0% found this document useful (0 votes)
138 views27 pages

IoT Unit I - Overview

The document discusses the key concepts of the Internet of Things (IoT). It defines IoT as a network that connects physical objects through network infrastructure so they can exchange data. It describes how IoT allows for remote control and autonomous operation with reduced human effort. Examples of applications that are discussed include smart homes, wearables, smart cities, smart grids, industrial uses, connected cars, and digital health. The document also outlines some of the main characteristics, advantages, disadvantages, and architectural layers of IoT systems.

Uploaded by

Gs
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
138 views27 pages

IoT Unit I - Overview

The document discusses the key concepts of the Internet of Things (IoT). It defines IoT as a network that connects physical objects through network infrastructure so they can exchange data. It describes how IoT allows for remote control and autonomous operation with reduced human effort. Examples of applications that are discussed include smart homes, wearables, smart cities, smart grids, industrial uses, connected cars, and digital health. The document also outlines some of the main characteristics, advantages, disadvantages, and architectural layers of IoT systems.

Uploaded by

Gs
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 27

Internet of Things

Unit- I
Introduction
IoT is a network in which all physical objects are connected to the
internet through network devices or routers and exchange data. IoT allows
objects to be controlled remotely across existing network infrastructure. IoT is
a very good and intelligent technique which reduces human effort as well as easy
access to physical devices. This technique also has autonomous control feature by
which any device can control without any human interaction.

“Things” in the IoT sense, is the mixture of hardware, software, data, and


services. “things” can refer to a wide variety of devices such as DNA analysis
devices for environmental monitoring, electric clamps in coastal waters, arduino
chips in home automation and many other. These devices gather useful data with
the help of various existing technologies and share that data between other
devices. Examples include home automation system which uses wi-fi or bluetooth
for exchange data between various devices of home.

Applications of IoT

Smart home
The most important and efficient application that stands out is the smart home,
ranking the highest IoT application on all channels. The number of people
searching for smart homes increases every month by about 60,000 people.

Wearables

Just like smart homes, wearables remain a hot topic among potential IoT. Every
year, consumers all across the globe await the release of the latest apple
smartwatch.

1
Smart city
Smart cities, like its name suggests, is a big innovation and spans a wide variety of
use cases, from water distribution and traffic management to waste management
and environmental monitoring. 

Smart grids
Smart grids are another area of IoT technology that stands out. A smart grid
basically promises to extract information on the behaviors of consumers and
electricity suppliers in an automated fashion to improve the efficiency, economics,
and reliability of electricity distribution. 41,000 monthly google searches is a
testament to this concept’s popularity.

Industrial internet
One way to think of the industrial internet is by looking at connected machines and
devices in industries such as power generation, oil, gas, and healthcare. It also
makes use of situations where unplanned downtime and system failures can result
in life-threatening situations. 

Connected car
Connected car technology is a vast and an extensive network of multiple sensors,
antennas, embedded software, and technologies that assist in communication to
navigate in our complex world. It has the responsibility of making decisions with
consistency, accuracy, and speed. It also has to be reliable. 

Connected health (digital health/telehealth/telemedicine)


IoT has various applications in healthcare, which are from remote monitoring
equipment to advance and smart sensors to equipment integration. It has the
potential to improve how physicians deliver care and also keep patients safe and
healthy. 

2
IoT Characteristics

1.     Intelligence

IoT comes with the combination of algorithms and computation, software &
hardware that makes it smart. Ambient intelligence in IoT enhances its capabilities
which facilitate the things to respond in an intelligent way to a particular situation
and supports them in carrying out specific tasks.

2.    Connectivity

Connectivity empowers internet of things by bringing together everyday objects.


Connectivity of these objects is pivotal because simple object level interactions
contribute towards collective intelligence in IoT network.

3.    Dynamic nature

The primary activity of internet of things is to collect data from its environment;
this is achieved with the dynamic changes that take place around the devices.

4.    Enormous scale

The number of devices that need to be managed and that communicate with each
other will be much larger than the devices connected to the current internet. The
management of data generated from these devices and their interpretation for
application purposes becomes more critical.

