Sensing and Actuation & IoT Connectivity & IoT Networking

Transducer

  • Converts a signal from one physical form to another.
  • Physical forms include thermal, electric, mechanical, magnetic, chemical, and optical.
  • Acts as an energy converter.
  • Examples:
    • Microphone: Sound to electrical signal.
    • Speaker: Electrical signal to sound.
    • Antenna: Electromagnetic energy to electricity (and vice versa).
    • Strain gauge: Strain to electrical.

Definition of Sensor

  • Detects the presence of a physical quantity.
  • Output is a signal converted to human-readable form.

Sensor

  • Senses physical changes in a system in response to stimuli.
  • Input: Physical parameter or stimuli (e.g., temperature, light, gas, pressure, sound).
  • Output: Response to stimuli.

Sensor Characteristics

  • Static characteristics: Output change in response to input change after steady state.
  • Dynamic characteristics: System's transient response to an input.

Static Characteristics

  • Accuracy: Correctness of output compared to a superior system.
  • Range: Highest and lowest value the sensor can sense.
  • Resolution: Smallest change in input that a sensor can sense.
  • Errors: Difference between standard and sensor value.
  • Sensitivity: Ratio of incremental change in response to incremental change in input parameter.
  • Linearity: Deviation of sensor value curve from a straight line.
  • Drift: Difference in measurements over long periods.
  • Repeatability: Deviation between measurements under same conditions.

Dynamic Characteristics

  • How well a sensor responds to changes in its input.
  • Zero order system: Output responds to input with no delay.
    • Example: Potentiometer for linear/rotary displacements.
  • First order system: Output gradually approaches final value.
  • Second order system: Oscillates before steady state.

Sensor Classification

  • Passive and active.
  • Analog and digital.
  • Scalar and vector.

Passive Sensor

  • Cannot independently sense the input.
  • Example: Accelerometer, soil moisture, water-level, and temperature sensors.

Active Sensor

  • Independently sense the input.
  • Example: Radar, sounder, and laser altimeter sensors.

Analog Sensor

  • Output is a continuous function of its input.
  • Example: Temperature sensor, LDR, analog pressure sensor, and Analog Hall effect/Magnetic Sensor

Digital Sensor

  • Responses in binary nature.
  • Designs to overcome the disadvantages of analog sensors
  • Example: Passive infrared (PIR) sensor and digital temperature sensor (DS1620).

Scalar Sensor

  • Detects input parameter based on magnitude.
  • Not affected by direction.
  • Example: Temperature, gas, strain, color and smoke sensors.

Vector Sensor

  • Response depends on magnitude, direction, and orientation of input.
  • Example: Accelerometer, gyroscope, magnetic field, and motion detector sensors.

Actuator

  • Deals with control action (mechanical action).
  • Mechanical or electro-mechanical devices.

Actuator Details

  • Requires a control signal input and an energy source.
  • Available in micro and macro scales.
  • Examples: Electric motor, solenoid, hard drive stepper motor, comb drive, hydraulic cylinder, piezoelectric actuator and pneumatic actuator.

Classification of Actuators

  • Electric Linear
  • Electric Rotary
  • Fluid Power Linear
  • Fluid Power Rotary
  • Linear Chain Actuators
  • Manual Linear
  • Manual Rotary

Electric Linear Actuator

  • Powered by electrical signal.
  • Converts electrical energy into linear displacement.
  • Used in automation applications.

Electric Rotary Actuator

  • Powered by electrical signal.
  • Converts electrical energy into rotational motion.
  • Applications include quarter-turn valves, windows, and robotics.

Fluid Power Linear Actuator

  • Powered by hydraulic fluid, gas, or differential air pressure.
  • Produces linear displacement.
  • Used in automation applications (e.g., clamping, welding).

Fluid Power Rotary Actuator

  • Powered by fluid, gas, or differential air pressure.
  • Converts pressure into rotational motion.
  • Applications include opening/closing dampers, doors, and clamping.

Linear Chain Actuator

  • Provides linear motion using specialized chains.
  • Used in motion control applications.

Manual Linear Actuator

  • Provides linear displacement through manual rotation of screws/gears.
  • Used for manipulating tools and workpieces.

Manual Rotary Actuator

  • Provides rotary output through manual rotation of screws, levers or gears.
  • Used for operating valves.

