Proposed Model for IoT Implementation
VerifiedAdded on 2023/04/08
|12
|2095
|299
AI Summary
The objective of this report is to discuss about the key components of Internet of Things (IoT), what constitute IoT and how it should be implemented. After briefing about IoT, the study dives deep into what comprises an IoT system, common challenges faced by companies and organizations in implementing it. Thereafter the solution is provided with the help of a network diagram, the working of which is explained below. Then comes the recommended section where the report provides the necessary suggestions as per observations drawn from the analysis. Following which the report concludes that the challenges should carefully be looked into for proper implementation of IoT.
Contribute Materials
Your contribution can guide someone’s learning journey. Share your
documents today.
Running head: PROPOSED MODEL FOR IOT IMPLEMENTATION
Proposed Model for IoT Implementation
Student Name
University Name
Note by the Author
Proposed Model for IoT Implementation
Student Name
University Name
Note by the Author
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
1PROPOSED MODEL FOR IOT IMPLEMENTATION
Summary
The objective of this report is to discuss about the key components of Internet of Things
(IoT), what constitute IoT and how it should be implemented. After briefing about IoT, the
study dives deep into what comprises an IoT system, common challenges faced by companies
and organizations in implementing it. Thereafter the solution is provided with the help of a
network diagram, the working of which is explained below. Then comes the recommended
section where the report provides the necessary suggestions as per observations drawn from
the analysis. Following which the report concludes that the challenges should carefully be
looked into for proper implementation of IoT.
Summary
The objective of this report is to discuss about the key components of Internet of Things
(IoT), what constitute IoT and how it should be implemented. After briefing about IoT, the
study dives deep into what comprises an IoT system, common challenges faced by companies
and organizations in implementing it. Thereafter the solution is provided with the help of a
network diagram, the working of which is explained below. Then comes the recommended
section where the report provides the necessary suggestions as per observations drawn from
the analysis. Following which the report concludes that the challenges should carefully be
looked into for proper implementation of IoT.
2PROPOSED MODEL FOR IOT IMPLEMENTATION
Table of Contents
Introduction................................................................................................................................3
Discussion..................................................................................................................................3
Internet of things (IoT)...........................................................................................................3
Sensor Actuator Network (SANET)......................................................................................3
Wireless Sensor Network (WSN)..........................................................................................4
Challenges in IoT...................................................................................................................4
1) Connectivity.............................................................................................................5
2) Interoperability and Compatibility...........................................................................5
3) Integrating IoT products with platforms..................................................................5
4) Privacy and Security................................................................................................6
5) Intelligent Data Analysis.........................................................................................6
Solution..................................................................................................................................7
Communications model (Device-to-Device).....................................................................7
Communications model (Device-to-Cloud).......................................................................8
Communications model (Device-to-Gateway)..................................................................8
Recommendation........................................................................................................................9
Conclusion..................................................................................................................................9
References................................................................................................................................10
Table of Contents
Introduction................................................................................................................................3
Discussion..................................................................................................................................3
Internet of things (IoT)...........................................................................................................3
Sensor Actuator Network (SANET)......................................................................................3
Wireless Sensor Network (WSN)..........................................................................................4
Challenges in IoT...................................................................................................................4
1) Connectivity.............................................................................................................5
2) Interoperability and Compatibility...........................................................................5
3) Integrating IoT products with platforms..................................................................5
4) Privacy and Security................................................................................................6
5) Intelligent Data Analysis.........................................................................................6
Solution..................................................................................................................................7
Communications model (Device-to-Device).....................................................................7
Communications model (Device-to-Cloud).......................................................................8
Communications model (Device-to-Gateway)..................................................................8
Recommendation........................................................................................................................9
Conclusion..................................................................................................................................9
References................................................................................................................................10
3PROPOSED MODEL FOR IOT IMPLEMENTATION
Introduction
The report begins by briefly touching on Internet of Things in general and talks about
how things work. After having explained the actuators, sensors and WSNs the report focusses
on five key challenges in implementing an IoT system where every challenge is carefully
touched, following which the study provides the solution with the help of a completely
custom-made network diagram and mentions the modes of communications at play. After
explaining the working of the suggested IoT system, the study provides recommendations
based on the observations made and then ends after writing concluding notes where the
necessary observations drawn are given.
