Beruflich Dokumente
Kultur Dokumente
• Introduction
• History of IoT
• About Objects/Things in the IoT
• The Identifier in the IoT
• Enabling Technologies of IoT
Introduction
• Over the last couple of decades the internet has been in a continuous state of evolution.
• World wide web-a network of linked HTML documents(INTERNET OF DOCUMENTS)
• World wide web gradually evolved into web 2.0 in which two way communication became common
which enabled user participation. Example social networking(INTERNET OF PEOPLE), BLOGS and
WIKI’s.
• Web 2.0 is evolved into web 3.0(semantic web) the goal of the semantic web is to mark up the web
content in a way that makes it understandable by machines, this marking up web contents allow
machines to process and share data on their own without human mediation.
• Alongside internet technologies are developing like sensor networks and near field communication
using RFID tags have also been evolving.
• Convergence of these two technologies ie the internet and sensor networks leads to a new
framework ie., INTERNET OF THINGS.
• INTERNET OF THINGS, where everyday objects can be equipped with identifying, sensing,
networking and processing capabilities that will allow them to communicate with one another and
with other devices and services over the internet.
Introduction
• Internet of Things, is a leading path to the smart world with ubiquitous computing and networking.
• With ubiquitous computing, computing will be embedded everywhere and programmed to act
automatically with no manual triggering.
• In this IoT framework, wireless and wired technologies already provide the communication
capabilities and interactions meeting a variety of services based on PERSON-TO-PERSON, PERSON-
TO-MACHINE, MACHINE-TO-MACHINE and MACHINE-TO-PERSON interaction.
• Connecting objects might be wireless, as with the radio frequency identification or sensor radio
technologies that offer
• Identification of items and
• sensing of the environment.
• Connection may be wired as with Power line communication(PLC) offers data transport over
electrical media
• Other enabling technologies for this real world networked services include
• Nanotechnology,
• Automatic processing and
• Robotics
Introduction
• Most devices currently on the internet were originally deigned to be part of the internet and have
integrated processing, storage and network capabilities. These devices include servers ,desktops,
laptops, tablets and smart phones.
• IoT proposes to attach technology to everyday devices such as audio /video receivers, smoke
detectors, home appliance etc and making them online even if they are not initially designed with
this capability.
Introduction
• Most devices currently on the internet were originally deigned to be part of the internet and have
integrated processing, storage and network capabilities. These devices include servers ,desktops,
laptops, tablets and smart phones.
• IoT proposes to attach technology to everyday devices such as audio /video receivers, smoke
detectors, home appliance etc and making them online even if they are not initially designed with
this capability.
History of IoT
• IoT was originally introduced by the Auto-ID research center at the MIT, where an important effort
was made to uniquely identify products. The result was termed EPC(electronic product code). And it
was then commercialized by EPCglobal.
• In 2005, ITU(international Telecommunication Unit) introduced a new axis in the ubiquitous
networking path to complete the existing anywhere and anytime connectivity.
• It’s the anything connectivity axes where the thing-to-thing or machine-to-machine interaction is
added to complete the existing person-to-person and person-to-machine interaction in the possible
connectivity framework.
History of IoT
By connecting these new objects will raise many questions such as
• The connecting technology of the object
• Interoperability between objects
• Communication model of these connected objects
• Possible interaction with the existing models(internet)
• Choice of the transport model
• The addressing, identifying and naming
• The security and privacy
Example: lighting replay application
example
example
example
example
example
example
About Objects/Things in the IoT
• objects are classified based on their size and complexity their moveable aspect and whether they
are animate or inanimate as shown in the figure
About Objects/Things in the IoT
• In this terminology, classic devices such as PCs and Mobile phones are already connected objects
using wired or wireless communication.
• IoT will extend the connectivity and interworking of these currently existing objects with new
objects connected through radio sensing or identifying technologies such as sensor or RFID
networks, allowing the development of new services involving information from the environment.
• This information could be either a simple identifier as with RFID or captured information as with
sensors.
• Different technologies can be used to interconnect objects, consumer appliances are connected
through wired technology such as power line communication through the power line.
• There are two concerns to address in current home networking applications ie., objects are affected
more by interoperability problem.
• How to support the connectivity of heterogeneous objects.