Communication Protocols for IoT

  • IEEE 802.15.4
  • Zigbee
  • 6LoWPAN
  • Wireless HART
  • Z-Wave
  • ISA 100
  • Bluetooth
  • NFC
  • RFID

IEEE 802.15.4

  • Framework for lower layers (MAC and PHY) of WPAN.
  • PHY: Defines frequency band, transmission power, and modulation scheme.
  • MAC: Defines medium access and flow control.
  • Used for low power, low cost, and low speed communication (< ~75m).

Features of IEEE 802.15.4

  • Uses DSSS (direct sequence spread spectrum) coding scheme.
  • Utilizes phase shift keying modulation.
  • BPSK - 868/915 MHz, data rates 20/40 kbps.
  • OQPSK - 2.4 GHz, data rate 250 kbps.
  • Tolerant to noise and interference, improving link reliability.
  • Line of sight (LOS) transmission preferred.
  • Range: 10 to 75m.
  • Uses CSMA-CA (carrier sense multiple access with collision avoidance).
  • Infrequent short packets for low power consumption.
  • Supports star and peer-to-peer topologies.

Variants of IEEE 802.15.4

  • 802.15.4 - 2003: Basic version, fixed modulation schemes and data rates for different frequency bands.
  • 802.15.4 - 2006: Higher data rate on lower frequency bands, uses OQPSK for all bands.
  • 802.15.4 a: Increased range capability, defines new physical layers (UWB and CSS).
  • 802.15.4 c: 780 MHz band in China, uses O-QPSK or MPSK, 250 kb/s.
  • 802.15.4 d: 950 MHz band in Japan, uses GFSK (100 kb/s) or BPSK (20 kb/s).
  • 802.15.4e: MAC developments toward ISA SP100.11a application.
  • 802.15.4f: New PHYs for 433 MHz, 2.4 GHz, and UWB.
  • 802.15.4g: New PHYs for smart utility networks (902 - 928 MHz).

Zigbee

  • Framework for medium-range communication in IoT.
  • Defines PHY and MAC layers for interoperability at low data rates.
  • Operates at:
    • 868 MHz (1 channel, 20 kbps)
    • 902-928MHz (10 channels, 40 kbps)
    • 2.4 GHz (16 channels, 250 kbps).

Features of Zigbee

  • Lower frequency bands use BPSK.
  • 2.4 GHz band uses OQPSK.
  • 128 bytes packet size, 104 bytes max payload.
  • Line of sight (LOS) transmission.
  • Range: up to 70m.
  • Low power consumption (around 1mW).
  • Adaptable duty cycle, low data rates, low coverage radio.
  • Networking topologies: star, peer-to-peer, cluster-tree (hybrid), mesh.

Zigbee Nodes

  • Coordinators: Initialize, maintain, and control the network (one per network).
  • Routers: Connected to coordinator or other routers, multi-hop routing.
  • End devices: Do not contribute in routing.
  • Star topology: One coordinator, zero or more end devices.
  • Mesh/tree topologies: One coordinator, several routers/end devices.
  • Cluster-tree network: Coordinators linked to parent coordinator.

Zigbee Variants

  • ZigBee.
  • ZigBee Pro: Scalability, security, and improved performance.

6LoWPAN

  • IPv6 over Low-Power Wireless Personal Area Networks.
  • Optimizes IPv6 packet transmission in low power and lossy networks (LLN).
  • Operates at:
    • 2400–2483.5 MHz (worldwide)
    • 902–929 MHz (North America)
  • Uses 802.15.4 in unslotted CSMA/CA mode.

Features of 6LoWPAN

  • Converts data format for IEEE 802.15.4 lower layer system.
  • IPv6 MTU is 1280 bytes, IEEE 802.15.4 packet size is 127 bytes.
  • Adaptation layer provides:
    • Packet fragmentation & reassembly
    • Header compression
    • Routing of data link layer.
  • Fragmentation header allows 2048 bytes packet.
  • Header compression reduces transmission overhead.
  • Stateless auto configuration allows automatic IPv6 address creation.
  • Data link layer routing:
    • mesh-under: Uses link layer address.
    • route-over: Uses network layer IP address.
  • Link layer security (AES-128) from IEEE 802.15.4.