5.    Sensing

IoT wouldn’t be possible without sensors which will detect or measure any
changes in the environment to generate data that can report on their status or even
interact with the environment. 

6.    Heterogeneity

Heterogeneity in internet of things as one of the key characteristics. Devices in IoT


are based on different hardware platforms and networks and can interact with other
devices or service platforms through different networks.

3
7.     Security

IoT devices are naturally vulnerable to security threats. As we gain efficiencies,


novel experiences, and other benefits from the IoT, it would be a mistake to forget
about security concerns associated with it. There is a high level of transparency
and privacy issues with IoT. It is important to secure the endpoints, the networks,
and the data that is transferred across all of it means creating a security paradigm.

Advantages of IoT

Communication

IoT encourages the communication between devices, also famously known as


machine-to-machine (m2m) communication. Because of this, the physical devices
are able to stay connected and hence the total transparency is available with lesser
inefficiencies and greater quality.

Automation and control

Due to physical objects getting connected and controlled digitally and centrally
with wireless infrastructure, there is a large amount of automation and control in
the workings. 

Information

It is obvious that having more information helps making better decisions. Whether
it is mundane decisions as needing to know what to buy at the grocery store or if
the company has enough widgets and supplies, knowledge is power and more
knowledge is better.

Monitor

The second most obvious advantage of IoT is monitoring. Knowing the exact
quantity of supplies or the air quality in your home, can further provide more
information that could not have previously been collected easily. For instance,
knowing that you are low on milk or printer ink could save you another trip to the

4
store in the near future. Furthermore, monitoring the expiration of products can and
will improve safety.

Time

The amount of time saved because of IoT could be quite large. And in today’s
modern life, all could use more time.

Money

The biggest advantage of IoT is saving money. If the price of the tagging and
monitoring equipment is less than the amount of money saved, then the internet of
things will be very widely adopted. 

Automation of daily tasks leads to better monitoring of devices

The IoT allows you to automate and control the tasks that are done on a daily basis,
avoiding human intervention. 

Efficient and saves time

The machine-to-machine interaction provides better efficiency, hence; accurate


results can be obtained fast. This results in saving valuable time. Instead of
repeating the same tasks every day, it enables people to do other creative jobs.

Disadvantages of IoT

Compatibility: currently, there is no international standard of compatibility for the


tagging and monitoring equipment.

Complexity: as with all complex systems, there are more opportunities of failure.
With the internet of things, failures could sky rocket. For instance, let’s say that
both you and your spouse each get a message saying that your milk has expired,
and both of you stop at a store on your way home, and you both purchase milk. 

Privacy/security: with all of this IoT data being transmitted, the risk of losing
privacy increases.

5
Safety: imagine if a notorious hacker changes your prescription. Or if a store
automatically ships you an equivalent product that you are allergic to, or a flavor
that you do not like, or a product that is already expired. 

IoT Architecture

IoT is the technology that builds systems capable of autonomously sensing and
responding to stimuli from the real world without human intervention. The IoT
architecture generally comprises of these 4 stages:

Stage 1 (Sensors/ Actuators):


A thing in the context of “internet of things”, should be equipped with sensors and
actuators thus giving the ability to emit accept and process signals.

6
 

Stage 2 (Data Acquisition Systems):


The data from the sensors starts in analogue form which needs to be aggregated
and converted into digital streams for further processing. Data acquisition
systems perform these data aggregation and conversion functions.

Stage 3 (Edge Analytics):


Once IoT data has been digitized and aggregated, it may require further processing
before it enters the data center; this is where edge analytics comes in.

7
Stage 4 (Cloud Analytics):
Data that needs more in-depth processing gets forwarded to physical data centers
or cloud-based systems.

IoT Layered Architecture overview


IoT can be classified into a four or five-layered architecture which gives you a
complete overview of how it works in real life. The various components of the
architecture include the following:

● Four-layered architecture: this includes media/device layer, network layer,


service and application support layer, and application layer.
● Five-layered architecture: this includes perception layer, network layer,
middleware layer, application layer, and business layer.

