Unit - IV
Unit - IV
• ThingSpeak-
This is also another platform which will also help the developer in
visualizing as well as analyzing the data in MATLAB and eliminating
the need for buying a license for it. It also helps in collecting and
storing the sensor data in channels which are basically private.
However, the storing may be private but you have the freedom of
sharing them in public. It works with particle photon and electron,
Arduino, and many other applications. There is also a worldwide
community for this platform which acts as a helpful thing for the
developers who are joining new.
• DeviceHive-
This is also an open-source platform for IoT solution
development. The distribution of this platform is under the
Apache version 2.0. The platform is free to change as well
as use. Deployment of Kubernetes and Docker is also
provided along with both downloading and using it with
both private and public clouds. Running of batch analytics is
possible through this platform and machine learning is also
possible. DeviceHive is special and preferred by developers
as this IoT platform is having many libraries including iOS
and Android libraries.
• Eclipse Kura-
The building of this platform took place around OSGI or
Java which is based on the Kura API container. Eurotech’s
everywhere cloud framework is the main source for
developing the Kura framework. This Kura framework is
often having integration with the Apache Camel. Some of
the important sub-projects are the Eclipse SmartHome
framework and PAho messaging protocol framework.
• OpenHAB -
2 2 2 2
8 Bit Code
P hy sical S y stem Noisy S ignal F iltered S ignal D igitalized S ignal
1.5 1.5 1.5 1.5 0 1 1 1
0 0 0 1
1 1 1 1
0 1 1 1
1 0 1 1
Measured Value
Measured Value
Measured Value
Discrete Value
1 1 0 0
0 0 0 0
1 1 1 1
-0.5 -0.5 -0.5 -0.5 0 1 1 0
1 0 1 0
-1 -1 -1 -1
1 1 1 0
-1.5 -1.5 -1.5 -1.5 1 1 1 1
0 1 1 1
-2 -2 -2 -2
0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 5 10 15 20 25 30 1 1 1 0
10
Seconds 10
Seconds 10
Seconds Sample Number
1 1 1 1
0 0 1 1
1 0 1 1
0
1 1 1 0
-0.5 0 0 0 1
1 1 1 1
-1
1 0 1 1
-1.5 0 0 1 0
0 0 1 1
-2
0 5 10 15 20 25 30 1 1 1 1
Sample Number 1 0 0 1
1 1 0 1
Digitalized Signal 1 1 1 0
https://en.wikipedia.org/wiki/Data_acquisition 3
Remote Data
Acquisition
• Traditional, wired sensors
Remote
monitoring
Data loggers
Local
monitoring
2
Remote Data
Acquisition
• Wireless sensors
• Sensors communicate with data logger via radio links
Network
sensor field
Remote
radio link monitoring
3
Remote Data
Acquisition
• Wireless Sensor Networks – WSN
• Sensor nodes deployed and forming an ad hoc network
◦ Requires no hubs, access points
◦ Instantly deployable
Sensor node
Sensor network
Gateway Network
• Targeted applications
◦ Emergency responses
◦ Hazardous area monitor
Remote
monitoring
3
Internet of Things
(IoT)
http://www.opinno.com/en/content/internet-things-0 7
IoT Reference
Model
https://insightaas.com/new-iot-reference-model-creates-common-tongue/ 8
SCADA
System
• Supervisory Control And Data Acquisition
• Mostly used in industrial, since 1960s
https://en.wikipedia.org/wiki/SCADA 9
IIoT and Industry
4.0
• IIoT – Industrial Internet of Things
Industry 4.0
cyber-physical system
https://www.i-scoop.eu/internet-of-things-guide/industrial-internet-things-iiot-saving-costs-innovation/industrial-internet-things-iiot/ 10
DAQ/IoT Hardware
Platforms
• Various communication protocols: BLE, Wi-Fi, LoRa
IEEE802.15.4, etc.