Wireless HART

  • Based on HART (Highway Addressable Remote Transducer).
  • First international industrial wireless standard (IEC 62591), based on IEEE 802.15.4.
  • Functions in the 2.4GHz ISM band, up to 250 kb/s.
  • Supports 11 to 26 channels, 5MHz gap between adjacent channels.
  • Same channel cannot be used consecutively.

Features of Wireless HART

  • Exploits IEEE 802.15.4 DSSS coding scheme.
  • Channel hopping with every packet.
  • Modulation technique is offset quadrature phase shift keying (OQPSK).
  • Transmission Power around 10dBm (adjustable).
  • Maximum payload is 127 bytes.
  • Employs TDMA (time division multiple access), 10ms time slot for each transmission.
  • Collision-free and deterministic communications.
  • 100 consecutive time slots per second grouped into a super frame.
  • Slot sizes and super frame length are fixed.
  • Supports multiple super frames.
  • Communication occurs in allotted timeslot and frequency channel.
  • Supports both star and mesh topologies.

Z-Wave

  • Low power radio communication technology for home automation and security systems.
  • Simpler and cheaper alternative to Zigbee for small to medium range connectivity.
  • Operates on the unlicensed ISM band.
  • Mesh Network Topology, supporting up to 232 nodes in a network.

Features of Z-Wave

  • Controller and Slave.
  • The Controller is a central entity which sets up the Z-wave network and manages other slave devices in the network.
  • Network ID (4 Bytes) and Node ID(1 Byte).
  • Nodes can communicate only within their home network
  • Offers a data rate of up to 100kbps and communication range of 30 meters.
  • Source routed network mesh topology using 1 primary controller.
  • Radio dead-spots can be bypassed using a process called Healing.

Application of Z-Wave

  • Home/Office Automation
  • Smart Energy Management
  • Smart Security and Surveillance
  • Voice control enabled applications
  • Appliances automation and control

ISA 100.11a

  • Standard for wireless network technology.
  • International Society of Automation (ISA).
  • Implementation of automation in the industrial environment.
  • Protocol stack is in compliance with IoT.
  • Based on the IEEE 802.15.4 protocol.

Features of ISA 100.11a

  • Supports multiple devices working on different protocols to interact in a single network, simultaneously.
  • Enables interoperability and communication between different devices
  • Uses the IPv6 based technology and adds increased address space and security.
  • 128 bits AES encryption security.
  • Supports 2 network topologies for operation: 1)Star and 2)Mesh.
  • Uses TDMA/CSMA schemes for resource sharing, collision avoidance.

Application of ISA 100.11a

  • Automation in large scale complex industries.
  • Wireless monitoring of the industrial network and devices.
  • Process monitoring and control automation in the industrial environment with large and complex setups.

Bluetooth

  • Short range wireless communication technology.
  • Replacing cables with wireless medium to communicate between portable devices
  • Based on Ad-hoc technology, also known as Ad-hoc Piconets.
  • Network can be established between 2 to 8 Bluetooth devices.

Features of Bluetooth

  • Low power consumption.
  • Uses the unlicensed ISM band at 2.4 to 2.485 GHZ.
  • Supports 1Mbps and 3Mbps data rate for version 1.2 and 2.0, respectively.
  • The operating range: 1 meter for Class 3 radios, 10 meters for Class 2 radios, and 100 meters for Class 1 radios

Application of Bluetooth

  • Connectivity with desktop and laptop peripherals
  • Wireless connectivity between mobile phones and other portable devices
  • Multimedia transfer between devices
  • Automobiles use Bluetooth for connecting with multimedia and navigation devices.

RFID

  • Stands for “radio-frequency identification” .
  • System consists of RFID tag, RFID reader and RFID software.
  • Tag stores digitally encoded data, which is read by a RFID reader.
  • Tag data can be read outside the line-of-sight, as compared to traditional barcodes and QR codes.

Features of RFID

  • Tag consists of an integrated circuit and an antenna, covered with a protective material.
  • Tags can be classified as passive or active.
  • Active tags use their own power supply for operation and data transfer.
  • Passive tags have to be powered by a reader inductively in order to transmit data.

Application of RFID

  • Store product tracking
  • Asset and baggage tracking
  • Supply chain management
  • Livestock tracking and management
  • Automobile tracking
  • Authentication and access control

NFC

  • Near field communication, or NFC, has been derived from radio-frequency identification (RFID).
  • Works within close proximity without any physical contact between the devices like RFID.
  • Active and passive devices.