Functions of each layer

● Sensor/perception layer: this layer comprises of wireless devices, sensors,


and radio frequency identification (RFID) tags that are used for collecting
and transmitting raw data such as the temperature, moisture, etc. which is
passed on to the next layer.

8
● Network layer: this layer is largely responsible for routing data to the next
layer in the hierarchy with the help of network protocols. It uses wired and
wireless technologies for data transmission.
● Middleware layer: this layer comprises of databases that store the
information passed on by the lower layers where it performs information
processing and uses the results to make further decisions.
● Service and application support layer: this layer involves business process
modeling and execution as well as IoT service monitoring and resolution.
● Application layer: it consists of application user interface and deals with
various applications such as home automation, electronic health monitoring,
etc.
● Business layer: this layer determines the future or further actions required
based on the data provided by the lower layers

This explains the back-end design implementations of a typical IoT structure.


The four-stage architecture of an IoT system
Stage 1 of an IoT architecture consists of your networked things, typically wireless
sensors and actuators.
Stage 2 includes sensor data aggregation systems and analog-to-digital data
conversion.
In stage 3, edge it systems perform preprocessing of the data before it moves on to
the data center or cloud.
Finally, in stage 4, the data is analyzed, managed, and stored on traditional back-
end data center systems.
Clearly, the sensor/actuator state is the province of operations technology (ot)
professionals. So is stage 2. Stages 3 and 4 are typically controlled by it, although
the location of edge it processing may be at a remote site or nearer to the data
center. The dashed vertical line labeled "the edge" is the traditional demarcation
between ot and it responsibilities, although this is blurring. Here's a look at each in
detail.

9
Stage 1- Sensors/actuators

● Sensors collect data from the environment or object under measurement and


turn it into useful data.
● Actuators can also intervene to change the physical conditions that generate
the data.
● An actuator might, for example, shut off a power supply, adjust an air flow
valve, or move a robotic gripper in an assembly process. 
● The sensing/actuating stage covers everything from legacy industrial devices
to robotic camera systems, water-level detectors, air quality sensors,
accelerometers, and heart rate monitors.
Stage 2- The internet gateway
● The data from the sensors starts in analog form, it needs to be aggregated
and converted into digital streams for further processing downstream.
● Data acquisition systems (DAS) perform these data aggregation and
conversion functions. The DAS connects to the sensor network, aggregates
outputs, and performs the analog-to-digital conversion.

10
● The internet gateway receives the aggregated and digitized data and routes it
over wi-fi, wired lans, or the internet, to stage 3 systems for further
processing.
● Stage 2 systems often sit in close proximity to the sensors and actuators.
● For example, a pump might contain a half-dozen sensors and actuators that
feed data into a data aggregation device that also digitizes the data. This
device might be physically attached to the pump. An adjacent gateway
device or server would then process the data and forward it to the stage 3 or
stage 4 systems.
Why preprocess the data?
The analog data streams that come from sensors create large volumes of data
quickly. The measurable qualities of the physical world in which the business may
be interested—motion, voltage, vibration, and so on—can create voluminous
amounts of constantly changing data. Think how much sensor data a complex
machine like an aircraft engine might generate in one day, and there’s no
theoretical limit to the number of sensors that could be feeding data into an IoT
system. What’s more, an IoT system is always on, providing continuous
connectivity and data feeds. IoT data flows can be immense as much as 40
tb/second. That's a lot of data to transport into the data center. It's best to
preprocess it.

Another reason not to pass the data on to the data center in this form is
that analog data has specific timing and structural characteristics that require
specialized software to process. It's best to convert the data into digital form first,
and that's what happens in stage 2. 

Intelligent gateways can build on additional, basic gateway functionality by adding


such capabilities as analytics, malware protection, and data management services.
These systems enable the analysis of data streams in real time.

So these systems are usually designed to be portable, easy to deploy, and rugged
enough to withstand variations in temperature, humidity, dust, and vibration.