Discussion
Internet of things (IoT)
Internet of things (IoT) is all about systems concerning interrelating components like
digital devices, mechanical equipment, computing and electronic devices, animals, people as
also objects which come with uniquely identifiable tags also called UIDs (Riahi et al., 2013).
These also possess abilities of transferring data through the network without relying on
human assistance or even any kind of exchanges between the human and the computer.
Sensor Actuator Network (SANET)
Sensors and actuators are devices which facilitate interactions between smart devices
and the physical world (Lu et al., 2016). Actuators are the ones which effectively manipulates
systems that alter the physical environment like temperature control valves that can be
modified by the smart home IoT technology (Stojkoska & Trivodaliev, 2017). Actuators
work by accepting electrical inputs and transforming the same into tangible actions.
Technologies like these collect hefty amounts of data, which can be of immense value for
enterprises when after it gets successfully stored, processed and analysed.
Introduction
The report begins by briefly touching on Internet of Things in general and talks about
how things work. After having explained the actuators, sensors and WSNs the report focusses
on five key challenges in implementing an IoT system where every challenge is carefully
touched, following which the study provides the solution with the help of a completely
custom-made network diagram and mentions the modes of communications at play. After
explaining the working of the suggested IoT system, the study provides recommendations
based on the observations made and then ends after writing concluding notes where the
necessary observations drawn are given.
Discussion
Internet of things (IoT)
Internet of things (IoT) is all about systems concerning interrelating components like
digital devices, mechanical equipment, computing and electronic devices, animals, people as
also objects which come with uniquely identifiable tags also called UIDs (Riahi et al., 2013).
These also possess abilities of transferring data through the network without relying on
human assistance or even any kind of exchanges between the human and the computer.
Sensor Actuator Network (SANET)
Sensors and actuators are devices which facilitate interactions between smart devices
and the physical world (Lu et al., 2016). Actuators are the ones which effectively manipulates
systems that alter the physical environment like temperature control valves that can be
modified by the smart home IoT technology (Stojkoska & Trivodaliev, 2017). Actuators
work by accepting electrical inputs and transforming the same into tangible actions.
Technologies like these collect hefty amounts of data, which can be of immense value for
enterprises when after it gets successfully stored, processed and analysed.
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
4PROPOSED MODEL FOR IOT IMPLEMENTATION
Sensors are used for collecting data from environments or objects of measurement so
that it can be turned into useable data. This is a rapidly expanding stage of IoT where water
level detectors, air quality sensor, robotic camera systems, home voice controllers, smart
baby monitoring devices and many others are collecting user data which include times of
signing-in, levels and hours of usage and in other different ways. Since the devices are
producing avalanches of data, organization prepare to be able to choose between useful
ignorable data.
Wireless Sensor Network (WSN)
Sensor Networks are emerging as promising tools for monitoring of physical world
which can effectively sense it, process it as also communicate with it. Sensory networks
comprise of several low powered devices which can be termed nodes. The wireless sensor
node is tasked with sensing, computation, to communicate, actuate and houses power
components. WSNs generally carry thousands of these nodes (Li, Da Xu & Wang, 2013).
Wireless channels are used in information sharing. Wireless Sensor Networks typically
comprise of the following components:
Power Management
Sensing Unit
Timing sync
Processing Unit
Medium access control
Storage
Challenges in IoT
The challenges faced by enterprises in implementing an IoT system are multifaceted.
Although resources are available and rapid advancements can be noticed among critical
Sensors are used for collecting data from environments or objects of measurement so
that it can be turned into useable data. This is a rapidly expanding stage of IoT where water
level detectors, air quality sensor, robotic camera systems, home voice controllers, smart
baby monitoring devices and many others are collecting user data which include times of
signing-in, levels and hours of usage and in other different ways. Since the devices are
producing avalanches of data, organization prepare to be able to choose between useful
ignorable data.
Wireless Sensor Network (WSN)
Sensor Networks are emerging as promising tools for monitoring of physical world
which can effectively sense it, process it as also communicate with it. Sensory networks
comprise of several low powered devices which can be termed nodes. The wireless sensor
node is tasked with sensing, computation, to communicate, actuate and houses power
components. WSNs generally carry thousands of these nodes (Li, Da Xu & Wang, 2013).
