0% found this document useful (0 votes)
82 views43 pages

Unit 5 IoT

The document discusses several topics related to industrial and smart home automation using sensors and IoT. It describes using sensors like gas, fire, temperature and humidity sensors to monitor industrial parameters and trigger alerts. It also discusses using similar sensors for smart agriculture and home automation applications to remotely control appliances.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
82 views43 pages

Unit 5 IoT

The document discusses several topics related to industrial and smart home automation using sensors and IoT. It describes using sensors like gas, fire, temperature and humidity sensors to monitor industrial parameters and trigger alerts. It also discusses using similar sensors for smart agriculture and home automation applications to remotely control appliances.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 43

Industrial automation:

Now a days, the industries require more manual power to monitor and control the parameters
in industries like temperature, fire, gas, etc. with the help of single microcontroller and LCD
displays. To sense the various parameters the different sensors are aroused in the industry. Here
there is no sensing devices in the industry at the time of emergency, it leads to a harmful
situation, so, in this project different sensors and alert systems is used under the concept of
automation control which is reduce the high manpower necessity, so in this automation method
all parameters are sensed by the microcontroller. The issue is displayed on the LCD and
immediately the voice alert is coming from the speakers for the inside workers alerting purpose.
The light
Indication is for surrounding people alerting
The main aim of this project is to reduce the industrial deaths and avoid the human effort. The
main theme of the project using domain of embedded systems technology that includes IOT in
the industries by using different sensors like gas, fire, mems, temperature and humidity sensors
to monitor the various parameters. Here relay acts as a kill switch which is activated when
things go out of hands. Here voice module, light indication is for the workers and surrounding
people alerting and take precautions accordingly along with this we are using Blynk software
for live monitoring purpose
IMPLEMENTATION
Here the different sensors like fire, gas, mems, and temperature & humidity sensors are used
for detect the slight changes in the industries. All the sensors are interfaced through the Arduino
Atmega 328. If any sensor detects the faults the then immediately the power supply turned off
by the relay. Here relay acts as kill switch whenever things go out of hands its automatically
turns off the power supply. Here relay acts as kill switch whenever things go out of hands its
automatically turns off the power supply and voice alert is coming from the speaker and buzzer
will activated and along with this the GSM is used for sending the messages to the the higher
authorities to take approximate measures. For the surrounding peoples the light is placed on
top of the industry is turned on which is visible to the surrounding people. This all parameters
is live monitored and stored in the blynk software from both pc and mobile. Blynk allows us
to create applications and then use it to control Arduino board connected to a PC with internet
access, from anywhere in the world, (for instance, controlled, servos, receive data etc.), with a
smartphone and a website world, (for instance, controlled, servos, receive data etc.), with a
smart phone and a website.
Basically, Blynk are two types
1.Web dashboard
2.Mobile dashboard
In this project all the sensors is interfaced to the Arduino board when any faults is occurred like
any gas leakage or fire detection is happened then its respective sensor is detect that, and it’s
displayed on the LCD and immediately the power supply and motor is turned off by the relay
switch. The speaker and buzzer is the alerting system which is used to both inside industry
workers and nearby peoples. The GSM module for sending messages to officials. This all
operations are done simultaneously. After sometime the motor and power supply come to
normal condition
GSM module: A GSM module is a device that allows electronic devices to communicate with
each other over the GSM network. GSM is a standard for digital cellular communications,
which means that it provides a platform for mobile devices to communicate with each other
wirelessly.
Flame Sensor A flame-sensor is one kind of detector which is mainly designed for detecting
as well as responding to the occurrence of a fire or flame. The flame detection response can
depend on its fitting. It includes an alarm system, a natural gas line, propane & a fire
suppression system. This sensor is used in industrial boilers. The main function of this is to
give authentication whether the boiler is properly working or not. The response of these sensors
is faster as well as more accurate compare with a heat/smoke detector because of its mechanism
while detecting the flame.

MQ6 Gas sensor is a Metal Oxide Semiconductor (MOS) type Gas Sensor mainly used to
detect the LPG and Butane gas concentration in the air either at home or in industry.
The DHT-11 Digital Temperature And Humidity Sensor is a basic, ultra low-cost digital
temperature and humidity sensor. It uses a capacitive humidity sensor and a thermistor to
measure the surrounding air and spits out a digital signal on the data pin (no analog input pins
needed).
MEMS Sensor MEMS are low-cost, and high accuracy inertial sensors and these are used to
serve an extensive range of industrial applications. This sensor uses a chip-based technology
namely micro-electro-mechanical-system. These sensors are used to detect as well as measure
the external stimulus like pressure, after that it responds to the pressure which is measured
pressure with the help of some mechanical actions. The best examples of this mainly include
revolving of a motor for compensating the pressure change.
Smart agriculture:

Agriculture is done in every country from ages. Agriculture is the science and art of cultivating
plants. Agriculture was the key development in the rise of sedentary human civilization.
Agriculture is done manually from ages. As the world is trending into new technologies and
implementations it is a necessary goal to trend up with agriculture also. IOT plays a very
important role in smart agriculture. IOT sensors are capable of providing information about
agriculture fields. we have proposed an IOT and smart agriculture system using automation.
This IOT based Agriculture monitoring system makes use of wireless sensor networks that
collects data from different sensors deployed at various nodes and sends it through the wireless
protocol. This smart agriculture using IOT system is powered by Arduino, it consists of
Temperature sensor, Moisture sensor, water level sensor, DC motor and GPRS module. When
the IOT based agriculture monitoring system starts it checks the water level, humidity and
moisture level. It sends SMS alert on the phone about the levels. Sensors sense the level of
water if it goes down, it automatically starts the water pump. If the temperature goes above the
level, fan starts. This all is displayed on the LCD display module. This all is also seen in IOT
where it shows information of Humidity, Moisture and water level with date and time, based
on per minute. Temperature can be set on a particular level; it is based on the type crops
cultivated. If we want to close the water forcefully on IOT there is button given from where
water pump can be forcefully stopped.
A temperature sensor is a device that detects and measures hotness and coolness and converts
it into an electrical signal.
Water level sensor the water level sensor is a device that measures the liquid level in a fixed
container that is too high or too low. According to the method of measuring the liquid level, it
can be divided into two types: contact type and non-contact type. The input type water level
transmitter we call is a contact measurement, which converts the height of the liquid level
into an electrical signal for output. It is currently a widely used water level transmitter.
Soil Moisture Sensor The soil moisture sensor is one kind of sensor used to gauge the
volumetric content of water within the soil. As the straight gravimetric dimension of soil
moisture needs eliminating, drying, as well as sample weighting. These sensors measure the
volumetric water content not directly with the help of some other rules of soil like dielectric
constant, electrical resistance, otherwise interaction with neutrons, and replacement of the
moisture content.

The relation among the calculated property as well as moisture of soil should be
adjusted & may change based on ecological factors like temperature, type of soil, otherwise
electric conductivity. The microwave emission which is reflected can be influenced by the
moisture of soil as well as mainly used in agriculture and remote sensing within hydrology.
Smart Home automation:
The objective of this project is to implement a very low cost, reliable and scalable home
automation system which will be used for remotely switching on or off any home appliance,
using a microcontroller to achieve hardware simplicity low cost built-in wifi module at the
receiver end while on the transmitter end, a GUI application on the cell phone sends ON/OFF
commands at the receiver end where loads are connected.
As technology is advancing so houses also are getting smarter. Modern houses are
gradually shifting from conventional switches to centralized system, involving remote
controlled switches. Presently, conventional wall switches located in several parts of
the house makes it difficult for the user to travel near them to work. Even more it
becomes harder for the elderly or physically handicapped people to try to do so.
Remote controlled home automation system provides a latest solution with smart
phones.
This project uses the Cloud and a Web Browser to control the manually operated switches. A
cloud server is created for the environment where the switches are mounted. The switches are
interfaced with Node MCU which has an inbuilt Wi-Fi. It can use this to enable or disable the
switches. The user communicates with the processor through the Web Browser. The processor
then controls the switches based on the commands received from the user and also updates the
user about the status of the switches after the control operation is performed to the cloud.

The heart of this project is the WiFi enabled board that needs no introduction; the
ESP8266 based Node MCU development board. It is an open-source platform for
developing WiFi based embedded systems and it is based on the popular ESP8266 WiFi
Module, running the Lua based Node MCU firmware. Node MCU was born out of the desire
to overcome the limitations associated with the first versions of the ESP8266 module which
was not compatible with breadboards, it was difficult to power and even more difficult to
program. The Node MCU board is easy to use, low cost and that quickly endeared it to the
heart of makers and it is one of the most popular boards today. For this project, we will add a
4-channel relay module to the ESP8266 board. The project flow involves the control of Node
MCU’s GPIOs from a webpage on any device connected on the same network as the board.
The status of the GPIOs control the coils of the relays and that causes the relay to alternate
between normally open (NO) and normally closed (NC) condition depending on the state of
the GPIO, thus, effectively turning the connected appliance “ON” or “OFF”.
Smart healthcare
Healthcare monitoring system in hospitals and many other health centres has experienced
significant growth, and portable healthcare monitoring systems with emerging technologies are
becoming of great concern to many countries worldwide nowadays. The advent of Internet of
Things (IoT) technologies facilitates the progress of healthcare from face-to-face consulting to
telemedicine. This paper proposes a smart healthcare system in IoT environment that can
monitor a patient’s basic health signs as well as the room condition where the patients are now
in real-time. In this system, five sensors are used to capture the data from hospital environment
named heart beat sensor, body temperature sensor, room temperature sensor, CO sensor, and
CO2 sensor. The error percentage of the developed scheme is within a certain limit (<5%) for
each case. The condition of the patients is conveyed via a portal to medical staff, where they
can process and analyse the current situation of the patients. The developed prototype is well
suited for healthcare monitoring that is proved by the effectiveness of the system.
Health is characterized as a full state of physical, mental, and social well-being and not merely
a lack of illness. Health is a fundamental element of people’s need for a better life.
Unfortunately, the global health problem has created a dilemma because of certain factors, such
as poor health services, the presence of large gaps between rural and urban areas, physicians,
and nurses’ unavailability during the hardest time.