The Identifier in the IoT
• In the IoT, objects are addressed via identifiers stored into tags and interrogated by networked
readers.
• The term identifier is similar to the term name. a name does not change with location and its
intended to be used to identify a thing, in contrast to an address which is intended to be used to
refer to the location of a thing.
• Any object can be assigned an identifier-a physical object, person, place or logical object.
Mechanism 1: tag identifier
Example in a museum an identifier on a tag attached to a painting could be used to find further
information on the painting and the artist.
Example in a grocery store an identifier on a food package could be used to check that the food is safe
to eat or not.
Other examples where identifier-triggered information access could be valuable are in:
medicine/pharmaceuticals, agriculture, libraries, the retail trade, the tourist trade, the tourist industry,
logistics an supply chain management.
Mechanism 2: EPC identifier, a standard identifier by ISO
Mechanism 3: ubiquitous ID center has defined a generic identifier called “ucode” which is not only
intended to identify physical objects but also extended to places and digital information.
The Identifier in the IoT
Mechanism 4: IP(IPV4/IPV6) address can be used as identifier but IP addresses play two roles:
from network point of view, they act as a locator for routing and
from application point of view they identify hosts.
This dual role is seen to be problematic due to increasing demands for mobility of end-systems.
Solution is
Mechanism 5: Host Identity Protocol(HIP):HIP separates the identity of a host from its location.
The location of the host is bound to IP addresses and used for routing packets to the host in the same
way as in the current internet architecture.
Transport and application layers use host identity,
Each host is responsible for creating one or more public/private key pairs t o provide identities for
itself
Host identities are location independent identifiers.
A client host obtains the host identity of a server from the DNS.
The Identifier in the IoT
SERVICE
SERVICE
SOCKET
SOCKET
END-POINT
LOCATION IP ADDRESS
LOCATION IP ADDRESS
The Identifier in the IoT
Mechanism 6:
EPC global ONS
Example: a product electronic identifier will call the webpage of the manufacturer and the history of
this products manufacturing and shipping information will be displayed.
Example:helping blind person in automatic reading a book tagged with an RFID where he or she can
put it on a reader connected to a computer as soon as the reader gets the identifier of the tagged
book, a webpage appears in the screen and starts reading the book.
Enabling Technologies of IoT
Middleware
Enabling Technologies of IoT
Tags can be classified into following types
Enabling Technologies of IoT
The main difference between Active RFID tags and Passive RFID tags is
Passive RFID :passive tags have no internal power source, so it will wait for a signal from an RFID
reader. The reader sends energy to an antenna which converts that energy into an RF wave that is
sent into the read zone. Once the tag is read within the read zone, the RFID tag’s internal antenna
draws in energy from the RF waves. The energy moves from the tag’s antenna to the IC and powers
the chip which generates a signal back to the RF system. This is called backscatter. The backscatter, or
change in the electromagnetic or RF wave, is detected by the reader (via the antenna), which
interprets the information.
Active RFID:
Active RFID systems have three essential parts – a reader or interrogator, antenna, and a tag. Active
RFID tags possess their own power source – an internal battery that enables them to have extremely
long read ranges as well as large memory banks. Typically, active RFID tags are powered by a battery
that will last between 3 – 5 years, but when the battery fails, the active tag will need to be replaced.
Enabling Technologies of IoT
essentially, two different types of active RFID tags are available – transponders and beacons.
• Transponders – In a system that uses an active transponder tag, the reader (like passive systems)
will send a signal first, and then the active transponder will send a signal back with the relevant
information. Transponder tags are very efficient because they conserve battery life when the tag is
out of range of the reader. Active RFID transponders are commonly used in secure access control
and in toll booth payment systems.
• Beacons – In a system that uses an active beacon tag, the tag will not wait to hear the reader’s
signal. Instead, true to its name, the tag will ‘beacon’, or send out its specific information every 3 – 5
seconds. Beacon tags are very common in the oil and gas industry, as well as mining and cargo
tracking applications.
Enabling Technologies of IoT
the semi-passive tag does have a battery -- not for generating a response, but to power electronics
that are used in conjunction with off-board sensors such as a thermal sensor. The sensor reading is
incorporated into the tag return signal along with the tag serial number.