Wireless channels are used in information sharing. Wireless Sensor Networks typically
comprise of the following components:
Power Management
Sensing Unit
Timing sync
Processing Unit
Medium access control
Storage
Challenges in IoT
The challenges faced by enterprises in implementing an IoT system are multifaceted.
Although resources are available and rapid advancements can be noticed among critical
5PROPOSED MODEL FOR IOT IMPLEMENTATION
components of IoT, several companies have been struggling to obtain the desired benefits
from existing IoT projects. This can be attributed to the factors like data analysis, security
and investment among others. Also responsible is the human factor, as 74% of organizations
surveyed by Cisco appear to have failed in their attempts of implementing IoT. Five most
common challenges faced are:
1) Connectivity
The quality and bandwidth of Internet access available everywhere differs radically.
Companies in Oil and Gas or Logistics industries operate remotely battling tough
conditions. They need robust network connections to gather data and transfer the same for
further analysis (Weyrich, & Ebert, 2016). The performance and quality of the network
signals depend upon the routers, WAN, LAN or even MAN.
2) Interoperability and Compatibility
Networks and sensors form the integral parts any IoT system (Al-Fuqaha et al., 2015).
However, all machines do not come with equally advanced networking, security
standards or sensory capabilities for effective communication and data sharing. These end
up bottlenecking the whole system.
3) Integrating IoT products with platforms
To successfully implement IoT systems, it is extremely necessary to integrate the right
IoT products with the respective platforms, failure of which can give rise to abnormal
functioning and can negatively impact the efficiency in delivering value to customers.
Complex IoT systems have too many endpoints which has to be connected for
aggregating data and facilitating transmission to IoT platforms.
components of IoT, several companies have been struggling to obtain the desired benefits
from existing IoT projects. This can be attributed to the factors like data analysis, security
and investment among others. Also responsible is the human factor, as 74% of organizations
surveyed by Cisco appear to have failed in their attempts of implementing IoT. Five most
common challenges faced are:
1) Connectivity
The quality and bandwidth of Internet access available everywhere differs radically.
Companies in Oil and Gas or Logistics industries operate remotely battling tough
conditions. They need robust network connections to gather data and transfer the same for
further analysis (Weyrich, & Ebert, 2016). The performance and quality of the network
signals depend upon the routers, WAN, LAN or even MAN.
2) Interoperability and Compatibility
Networks and sensors form the integral parts any IoT system (Al-Fuqaha et al., 2015).
However, all machines do not come with equally advanced networking, security
standards or sensory capabilities for effective communication and data sharing. These end
up bottlenecking the whole system.
3) Integrating IoT products with platforms
To successfully implement IoT systems, it is extremely necessary to integrate the right
IoT products with the respective platforms, failure of which can give rise to abnormal
functioning and can negatively impact the efficiency in delivering value to customers.
Complex IoT systems have too many endpoints which has to be connected for
aggregating data and facilitating transmission to IoT platforms.
6PROPOSED MODEL FOR IOT IMPLEMENTATION
4) Privacy and Security
Government organizations as also industry leaders like Apple may have big claims when
it comes to securing their digital assets but even them have not been spared from the
wrath of hackers. Latest incidents like ransomware attacks which continue to challenge
the confidence of corporate businesses (Kharraz et al., 2015). Lapses in cyber security can
exist among both the company as well as the consumer which makes it mandatory for
both parties to take sincere measures towards improving security.
5) Intelligent Data Analysis
The primary purpose of IoT is to enable translation of data into meaningful organized set
of information. Flaws in the data model can result in generating false negatives or false
positives. It has to be understood that data by itself is far from what can be called an
insight (Kandogan et al. 2013). Instead it is more important to ask the right set of
questions that can convert the raw data into valuable insight. Traditional analytical
software solutions are not capable to process and manage data and hence pose as
limitations.