11
Stage 3- Edge it

● Once IoT data has been digitized and aggregated, the data may require
further processing before it enters the data center.
● Edge it processing systems may be located in remote offices or other edge
locations, but generally these sit in the facility or location where the sensors
reside closer to the sensors, such as in a wiring closet.
● IoT data can easily eat up network bandwidth and swamp your data center
resources, it's best to have systems at the edge capable of performing
analytics as a way to lessen the burden on core IT infrastructure.
● For example, rather than passing on raw vibration data for the pumps, you
could aggregate and convert the data, analyze it, and send only projections
as to when each device will fail or need service.
Stage 4- Cloud Analytics
● Cloud based systems can analyze, manage, and securely store the data.
● In- depth analysis of the data provides deeper insight and helps the user to
take strategic decisions.
● Stage 4 processing may take place on-premises, in the cloud, or in a hybrid
cloud system, but the type of processing executed in this stage remains the
same, regardless of the platform.

7 Design principles for IOT

• Iot solutions consist of multiple elements: physical devices like sensors,


actuators and interactive devices, the network connecting these devices, the
data gathered from these devices and analyzed to create a meaningful
experience and last but definitely not least, the physical context in which
user interacts with the solution.
• Need to do various types of design, from industrial product design to service
and business design

1. Focus on value

• Find out where a problem lies truly worth solving and what the real end user
value of the solution is.

12
• Need to understand what might be the barriers of adopting the new
technology in general and your solution specifically.

2. Take a holistic view

• IoT solutions typically consist of multiple devices with different capabilities


and both physical and digital touch points.
• The solution may also be provided in co-operation with multiple different
service providers.
• Need to take a holistic look across the whole system, the role of each device
and service, and the conceptual model of how user understands and
perceives the system.

3. Put safety first

• Considering data security & privacy as key elements of the design.


• It is really important for users to feel, that their private data is safe, their
home, working environment and everyday objects cannot be hacked and
their loved ones are not put at risk.
• Security protocols should ensure safety of users using IoT.

4. Consider the context

• Commands given through digital interfaces may produce real world effects,
but unlike digital commands, the actions happening in the real-world cannot
necessarily be undone.
• In the real world context lots of unexpected things can happen and at the
same time user should be able to feel safe and in control. The context places
also other kind of requirements to the design.

5. Build a strong brand

• Trust should be a key element of the brand, one of the core brand values.
• When they feel connected to your brand, they will be more forgiving about
the system failures, which may occur at uncertain situations and will still
keep on using your solution.

13
6. Prototype early and often

• Hardware and Software have quite different lifespans, but as successful iot
solution needs both the hw and sw elements, the lifespans should be
aligned.
• IoT solutions are hard to upgrade, because once the connected object is
placed somewhere, it is not so easy to replace it with a newer version,
especially if the user would need to pay for the upgrade and even the
software within the connected object may be hard to update due to security
and privacy reasons.
• Design perspective is that prototyping and rapid iteration of both the h/w
and the whole solution are essential in the early stages of the project.

7. Use data responsibly

• IoT solutions can easily generate tons of data.


• Identify the data points that are needed to make the solution functional and
useful.
• The amount of data may be vast, so it’s necessary for the designer to
understand the possibilities of data science and how to make sense of the
data.
• Understanding what data is available and how it can be used to help the user
is a key element in designing successful iot services.

10 Internet of Things design considerations

Connecting products to the internet of things (IoT) is essential to manufacturers


looking to stay competitive within their industry. Adding IoT capabilities gives
consumers more features. It also allows the manufacturer to stay connected with
their customer while discovering new product use cases and applications that open
them up to new revenue streams. When designing your first IoT device, there are
10 things to keep in mind:

14
1. Cost “smart” or IoT products help consumers and manufacturers alike, but they
cost more. Both ethernet and wireless technologies have come down below $10, so
consider networking in your next product.

2. Network the network technology you chose for your IoT product has distance
and gateway/router issues. If you need to get to the internet then you need
ethernet/wi-fi; if you are self-contained in a room or building then zigbee, z-wave,
and bluetooth are available. Remember all wireless technologies need fcc
certification.