Features of NFC

  • Operates at 13.56 MHz frequency.
  • The communication range of NFC devices is less then 10 centimeters.
  • Data rate supported are 106, 212 or 424 Kbps (kilobits per second).
  • Two communication modes are supported between two devices: Active-Active or Active-Passive mode.

Application of NFC

  • Banking and payments using NFC enabled smartphones, transaction cards.
  • Tracking goods
  • Data Communication between smart phones
  • Security and authentication using NFC enabled ID cards
  • Low-power home automation systems

Introduction to IoT Networks

  • IoT devices have low processing power, small size, energy constraints.
  • IoT networks have low throughput, high packet loss, tiny payload size, frequent topology change.
  • Classical Internet is not meant for constrained IoT devices.
  • Challenges include heterogeneous devices, heterogeneous traffic, and heterogeneous access.

Enabling Classical Internet for IoT Devices

  • Proprietary non-IP based solution.
  • Internet Engineering Task Force (IETF) IP based solution including:
    • IPv6 over Low power Wireless Personal Area Networks (6LoWPAN)
    • Routing Over Low power and Lossy networks (ROLL)
    • Constrained RESTful Environments (CoRE)

Proprietary non-IP based solution drawbacks

  • Limited flexibility to end users: vendor specific APIs
  • Interoperability: vendor specific sensors and gateways
  • Limited last-mile connectivity

IETF IP based solution

  • IPv6 over Low power Wireless Personal Area Networks (6LoWPAN)
    • By header compression and encapsulation it allows IPv6 packets to transmit and receive over IEEE 802.15.4 based networks.
  • Routing Over Low power and Lossy networks (ROLL)
    • New routing protocol optimized for saving storage and energy.
  • Constrained RESTful Environments (CoRE)
    • Extend the Integration of the IoT devices from network to service level.

CoRE

  • Provides a platform for applications meant for constrained IoT devices.
  • This framework views sensor and actuator resources as web resources.
  • The framework is limited to applications which:
    • Monitor basic sensors
    • Supervise actuators
  • CoAP includes a mechanism for service discovery.

CoRE: Service Discovery

  • IoT devices (act as mini web servers) register their resources to Resource Directory (RD) using Registration Interface (RI).
  • RD, a logical network node, stores the information about a specific set of IoT devices.
  • RI supports Representational State Transfer (REST) based protocol such as HTTP (and CoAP- optimized for IoT).
  • IoT client uses Lookup interface for discovery of IoT devices.

IoT Network QoS

  • Quality-of-service (QoS) of IoT network is the ability to guarantee intended service to IoT applications through controlling the heterogeneous traffic generated by IoT devices.
  • QoS policies for IoT Network includes:
    • Resource utilization
    • Data timeliness
    • Data availability
    • Data delivery

Resource Utilization

  • Requires control on the storage and bandwidth for data reception and transmission.
  • QoS policies for resource utilization:
    • Resource limit policy
      • Controls the amount of message buffering
      • Useful for memory constrained IoT devices
    • Time filter policy
      • Controls the data sampling rate (interarrival time) to avoid buffer overflow
      • Controls network bandwidth, memory, and processing power

Data Timeliness

  • Measure of the freshness of particular information at the receiver end
  • Important in case of healthcare, industrial and military applications
  • Data timeliness policies for IoT network include
    • Deadline policy
      • Provides maximum interarrival time of data
      • Drops the stale data; notify the missed deadline to the application end
    • Latency budget policy
      • Latency budget is the maximum time difference between the data transmission and reception from source end to the receiver end.
      • Provides priority to applications having higher urgency

Data Availability

  • Measure of the amount of valid data provided by the sender/producer to receiver/consumer
  • QoS policies for data availability in IoT network include
    • Durability policy
      • Controls the degree of data persistence transmitted by the sender
      • Data persistence ensures the availability of the data to the receiver even after sender is unavailable
    • Lifespan policy
      • Controls the duration for which transmitted data is valid
    • History policy
      • Controls the number of previous data instances available for the receiver.