Enabling Technologies of IoT
Different applications are possible with RFID technology
item tracking of products in retail chains
animal tracking
RFID communication system can cover long distances such as in an animal tracking application where
the reading distance is several kilometers.
Or
Near Field Communication is a short range wireless technology that enables easy and convenient
interaction between devices, NFC will use the RFID communication system but limit the reading range
to few centimeters.
Enabling Technologies of IoT
Near Field Communication:
Near Field Communication is a way for your phone to interact with something in its close proximity.
it operates within a radius of about 4 cm and provides a wireless connection between your device and
another.
This allows a two-way communication between devices.
HOW NFC WORKS?
Put two NFC enabled phones in close proximity with each other and let the phones do the transfer.
NFC transmits or receives data via radio waves using NFC protocols.
Three modes of NFC
• READER/WRITER(FOR READING TAGS IN NFC POSTER)
• CARD EMULATION(FOR MAKING PAYMENTS)
• PEER-TO-PEER(FOR FILE TRANSFER)
Enabling Technologies of IoT
GETTING STARTED WITH NFC
First enable NFC and android beam on your device and go to the file you wish to send, and tap the
devices together. You don’t even need to select any send via option.
Put the devices back-to-back and when it asks to confirm the transfer just hit “touch to beam”.
Applications of NFC:
Send a phone number-just navigate to the contact in your address book(it can be yours or somebody
else’s) then press the phone to the recipeints when your phone says “touch to beam” just tap the
display.
Send a picture,
Send a documents
Send directions
To launch an app on someone elses phone, if youre using an app or playing a game that is already
installed on someone else device you can launch it for them
Make payment,DOWNLOAD ANDROID PAY and add your credit or debit card details then use it in any
store that has a contactless payment terminal.
Enabling Technologies of IoT
2. Sensing and actuating technology:
Sensor:
a sensor is an electronic device that detects, senses or measure physical stimuli from the real world
environment and converts signals from stimuli into analog or digital form. Some sensors also provide actuation
functionality, these are named sensors/actuators.
• Introduction
• Principle of RFID
• Components of an RFID system
• Issues
Radio Frequency Identification Technology
Introduction:
RFID system consists of a tag attached to the object being identified. Tag usually consists of an
integrated circuit and an antenna.
Another important module in the system is a reader. The reader queries the tag using radio frequency
waves and gets the identity of the tag via the RF waves.
RFID system operates in various frequency bands. Some of the most popular frequencies are
125-134.2kHz(low frequency)
13.56MHz(high frequency)
860-915MHz(ultra high frequency) and
2.45GHz to 5.8GHz(Micro Wave Frequency)
Radio Frequency Identification Technology
Principle of RFID:
• Consider a coil made of copper wire through which alternating current is flowing.
• The coil offers impedance(OPPOSITION TO CURRENT FLOW) to the source. When alternating current
goes through an impedance, a voltage drop is produced.
• To increase the voltage capacitor is connected in parallel with the coil.
• Let us call this the primary coil.
Radio Frequency Identification Technology
Principle of RFID:
• Now we bring in another coil, called the secondary coil close to the first.
• Due to electromagnetic induction, voltage appears across the terminals of the secondary coil.
• The amplitude of the voltage depends on the size, shape, location and the orientation of the
secondary coil.
• If we connect a resistor(also known as load) across the terminals of the secondary coil, current flows
through it.
• The strength of the current flowing through the secondary coil depends on the load.
Radio Frequency Identification Technology
Principle of RFID:
• Current flowing in the secondary coil induces a voltage back into the primary coil.
• The induced voltage also known as back electromotive force that can be easily sensed by using
suitable electronics.
• By observing the voltage on the primary its possible to estimate what is connected to the secondary
coil.
Radio Frequency Identification Technology
Voltage V developed at the terminals of the primary coil versus the frequency of the excitation is
plotted below.as the frequency of the source increases the voltage also increases reaches a maximum
and then decreases.
Now if load resistance is changed the voltage at the primary corresponding to the resonant frequency
drops sharply.
Radio Frequency Identification Technology
Radio Frequency Identification Technology
From this we can conclude that its possible to change the voltage at the primary by changing the load
connected to secondary. This is known as load modulation.
Primary coil can be thought of as the reader of the RFID system
And secondary coil can be thought of as the transponder or tag.