3. Features with an IoT connected product, companies can now add features to
their products that were not possible or imagined. These features can get you direct
access to the customer for updates, maintenance, and new revenue opportunities.

4. User interface how the user interfaces with a product is important. Are you
going to use buttons, leds, or a display on the product? Also what web and app
interfaces are you going to provide?

5. Power one of the first decisions should be the power source. If the device will
be powered by batteries then all design decisions must consider how to preserve
power. Many networking technologies will not be a good fit with battery power.
Frequency of communication does have an influence on power selection, too.

6. Size size matters. Consider how the network will impact the size of the device.
Connectors and antennas required by some networks will add to the size.

7. Antenna all wireless networks use an antenna, internal or external to the


product. The trend is to move the antenna inside the enclosure if it is plastic. All
metal enclosures would require external antennas.

8. Cloud cloud applications provide products a user interface to the product and
the data. There are private and public clouds. Most clouds have a standard API for
developing your application.

9. Interoperability does your product need to communicate with other vendors’


products? If so, then you need to adopt a standard set of protocols, such as apple’s
home-kit, to communicate with other products.
15
10. Security security is becoming a major issue, so you need to design in as many
layers of security as feasible. SSL and password are the minimum.

M2M and IoT Fundamentals

Difference between M2M and IoT:

M2M and IoT technology fundamentals

Devices and Gateways

• Small-scale embedded processers such as 8-, 16-, and 32-bit


microcontrollers with on-chip ram and flash memory, i/o capabilities, and
networking interfaces such as IEEE802.15.4 that are integrated on tiny
system-on-a-chip (soc) solutions.
• Device is a hardware unit that can sense aspects of its environment and/or
actuate, i.e. Perform tasks in its environment.

A device can be characterized as having several properties, including:

• Microcontroller: 8-, 16-, or 32-bit working memory and storage.

• Power source: fixed, battery, energy harvesting, or hybrid.


16
• Microcontroller: 8-, 16-, or 32-bit working memory and storage.

• Power source: fixed, battery, energy harvesting, or hybrid.

• Sensors and Actuators: onboard sensors and actuators, or circuitry that allows
them to be connected, sampled, conditioned, and controlled.

• Communication: cellular, wireless, or wired for LAN and WAN communication.

• Operating system (OS): main-loop, event-based, real-time, or full- featured OS.

• Applications: simple sensor sampling or more advanced applications.

• User interface: display, buttons, or other functions for user interaction.

• Device management (DM): provisioning, firmware, bootstrapping, and


monitoring.

● Execution environment (EE): application lifecycle management and application


program.

Types of Devices:

● Basic Devices: Devices that only provide the basic services of sensor
readings and/or actuation tasks and in some cases limited support for user
interaction. LAN communication is supported via wired or wireless
technology, thus a gateway is needed to provide the WAN connection.

E.g. Home Alarms: Such devices typically include motion detectors, magnetic
sensors, and smoke detectors. A central unit takes care of the application logic that
calls security and sounds an alarm if a sensor is activated when the alarm is armed.
The central unit also handles the WAN connection towards the alarm central.
These systems are currently often based on proprietary radio protocols.

● Advanced Devices: In this case the devices also host the application logic
and a WAN connection. They may also feature device management and an

17
execution environment for hosting multiple applications. Gateway devices
are most likely to fall into this category.
● E.g. Onboard units in cars that perform remote monitoring and
configuration over a cellular connection.
● E.g. Robots and autonomous vehicles such as unmanned aerial vehicles
that can work both autonomously or by remote control using a cellular
connection.

Smart Device Architecture

• Gateways serves as a translator between different protocols, e.g. between


IEEE 802.15.4 or IEEE 802.11, to Ethernet or cellular.
• Gateways serve as an entry and exit point for a network as all data must
pass through or communicate with the gateway prior to being routed.

Device management (DM) is an essential part of the IoT and provides efficient
means to perform many of the management tasks for devices:
• Provisioning: Initialization (or activation) of devices in regards to
configuration and features to be enabled.
• Device Configuration: Management of device settings and parameters.