ESP32Processor:
ESP32 is one of the main IoT learning tools. This offers a full Linux system on a small platform
at a very low price. ESP32 connects device sensors and actuators through GPIO pins. ESP32
and IoT merge to be a new technology for creativity in the healthcare system. ESP32 is
designed extremely with integrated antenna switches, RF-balun, control amplification, low-
noise amplifier, and filters as well as power management modules. It can function as a complete
stand-alone scheme or as a slave to a host MCU, decreasing overhead interaction within the
main application processor. EPS32 can communicate with other Wi-Fi and Bluetooth devices
via its SPI/SDIO, or I2C/UART interfaces
Heart Beat Sensor
The heartbeat sensor is developed based on the plethysmography theory. It measures the
change in blood volume through anybody’s organ that causes the light intensity to move
through that organ.
Body Temperature Sensor (LM35)
The LM35 series are accurate optimized temperature circuits with output voltage, which is
linearly relative to the temperature in centigrade.
Room Temperature Sensor (DHT11)
DHT11 is a sensor for temperature and humidity which is commonly used
CO Sensor (MQ-9)
MQ-9 is appropriate for LPG, CO, and CH4 detection. Owing to its high sensitivity and fast
response time, measurements can be taken fastly.
CO2 Sensor (MQ-135)
For air quality control systems, the MQ-135 gas sensors are used for NH3, Nicotine,
Benzene, Smoke, and CO2 detections well as measurement
Smart Transportation:
Smart Vehicle Assistance and Monitoring system (SVAMS). SVAMS is an intelligent
transportation system (ITS), developed to tackle various traffic related issues. It is a traffic
management, monitoring and optimization solution in which all the vehicles are interconnected
through Zigbee and are monitored and assisted centrally, by a data centre. The system has two
parts; one part is mounted in/on the vehicle and the other part is at the data centre. Part, one
collects data from various sensors and transmits it to central data centre. All the data will be
stored on cloud for further analysis, processing and future use. SVAMS is relatively low-cost,
compact and has various functionalities such as emergency response, pollution level
monitoring, automatic toll collection, traffic rule violation detection, vehicle tracking, etc. The
use of SVAMS will help to build up Clean, Corruption free and Crime free (C-3) cities.
The rapid urbanization of cities in developing countries like India has resulted in a sharp rise
in the number of vehicles on roads in recent years. As a consequence of which, there is an
alarming raise of negative externality such as sever road congestion, air pollution, frequent
road accident etc. which puts huge stress on the transportation system. Due to lack of adequate
communication between vehicles themselves and vehicle–to–infrastructure there are lots of
challenges in conventional traffic management solutions. The advancements in wireless
communication and Internet capabilities have encouraged the development of ITS for
improving traffic flow and safety. The latest developments in communication technology are
one of the key factors for the effectiveness of ITS. The use of effective communication can
help reduce congestion and gas emissions to a minimum level and it can also significantly
improve the safety. However, in recent years, the Internet of Things (IoT) together with the
concept of the Vehicular Ad-hoc Networks (VANETs) has motivated researchers to rethink and
redevelop ITS.

The SVAM system perform following functions:


Accident detection using Gyro meter, air pollution monitoring using MQ135, automatic toll collection using IR
transceiver, detect rule violation using IR transceiver, location Tracking using GPS, centralized and easily
accessible vehicle database using cloud, safe distance alert using ultrasonic distance sensor
Vehicle Module

ZigBee Box
ZigBee box is designed to collect data from various sensors and from GPS box through i2c and transmit it to
other vehicles or data centre. This box contains ZigBee, Atmega328p-pu, Antenna, Bluetooth HC-05 and Buck
convertor PTN76060WAS. IR trans receiver is mounted on top for communication with collection box for
automatic toll collection and traffic rule violation detection. ZigBee has 10km line of sight range.