Adafruit’s Feather M0+LoRa
Raspberry Pi
ESP32 WiFi/BLE module
https://www.adafruit.com/product/3178
https://docs.espressif.com/projects/esp-idf/en/release-v3.3/hw-reference/modules-and-boards.html
https://www.raspberrypi.org
and many more…
36
DAQ Application
Examples
• Agriculture
◦ Smart/precision farming
• Civil engineering
◦ Structural response
◦ Disaster management Image by Sarah Clarry from Pixabay
• Environmental sciences
◦ Habitat monitoring
• Factory monitor and control
37
DAQ Design
Consideration
• Internet access vs. no access
• Wired vs. wireless connectivity
• Short-range vs. long-range communication
• Single-hop vs. multi-hop data transfer
• Main vs. battery power
• Real-time vs. non real-time data
http://clipart-library.com 13
Human Data
Sources
• Questionnaires
• Social sensing
◦ Analyzing hashtags
◦ Text mining
14
Data
Integration
• Data transformation
• Data storage
• Data administration
• Data visualization
http://clipart-library.com 15
Real-Life
Projects
• Growth chamber monitoring
• Cattle tracking
• Telemetry system at Yom River
• Landslide monitoring in Krabi
41
Growth Chamber
Monitoring
• Monitors temperature and humidity in a chamber for
tissue culture
sensor node
sensor
node
42
Growth Chamber
Monitoring
43
Cattle
Tracking
• Tracks and records cattle movements with GPS receiver
19
44
Cattle Tracking: Power Management
https://www.cpe.ku.ac.th/~cpj/cattrack/kps.2018-06-11.html
20
45
Yom River
Telemetry
• Collaborating with Royal Irrigation Department (RID),
supported by JICA/JST
• Problem: no cellular coverage at
a telemetry station along
the Yom River in Phrae Province
46
Yom River Telemetry:
Design
47
Landslide
Monitor
• Collaborate with Geotechnical Engineering Research and
Development Center (GERD), supported by JICA/JST
• Two purposes
◦ Provide real-time alert and early warning for the villagers
◦ Provide field data for researchers
48
Khao Phanom, Krabi Province, Southern Thailand
Landslide Monitor: System
Overview
KU
Internet
sensor
nodes
Debris flow
detector
Gateway
Village Head
Rain gauge
51
Landslide Monitor: Relay
Nodes
52
Landslide Monitor: Relay
Network
• IEEE 802.15.4 @2.4GHz
Gateway
Sensor Node
53
Landslide Monitor: Long-Range Link
• IEEE 802.11 (Wi-Fi) @5GHz
Gateway
@Foothill
~4km
Village Head
54
Landslide Monitor: Warning
Report Accumulation
Condition Risk Level
Period
< 100 mm. Low
1 day
≥ 100 mm. High
< 300 mm. Low
3 days
≥ 300 mm. High
55
Landslide Monitor:
Deployment
56
Demonstration:
MQTT
• Install MQTT software on your mobile devices
MyMQTT (for Android) MQTTool (for iOS)
57
Content-Centric Networking Model
Internet
58
What is Unstructured Data?
• Primarily, unstructured data storage is all the data that doesn’t fall under the
horizon of relational databases.
• The data here is not structured using predefined data models. Still, it
upholds an internal structure that may be textual or non-textual, generated
by humans or machines. It gets stored within non-relational databases such
as NoSQL.
• Unstructured data can be anything from social media posts, images, audio
files, sensor data, text data, and many different data types. The term
unstructured highlights the fact that large datasets aren’t in a defined
structure layout.
• At first glance, unstructured data is a possible storage headache, but it
provides a valuable source of intelligence and insight.
• This article will underline unstructured data storage and the cloud services
and structures that exist to ensure it works effectively in the Cloud, including
NAS and object storage.
How Does Unstructured Data Storage Work?
• Unstructured data has seen tremendous exponential growth
because of the ongoing technological advancements driving
eCommerce, cloud migration of businesses, and social media
activities.
• Also, excessive growth means that data storage has to get
redefined
• Regarding data size and format, unstructured data comprises
everything, including IoT, remote system monitoring, and data
to video and Images. File sizes can range from a few bytes to
many gigabytes plus.
Cloud Storage of Unstructured Data
• The Cloud provides high-performance, scalable storage infrastructure
services to customers. There is increasing demand for such flexible
services.