18
• Software Upgrades: Installation of firmware, system software, and
applications on the device.
• Fault Management: Enables error reporting and access to device status.

Networking
• Connecting two or more smart devices together over an communication
medium (Wired / Wireless )
• Networking devices like routers and gateways helps us to connect smaller
networks with different protocols together.
• Categories of network- LAN, WAN and MAN

Internet Vs IoT Protocols

• IoT Protocols which enable communication between smart devices and


works in various layers of network are as follows:

IoT Datalink protocols


• IEEE 802.15.4e

19
• IEEE 802.11ah
• WirelessHART
• Z- Wave
• Zigbee
• Bluetooth low energy
• LoRaWAN

Network Layer routing protocols:


• RPL- Routing Protocol for Low Power networks
• CORPL- Cognitive Radio enabled AMI networks
• CARP –Common Address Redundancy Protocol
Network layer encapsulation protocols:
• 6LoWPAN-IPv6 Over WPAN
• IPv6 Over Bluetooth low energy
• 6TiSCH- IPv6 Over Time Slotted Channel Hoping

Transport Layer Protocols:


• UDP – User Datagram Protocol

Session Layer Protocols:


• MQTT- Message Queuing Telemetry Transport
• SMQTT- Secure MQTT
• AMQP- Advanced Message Queuing Protocol
• CoAP- Constraint Application Protocol
• XMPP- Extensible Messaging and Presence Protocol
• DDS- Data Distribution Service

20
Knowledge Management

Knowledge Triangle

Characteristics of data include:

• Big Data: Huge amounts of data are generated, capturing detailed aspects of the
processes where devices are involved.
• Heterogeneous Data: The data is produced by a huge variety of devices and is
itself highly heterogeneous, differing on sampling rate, quality of captured values,
etc.
• Real-World Data: The overwhelming majority of the data relates to real-world
processes and is dependent on the environment they interact with.
• Real-Time Data: M2M data is generated in real-time and overwhelmingly can
be communicated also in a very timely manner. The latter is of pivotal importance
since many times their business value depends on the real-time processing of the
info they convey.
• Temporal Data: The overwhelming majority of data is of temporal nature,
measuring the environment over time.
• Spatial Data: Increasingly, the data generated by M2M interactions are not only
captured by mobile devices, but also coupled to interactions in specific
locations, and their assessment may dynamically vary depending on the location.

21
• Polymorphic Data: The data acquired and used by M2M processes may be
complex and involve various data, which can also obtain different meanings
depending on the semantics applied and the process they participate in.
• Proprietary Data: Up to now, due to monolithic application development, a
significant amount of M2M data is stored and captured in proprietary formats.
However, increasingly due to the interactions with heterogeneous devices and
stakeholders, open approaches for data storage and exchange are used.
• Security and Privacy Data Aspects: Due to the detailed capturing of
interactions by M2M, analysis of the obtained data has a high risk of leaking
private information and usage patterns, as well as compromising security.

Knowledge Management Activities

• Data generation- Huge volume of data generated by heterogeneous and


distributed data sources, including sensors, video, click streams and other
available digital sources.
• Data acquisition- Data collection process which acquires raw data from the
production environment including sensors, video cameras and other smart
devices.
• Data validation- Data gathered is preprocessed to reduce errors and converted to
common format. Redundant data is eliminated by using data compression
techniques.
• Data storage- Validated data is then stored in the Datawarehouse. (Warehouse to
store large amount of historical data)
• Data processing- The process of extracting useful information from the stored
data using datamining techniques and various data analytics tools which in turn
used to take strategic business decisions.

Business Processes in IoT


• Business processes is a sequence of steps performed by a group of
stakeholders to achieve a concrete business goal.
• Occurs at all organizational levels and may or may not visible to customers
• They improve customer satisfaction and improved agility for reacting to
rapid market change.