Data Delivery

  • Measure of successful reception of reliable data from sender to receiver
  • QoS policies for data delivery include
    • Reliability policy
      • Controls the reliability level associated with the data distribution
    • Transport priority
      • Allows transmission of data according to its priority level

Requirements of IoT Network

  • Coverage
  • High throughput
  • Low latency
  • Ultra reliability
  • High power efficiency

MQTT

  • Message Queue Telemetry Transport
  • Introduced by IBM and standardized by Organization for the Advancement of Structured Information Standards (OASIS) in 2013
  • Works on Publish/Subscribe framework on top of TCP/IP architecture
  • Advantages
    • Reliable, Lightweight, and cost-effective protocol

MQTT QoS

  • QoS of MQTT protocol is maintained for two transactions
    • First transaction: Publishing client -> MQTT Server
    • Second transaction: MQTT Server -> Subscribing Client
  • Client on each transaction sets the QoS level
    • For the first transaction, publishing client sets the QoS level
    • For second transaction, client subscriber sets the QoS level

MQTT QoS Levels

  • Supports 3-level of QoS
    • QoS 0:
      • Also known as “at most once” delivery
      • Best effort and unacknowledged data service
      • Publisher transmits the message one time to server and server transmits it once to subscriber
      • No retry is performed
    • QoS 1:
      • Also known as “at least once” delivery
      • Message delivery between the publisher, server and then between server and subscribers occurs at least once.
      • Retry is performed until acknowledgement of message is recieved
    • QoS 2:
      • Also known as “exactly once” delivery
      • This QoS level is used when neither packet loss or duplication of message is allowed
      • Retry is performed until the message is delivered exactly once

CoAP

  • Constrained Application Protocol
  • CoAP was designed by IETF Constrained RESTful Environment (CoRE) working group to enable application with lightweight RESTful (HTTP) interface
  • Works on Request/Response framework based on the UDP architecture, including Datagram Transport Layer Security (DTLS) secure transport protocol

CoAP Messages

  • CoAP defines four types of messages
    • CON: Conformable
    • NON: Non-conformable
    • RST: Reset
    • ACK: Acknowledgement
  • For conformable type message, the recipient must explicitly either acknowledge or reject the message.
  • In case of non-conformable type message, the recipient sends reset message if it can’t process the message
  • Utilizes GET, PUT, OBSERVE, PUSH, and DELETE messages requests to retrieve, create, initiate, update, and delete subscription respectively.
  • Supports caching capabilities to improve the response time and reduce bandwidth consumption.
  • Uses IP multicast to support data requests sent to a group of devices.
  • Specialized for machine-to-machine (M2M) communication.

XMPP

  • Extensible Messaging and Presence Protocol
  • Supports Publish/Subscribe messaging framework on top of TCP protocol
  • The communication protocol is based on Extensive Markup Language (XML).
  • Uses Datagram Transport Layer Security (DTLS) secure transport protocol
  • XMPP model is decentralized, no central server is required.

Advantages of XMPP

  • Interoperability: Supports interoperability between heterogeneous networks
  • Extensibility: Supports privacy lists, multi-user chat, and publish/subscribe chat status notifications
  • Flexibility: Supports customized markup language defined by different organizations according to their needs

AMQP

  • Advance Message Queuing Protocol
  • Optimized for financial applications
  • Binary message-oriented protocol on top of TCP
  • Supports Publish/Subscribe framework for both:
    • Point-to-point (P2P)
    • Multipoint communication
  • Uses token-based mechanism for flow control
  • Ensures no buffer overflow at the receiving end

Message delivery guarantee services:

  • At least once: Guarantees message delivery but may do so multiple times
  • At most once: Each message is delivered once or never
  • Exactly once: No message drop and delivered once one

IEEE 1888

  • Energy-efficient network control protocol
  • Defines a generalized data exchange protocol between network components over the IPv4/v6-based network.
  • Universal Resource Identifiers (URIs) based data identification
  • Applications: Environmental monitoring, energy saving, and central management systems.

DDS RTPS

  • Distributed Data Service Real Time Publish and Subscribe
  • Supports Publish/Subscribe framework and on top of UDP transport layer protocol.
  • Data-centric and binary protocol
  • Data is termed as “topics”.
  • The users/listeners may subscribe to their particular topic of interest
  • A single topic may have multiple speakers of different priorities

Supports enlisted QoS for data distribution

  • Data persistence
  • Delivery deadline
  • Reliability
  • Data freshness
  • Applications: Military, Industrial, and healthcare monitoring