Wide Area Network (WAN) infrastructure to link the two sensor nodes and the
payment interfaces physical equipment, such as screens, credit card slots, coin/note
input/output, and so on, to the Internet. The occupancy symbol also serves as a contact link
Mobil
Interne
Senso P ar
r kin
Node g
#2 Op
erat
ion
P ayment
station
WAN link
Short range
Figure 3.13 Parking Lot Deployments And Operational View, Devices.
and the outside world (display of free parking spots). The physical gateway devices link to
the Internet and a data center through WAN technology, where the parking lot management
system software is hosted as virtual machines. The primary applications connected to this
management system are human user mobile phone applications and parking operation center
applications.
Aside from the functional views, there are a few others that are important for a machine to
have:
The Physical Entity View
The Context View.
Describes Physical Entities from the IoT Domain Model in terms of physical properties (e.g.
dimensions for spaces/objects). The relationship between Physical Entities is described in the
classification of Physical Entities (an entity is included in the other and maybe stationary in a
specific location or mobile). A large number of possibilities for Physical Entities cannot be
captured in a Reference Architecture, Even though, an architect requires to outline all the
details of the Physical Entities from the beginning to assess if any Physical Property affects
the rest of the architectural views and models. This view “describes the dependencies,
relationships, and interactions between the system with its environment such as systems,
people, external entities with which it interacts.”
It captures external entities interacting with the system, external entity properties, system
impact on its environment, system scope and responsibilities, and so on. Since it establishes
the problem's boundary conditions, this view is often built at the start of the design process,
and the possibilities for external entities and their interactions with an IoT system which vary
depending on the situation. For example, the dimensions of the parking spots will come into a
Physical Entity property, and the fact that there are sixteen parking spots physically placed in
a possibly gated parking lot, the fact that there is an occupancy display near the parking lot on
the roadside, and other details outline both Physical Entity properties as well as relationships
between the system and its environment.
3.11 SUMMARY
The main objective of this chapter is to make us clearly understand the design principles and
needed capabilities of IoT architecture. The outline of the IoT architecture also helps us to
make the right decision in designing and choosing the IoT infrastructure. The standard
considerations are very important in determining this strategy. The concept of the Reference
model and its architecture builds a new era while choosing the architecture. Constraints
affecting the design in IoT aspects are explained here with all the major challenges. We will
discuss Web of Things (WoT) in the next chapter.
A. Descriptive questions
Short Questions
Long Questions
a. Lower level
b. Middle level
c. Top level
2. Which layer is responsible for providing the critical functionalities of sensing, actuation?
a. Asset Layer
b. Resource Layer
c. Communication Layer
a. Sensors
b. Actuators
c. Tags
d. Bluetooth
5. The IoT Information Model is represented using
a. Dataflow diagram
b. UML diagram
c. State transition Diagram
d. None of these
6. Description of the information and data that the system can handle refers
a. Functional View
b. Informational view
c. Deployment view
d. Operational view
a. Network FC
b. End-to-End communication FC
c. IoT Service FC
d. Process modeling FC
9. __________regulations can control the power with which transmitters can broadcast.
Reference books
Websites:
https://www.edureka.co/blog/iot-tutorial/
https://www.guru99.com/iot-tutorial.html
https://pluto- men.com/insights/everything- you- need-to-know-about-web-of-things/
https://webofthings.org/2017/04/08/what- is-the-web-of-things/