22
• Business processes include management, operational and supporting, all
aiming at achieving a business goal.
• BPMN- graphically represents business processes in business model.
• Business processes rely on interaction with real world processes in order to
take business critical decisions.
• The system interacts with the real world in two ways
i) Manual sensing- Data fed into the system- manually by humans
ii) Automated sensing- information exchange done automatically between
devices and processes without human intervention.
• In olden days traditional web services were used for interaction
• Now, with the help of SOA ready devices- devices which offers
functionalities as web services interaction the devices the exchange of data
between business process and device is simplified.
• IoT integration with business processes have simplified the task of acquiring
data, analyzing and helps in taking critical business decisions quickly and
accurately.

• Enterprise services communicate over cloud and exchange data from smart
devices.
• Directly the devices may interact with the business processes
• Sometimes, middleware technology is used for exchange of information.

23
• SOA and Cloud technology improved customer satisfaction by providing
solution in real time without delay.

XaaS (Everything as a Service)

• Cloud computing is a model for enabling convenient, on-demand network


access to a shared pool of configurable computing resources (e.g., networks,
servers, storage, applications, and services)
• It can be rapidly provisioned and released with minimal management effort.
• It provides high level abstraction of computation and storage model.
• It has some essential characteristics, service models, and deployment
models.

Characteristics:

• On-Demand Self Service:


• A consumer can unilaterally provision computing capabilities,
automatically without requiring human interaction with each service’s
provider.
• Heterogeneous Access:

24
• Capabilities are available over the network and accessed through
standard mechanisms that promote use by heterogeneous thin or thick
client platforms.
• Resource Pooling:
• The provider’s computing resources are pooled to serve multiple
consumers using a multi-tenant model.
• Different physical and virtual resources dynamically assigned and
reassigned according to consumer demand.
• Measured Service:
• Cloud systems automatically control and optimize resources used by
leveraging a metering capability at some level of abstraction
appropriate to the type of service.
• It will provide analyzable and predictable computing platform.

Service Models

• Cloud Software as a Service (SaaS):


• The capability provided to the consumer is to use the provider’s
applications running on a cloud infrastructure.
• The applications are accessible from various client devices such as a
web browser (e.g., web-based email).
• The consumer does not manage or control the underlying cloud
infrastructure including network, servers, operating systems, storage.
• Examples: Caspio, Google Apps, Salesforce, Nivio, Learn.com

• Cloud Platform as a Service (PaaS):


– The capability provided to the consumer is to deploy onto the cloud
infrastructure consumer-created or acquired applications created
using programming languages and tools supported by the provider.
– The consumer does not manage or control the underlying cloud
infrastructure.
– Consumer has control over the deployed applications and possibly
application hosting environment configurations.
Examples: Windows Azure, Google App.
25
• Cloud Infrastructure as a Service (IaaS):
– The capability provided to the consumer is to provision processing,
storage, networks, and other fundamental computing resources.
– The consumer is able to deploy and run arbitrary software, which can
include operating systems and applications.
– The consumer does not manage or control the underlying cloud
infrastructure but has control over operating systems, storage,
deployed applications, and possibly limited control of select
networking components (e.g., host firewalls).
– Examples: Amazon EC2, GoGrid, iland, Rackspace Cloud Servers,
ReliaCloud.

Deployment Models

Private Cloud:
– The cloud is operated solely for an organization. It may be managed
by the organization or a third party and may exist on premise or off
premise.

Community Cloud:
– The cloud infrastructure is shared by several organizations and
supports a specific community that has shared concerns.
– It may be managed by the organizations or a third party and may exist
on premise or off premise.
26
Public Cloud:
– The cloud infrastructure is made available to the general public or a
large industry group and it is owned by an organization selling cloud
services.

Hybrid cloud:
– The cloud infrastructure is a composition of two or more clouds
(private, community, or public).

Advantages of Cloud Computing

– Cloud computing do not need high quality equipment for user, and
it is very easy to use.
– Provides dependable and secure data storage center.
– Reduce run time and response time.
– Cloud is a large resource pool that you can buy on-demand service.
– Scale of cloud can extend dynamically providing nearly infinite
possibility for users to use internet.

27

You might also like