• Hence providers and pioneers of cloud innovations offer their infrastructure
on a subscription basis or as open-source software to reduce the overall
financial burden on business organizations.
• Unstructured data pretty much includes every kind of information. The file
sizes range from a few bits and bytes to gigabytes or more.
• But there is no uniform approach regarding data storage.
• The type of storage used to store collected data depends on the computing
capacity and the preset thresholds for input and output, including
everything from low-performance cloud instances to high-performing,
distributed files.
Network Attached Storage
• Before, Network-Attached Storage (NAS) was just
associated with single file, siloed data storage.
• Nowadays,scale-out NAS can handle big data and high-
capacity data storage.NAS scaling has elevated file storage
access into realms of higher performance and capacity.
• Scale-out NAS has a parallel file system that provides a
namespace across multiple attached storage boxes to
scale billions of file data. You can add computing capacity
and processing power in some cases.
Object Storage
• Object storage is the more recent development of unstructured data storage that
keeps data in a flat format.
• You can access the data using unique identification models with metadata headers
that enable search and analysis. The service grew in popularity after providing an
effective solution to the shortfalls of scale-out NAS.
• Object storage is arguably the native format of the Cloud, too. It is hugely scalable
and accessible via application programming interfaces (APIs), which fits well with
the DevOps way of doing things.
• Object storage falls short of file locking, and it recently improved in terms of
performance.
• The big cloud service companies have their primary storage offerings built on
object storage. They offer different service tiers also, to cater to many business
cases. For instance, Amazon web services provide various courses of S3 storage
with variations determined by accessibility, speed, and the reproducibility of the
data.
Unstructured Data vs. Structured Data
• Unstructured data is data not managed using a transactional
system.
• These include data not stored in a relational database
management system. Otherwise, structured data comprises
records and transactions within a database environment, for
instance, the rows in an SQL database.
• Both structured and unstructured data storage tools allow users
to access information. Just unstructured data comes in
significantly larger quantities than structured data.
The Challenges of Working with Unstructured Data
• The three leading cloud providers offer core object storage services
for data lake storage use.
• For instance, Microsoft provides a targeted service, Azure Data Lake,
to handle unstructured data.
• The primary benefits here include the expandable capacity provided
as a means of transferring using different gateways.
IoT Authentication
• IoT (Internet of Things) Authentication refers to ways to securely
and conveniently access connected devices such as smart homes,
autos, transportation hubs, and workplaces.
• The smart device ecosystem is highly fragmented, having not yet
settled on a standard for what hardware, software, and
communications protocols are the dominant means to access
devices.
• Enterprises may use RFID badges for secure entryways, while
homeowners may use proprietary apps for autos and thermostats.
• This fragmentation causes poor usability — UX being paramount
to the success of the IoT and digital transformation — and higher
risk, as system fragmentation and varied settings are unsafe.
• In all, today’s IoT security is lightweight compared to enterprise
application security, and the IoT’s aggressive rollout despite this
has created a situation where IoT authentication must catch up.
IoT Authentication
• IoT authentication would benefit from a single
standard onto which all device makers and solution
providers deploy their technology.
• One solution is to settle on a single user interface (UI)
such as consumer mobile devices and to authenticate
based on FIDO Alliance open standards for True
Keyless Authentication. This would reduce the
fragmentation and an over-reliance on passwords,
whose use as an authentication mechanism hinders IoT
adoption by degrading usability.
• Whose security is not in step with the security demands
of workplaces, homes, cars, transportation hubs, and
critical infrastructure?
Example
• “IoT authentication is important since the security of
devices, autos, and workplaces is paramount.
• The risk of unauthorized management of these smart
things is too great to cede that security to passwords,
whose poor usability has not kept pace with the IoT just
as they haven’t kept pace with mobile.
IoT Authorization
• The Internet of Things (IoT) is not just a
single technology, but a connected
environment of various machines (“things”)
that work together independently – without
human interaction.
• The authorization process is the tool used to
validate the identity of each endpoint in the
IoT system.
• The certification process is
configured upon enrollment entry and informs
the service provider of the method to be used
when checking the system’s identity during
registration.