The tag can convey any message back to reader by simply changing the load connected to its
terminals. This could be achieved by switching in a load to represent a logical state 1 and taking off the
load to represent a logical state 0.
The identity information is stored in a memory chip located on the tag. A processor reads this
information and modulates the load by operating a switch.
Radio Frequency Identification Technology
Radio Frequency Identification Technology
3.Components of an RFID system:
Important components are
• Reader
• Tag
• Server
• network
Radio Frequency Identification Technology
3.Components of an RFID system:
• Reader
a functional block schematic of an RFID reader is shown here
The Radio Frequency carrier is modulated according to the
Information to the tag.
The modulated carrier is amplified and radiated out of the antenna.
The reader also receives the electromagnetic waves backscattered
By the tag, amplifies the received signals and demodulates to
Extract the information.
Core
Device Processin
Applicati RFID
RFID on
Interface g applicatio
hardware Interface
Interface n
Radio Frequency Identification Technology
3.Issues:
Problem:
There could be several tags trying to communicate with the reader and several readers trying to read
several tags at the same time. This results in a collision of data being transferred between the readers
and tags.
Algorithms to avoid collisions have been proposed.
Binary search algorithm is one of the most popular anti collision schemes used in RFID system.
Explanation:
Let us consider there are several tags in the vicinity of the reader and each of the tags has a unique
serial number, if the reader issues a command asking the tags to respond back with their serial
numbers all the tags receiving this command will respond back with their respective serial numbers,
causing collision.
Now the reader issues a request command with a parameter asking the tags whose serial number is
less than or equal to the parameter to respond.
Thus the reader is able to select a group of tags that would respond to the command.
Radio Frequency Identification Technology
3.Issues:
if there is no collision the reader gets the serial number of the only tag in the sub-group and selects
the tag by issuing the select command with its serial number as the parameter.
The reader can perform read and write operations on the selected tag.
If there is a collision, the reader issues another request command by lowering the value of the
parameter, thereby targeting a smaller group of tags to respond.
Radio Frequency Identification Technology
3.Issues:
Solution:
Listen-before-talk:
In this scheme reader always listens to the air space for any transmissions from other readers before
transmitting.
Radio Frequency Identification Technology
3.Issues:
Problem:
The behavior of a tag stuck on a dielectric sheet such as wooden board depends on the permittivity of
the material, thickness of the material and the location of the tag itself.
Consider a tag attached to a wooden board and placed at a distance of about a meter from the reader
antennas.
The transmission power of the reader is increased in steps of 0.1dB and an attempt is made to read
the tag.
The lowest transmission power at which a tag is read, which is known as the threshold power, is
recorded. Threshold power is the smallest transmission power required to detect the tag.
Radio Frequency Identification Technology
3.Issues:
There are two parameters that could measure the performance of a tag…
• threshold power
Higher threshold power indicates degradation in the system performance.
• Read range
Read range is the longest possible distance at which a tag can be read with all other parameters field
constant. Lower threshold power corresponds to a longer read range.
Radio Frequency Identification Technology
3.Issues:
Example:
Consider a tag placed above a wooden board, the reader antennas are placed at a height of about 1m
from the surface of the board.
The measurements are carried out inside a shielded RF anechoic chamber so that the interference
from external signals and reflection from structural members are minimized.
Measured threshold power as a function of board thickness is shown below
Radio Frequency Identification Technology
3.Issues:
Example:
The wooden board is 17mm thick. Zero thickness indicates that the measurement is carried out
without any board.
As the board thickness increases the threshold power increases and reaches a maximum when
d=51mm indicating degradation in the performance of the tag. Further increase in the thickness
results in improvement in the tag performance.
A similar experiment has been conducted with the tag placed below the board. In this configuration
the tag is detected with the transmission power set to 15.7 dBm, the lowest transmission power that
the reader can be set to. This is indicated by the flat line in fig.
When the tag is placed below the board, the wooden board blocks the line of sight between the
reader and the tag. Inspite of a blocked line of sight path, the tag has increased performance.
(below wooden board as the threshold power increases absorption of energy increases so the
performance of the tag is consistently maintained)
Other issues are privacy and security of information stored on the tag.
Radio Frequency Identification Technology
Radio Frequency Identification Technology
Radio Frequency Identification Technology