4) Privacy and Security
Government organizations as also industry leaders like Apple may have big claims when
it comes to securing their digital assets but even them have not been spared from the
wrath of hackers. Latest incidents like ransomware attacks which continue to challenge
the confidence of corporate businesses (Kharraz et al., 2015). Lapses in cyber security can
exist among both the company as well as the consumer which makes it mandatory for
both parties to take sincere measures towards improving security.
5) Intelligent Data Analysis
The primary purpose of IoT is to enable translation of data into meaningful organized set
of information. Flaws in the data model can result in generating false negatives or false
positives. It has to be understood that data by itself is far from what can be called an
insight (Kandogan et al. 2013). Instead it is more important to ask the right set of
questions that can convert the raw data into valuable insight. Traditional analytical
software solutions are not capable to process and manage data and hence pose as
limitations.
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
7PROPOSED MODEL FOR IOT IMPLEMENTATION
Figure 1: Proposed model for Internet of Things
Solution
The above diagram proposes a model for implementing Internet of Things. IoT
devices are being found almost everywhere and are also gradually enabling ambient
intelligence to make it more usable in future. The different communication models that are at
works here are described below:
Communications model (Device-to-Device)
Involves multiple devices for directly connecting and communicating among each
other eliminating the need for requirement of application servers in between. The devices are
Figure 1: Proposed model for Internet of Things
Solution
The above diagram proposes a model for implementing Internet of Things. IoT
devices are being found almost everywhere and are also gradually enabling ambient
intelligence to make it more usable in future. The different communication models that are at
works here are described below:
Communications model (Device-to-Device)
Involves multiple devices for directly connecting and communicating among each
other eliminating the need for requirement of application servers in between. The devices are
8PROPOSED MODEL FOR IOT IMPLEMENTATION
communicating via several network types, which include the Internet as well as IP networks.
Products like these can also make use of Bluetooth, ZigBee and even Z-wave for directly
connecting among themselves (Fouladi & Ghanoun, 2013).
Communications model (Device-to-Cloud)
IoT devices connect directly to the cloud internet services like application service
providers for controlling traffic of messages and exchanging data (He, Yan, & Da Xu, 2014).
Such approaches frequently take mileage from existing mechanisms of communication
similar to wired traditional Ethernet or Wi-Fi for establishing connections between the IP
network and the devices that ultimately to cloud service.
Communications model (Device-to-Gateway)
Also known as the Device-to-application-layer gateway or the (ALG) model, this
deals with connecting the IoT devices through ALG services which are used as conduits for
reaching the cloud services (Aazam & Huh, 2014). Simply put, it means that the application
running in the local gateway device plays the role of an intermediary between the cloud and
the devices while also providing network and data security.
In this particular implementation of IoT, within the WAN of the company, specialized
smart applications are used to analyse recordings from CCTV and the IP camera which can
be viewed from user interfaces like laptops and mobiles. Whenever abnormal behaviour is
detected, users are alarmed who can investigate the activity both from within the office
premises (internal WAN and laptops) or from outside through mobiles which can access
these devices through the cloud and application layer gateway provided the user has the
requisite permissions (Sanchez-Iborra & Cano, 2016). Similarly, users outside the company’s
WAN can access electronic devices installed with the company premises remotely by
synchronizing with their mobile and be able to give important presentations.
communicating via several network types, which include the Internet as well as IP networks.
Products like these can also make use of Bluetooth, ZigBee and even Z-wave for directly
connecting among themselves (Fouladi & Ghanoun, 2013).
Communications model (Device-to-Cloud)
IoT devices connect directly to the cloud internet services like application service
providers for controlling traffic of messages and exchanging data (He, Yan, & Da Xu, 2014).
Such approaches frequently take mileage from existing mechanisms of communication
similar to wired traditional Ethernet or Wi-Fi for establishing connections between the IP
network and the devices that ultimately to cloud service.
Communications model (Device-to-Gateway)
Also known as the Device-to-application-layer gateway or the (ALG) model, this
deals with connecting the IoT devices through ALG services which are used as conduits for
reaching the cloud services (Aazam & Huh, 2014). Simply put, it means that the application
running in the local gateway device plays the role of an intermediary between the cloud and
the devices while also providing network and data security.
In this particular implementation of IoT, within the WAN of the company, specialized
smart applications are used to analyse recordings from CCTV and the IP camera which can
be viewed from user interfaces like laptops and mobiles. Whenever abnormal behaviour is
detected, users are alarmed who can investigate the activity both from within the office
premises (internal WAN and laptops) or from outside through mobiles which can access
these devices through the cloud and application layer gateway provided the user has the
requisite permissions (Sanchez-Iborra & Cano, 2016). Similarly, users outside the company’s
WAN can access electronic devices installed with the company premises remotely by
synchronizing with their mobile and be able to give important presentations.
9PROPOSED MODEL FOR IOT IMPLEMENTATION
Recommendation
The report clearly describes the Internet of Things (IoT) system functionalities by
explaining the role played by actuators, sensors and WSNs in making IoT work. However, a
greater focus should be given by the reader towards the challenges section. By explaining
each of the five challenges carefully the study tries to bring more awareness among readers
about IoT and what compatibility, interoperability and data analysis can mean in making a
proper implementation of IoT. After that the study gives a network diagram to show how an
appropriate IoT network layout should look like. The report follows it up by including the
types of communication modes that come at play for the propped IoT model. Then a relation
is drawn between these communication modes and how the proposed network functions as
also mentioning the role of all the devices involved.
Conclusion
In conclusion, the repot makes a comprehensive study on Internet of Things (IoT) by
explaining what it is, what constitutes IoT and how they work. With that sorted the study
choses five most common challenges in implementing IoT systems and it is observed that the
lack of focus on key challenges is what is keeping companies from successfully
implementing IoT systems. Then the report provides elaborates IoT thoroughly with the help
of a network diagram, lists the modes of communication at play and tries to draw a relation
between the role of the devices and the communication modes to present a better explanation.
Recommendation
The report clearly describes the Internet of Things (IoT) system functionalities by
explaining the role played by actuators, sensors and WSNs in making IoT work. However, a
greater focus should be given by the reader towards the challenges section. By explaining
each of the five challenges carefully the study tries to bring more awareness among readers
about IoT and what compatibility, interoperability and data analysis can mean in making a
proper implementation of IoT. After that the study gives a network diagram to show how an
appropriate IoT network layout should look like. The report follows it up by including the
types of communication modes that come at play for the propped IoT model. Then a relation
is drawn between these communication modes and how the proposed network functions as
also mentioning the role of all the devices involved.
Conclusion
In conclusion, the repot makes a comprehensive study on Internet of Things (IoT) by
explaining what it is, what constitutes IoT and how they work. With that sorted the study
choses five most common challenges in implementing IoT systems and it is observed that the
lack of focus on key challenges is what is keeping companies from successfully
implementing IoT systems. Then the report provides elaborates IoT thoroughly with the help
of a network diagram, lists the modes of communication at play and tries to draw a relation
between the role of the devices and the communication modes to present a better explanation.
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
10PROPOSED MODEL FOR IOT IMPLEMENTATION
References
Aazam, M., & Huh, E. N. (2014, August). Fog computing and smart gateway based
communication for cloud of things. In 2014 International Conference on Future
Internet of Things and Cloud (pp. 464-470). IEEE.
Al-Fuqaha, A., Guizani, M., Mohammadi, M., Aledhari, M., & Ayyash, M. (2015). Internet
of things: A survey on enabling technologies, protocols, and applications. IEEE
communications surveys & tutorials, 17(4), 2347-2376.
Fouladi, B., & Ghanoun, S. (2013). Security evaluation of the Z-Wave wireless protocol.
Black hat USA, 24, 1-2.
He, W., Yan, G., & Da Xu, L. (2014). Developing vehicular data cloud services in the IoT
environment. IEEE Transactions on Industrial Informatics, 10(2), 1587-1595.
Kandogan, E., Roth, M., Kieliszewski, C., Özcan, F., Schloss, B., & Schmidt, M. T. (2013,
June). Data for all: A systems approach to accelerate the path from data to insight. In
2013 IEEE International Congress on Big Data (pp. 427-428). IEEE.
Kharraz, A., Robertson, W., Balzarotti, D., Bilge, L., & Kirda, E. (2015, July). Cutting the
gordian knot: A look under the hood of ransomware attacks. In International
Conference on Detection of Intrusions and Malware, and Vulnerability Assessment
(pp. 3-24). Springer, Cham.
Li, S., Da Xu, L., & Wang, X. (2013). Compressed sensing signal and data acquisition in
wireless sensor networks and internet of things. IEEE Transactions on Industrial
Informatics, 9(4), 2177-2186.
References
Aazam, M., & Huh, E. N. (2014, August). Fog computing and smart gateway based
communication for cloud of things. In 2014 International Conference on Future
Internet of Things and Cloud (pp. 464-470). IEEE.
Al-Fuqaha, A., Guizani, M., Mohammadi, M., Aledhari, M., & Ayyash, M. (2015). Internet
of things: A survey on enabling technologies, protocols, and applications. IEEE
communications surveys & tutorials, 17(4), 2347-2376.
Fouladi, B., & Ghanoun, S. (2013). Security evaluation of the Z-Wave wireless protocol.
Black hat USA, 24, 1-2.
He, W., Yan, G., & Da Xu, L. (2014). Developing vehicular data cloud services in the IoT
environment. IEEE Transactions on Industrial Informatics, 10(2), 1587-1595.
Kandogan, E., Roth, M., Kieliszewski, C., Özcan, F., Schloss, B., & Schmidt, M. T. (2013,
June). Data for all: A systems approach to accelerate the path from data to insight. In
2013 IEEE International Congress on Big Data (pp. 427-428). IEEE.
Kharraz, A., Robertson, W., Balzarotti, D., Bilge, L., & Kirda, E. (2015, July). Cutting the
gordian knot: A look under the hood of ransomware attacks. In International
Conference on Detection of Intrusions and Malware, and Vulnerability Assessment
(pp. 3-24). Springer, Cham.
Li, S., Da Xu, L., & Wang, X. (2013). Compressed sensing signal and data acquisition in
wireless sensor networks and internet of things. IEEE Transactions on Industrial
Informatics, 9(4), 2177-2186.
11PROPOSED MODEL FOR IOT IMPLEMENTATION
Lu, C., Saifullah, A., Li, B., Sha, M., Gonzalez, H., Gunatilaka, D., ... & Chen, Y. (2016).
Real-time wireless sensor-actuator networks for industrial cyber-physical systems.
Proceedings of the IEEE, 104(5), 1013-1024.
Riahi, A., Challal, Y., Natalizio, E., Chtourou, Z., & Bouabdallah, A. (2013, May). A
systemic approach for IoT security. In 2013 IEEE international conference on
distributed computing in sensor systems (pp. 351-355). IEEE.
Sanchez-Iborra, R., & Cano, M. D. (2016). State of the art in LP-WAN solutions for
industrial IoT services. Sensors, 16(5), 708.
Stojkoska, B. L. R., & Trivodaliev, K. V. (2017). A review of Internet of Things for smart
home: Challenges and solutions. Journal of Cleaner Production, 140, 1454-1464.
Weyrich, M., & Ebert, C. (2016). Reference architectures for the internet of things. IEEE
Software, (1), 112-116.
Lu, C., Saifullah, A., Li, B., Sha, M., Gonzalez, H., Gunatilaka, D., ... & Chen, Y. (2016).
Real-time wireless sensor-actuator networks for industrial cyber-physical systems.
Proceedings of the IEEE, 104(5), 1013-1024.
Riahi, A., Challal, Y., Natalizio, E., Chtourou, Z., & Bouabdallah, A. (2013, May). A
systemic approach for IoT security. In 2013 IEEE international conference on
distributed computing in sensor systems (pp. 351-355). IEEE.
Sanchez-Iborra, R., & Cano, M. D. (2016). State of the art in LP-WAN solutions for
industrial IoT services. Sensors, 16(5), 708.
Stojkoska, B. L. R., & Trivodaliev, K. V. (2017). A review of Internet of Things for smart
home: Challenges and solutions. Journal of Cleaner Production, 140, 1454-1464.
Weyrich, M., & Ebert, C. (2016). Reference architectures for the internet of things. IEEE
Software, (1), 112-116.
1 out of 12
Related Documents
Your All-in-One AI-Powered Toolkit for Academic Success.
+13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
© 2024 | Zucol Services PVT LTD | All rights reserved.