GPS box
GPS box is another circuit (box) in vehicle, which is connected to ZigBee box through wire as both are in
vehicle. This box has components like GPS module, Serial LCD, two Atmega328 p-pu and MPU 6050.

Data Center Module


Data center module has a data center box and a computer/laptop with a software

Data Center Box


Data centre box is circuit at Data centre to get data from vehicle via ZigBee and data from Cloud via Wi-Fi. Fig.
5 shows diagram of data centre box. Devices used in the Data centre box are ZigBee, Wi-Fi module- Node
MCU, Bluetooth Module. Bluetooth module and the ZigBee are connected to one Node MCU via two separate
UART ports.
CollectionBox
This box is designed for two functions; automatic toll collection and rule violation amount
collection. There is a button to switch between these functions. In toll plaza, this box is mounted
at a height of 10m. This box has IR transmitter and IR receiver (TSOP). IR transmitter transmits
its ID continuously. When it is received by IR receiver of vehicle passing underneath it, IR
transmitter of vehicle sends vehicle number which is received by TSOP of collection box. Wi-
Fi module of collection box gets the account details of that vehicle from cloud and collects the
toll amount from that account.
For rule violation amount collection this box is mounted on traffic signal. It works in similar
fashion as the box at toll plaza only difference is that it starts sending its ID only when the
traffic signal is red to catch the vehicle, violating traffic rule. When signal is yellow or green,
transmitter does not transmit signal.
Introduction to Cloud Computing
Cloud Computing is the delivery of computing services such as servers, storage, databases,
networking, software, analytics, intelligence, and more, over the Cloud (Internet).

Cloud Computing provides an alternative to the on-premises datacentre. With an on-premises


datacentre, we have to manage everything, such as purchasing and installing hardware,
virtualization, installing the operating system, and any other required applications, setting up
the network, configuring the firewall, and setting up storage for data. After doing all the set-
up, we become responsible for maintaining it through its entire lifecycle.

But if we choose Cloud Computing, a cloud vendor is responsible for the hardware purchase
and maintenance. They also provide a wide variety of software and platform as a service. We
can take any required services on rent. The cloud computing services will be charged based on
usage.

The cloud environment provides an easily accessible online portal that makes handy for the
user to manage the compute, storage, network, and application resources. Some cloud service
providers are in the following figure.
Advantages of cloud computing

o Cost: It reduces the huge capital costs of buying hardware and software.
o Speed: Resources can be accessed in minutes, typically within a few clicks.
o Scalability: We can increase or decrease the requirement of resources according to the
business requirements.
o Productivity: While using cloud computing, we put less operational effort. We do not
need to apply patching, as well as no need to maintain hardware and software. So, in
this way, the IT team can be more productive and focus on achieving business goals.
o Reliability: Backup and recovery of data are less expensive and very fast for business
continuity.
o Security: Many cloud vendors offer a broad set of policies, technologies, and controls
that strengthen our data security.

Types of Cloud Computing


o Public Cloud: The cloud resources that are owned and operated by a third-party cloud
service provider are termed as public clouds. It delivers computing resources such as
servers, software, and storage over the internet
o Private Cloud: The cloud computing resources that are exclusively used inside a single
business or organization are termed as a private cloud. A private cloud may physically
be located on the company’s on-site datacentre or hosted by a third-party service
provider.
o Hybrid Cloud: It is the combination of public and private clouds, which is bounded
together by technology that allows data applications to be shared between them. Hybrid
cloud provides flexibility and more deployment options to the business.

A Types of Cloud Services

1. Infrastructure as a Service (IaaS): In IaaS, we can rent IT infrastructures like servers


and virtual machines (VMs), storage, networks, operating systems from a cloud service
vendor. We can create VM running Windows or Linux and install anything we want on
it. Using IaaS, we don’t need to care about the hardware or virtualization software, but
other than that, we do have to manage everything else. Using IaaS, we get maximum
flexibility, but still, we need to put more effort into maintenance.
2. Platform as a Service (PaaS): This service provides an on-demand environment for
developing, testing, delivering, and managing software applications. The developer is
responsible for the application, and the PaaS vendor provides the ability to deploy and
run it. Using PaaS, the flexibility gets reduce, but the management of the environment
is taken care of by the cloud vendors.
3. Software as a Service (SaaS): It provides a centrally hosted and managed software
services to the end-users. It delivers software over the internet, on-demand, and
typically on a subscription basis. E.g., Microsoft One Drive, Dropbox, WordPress,
Office 365, and Amazon Kindle. SaaS is used to minimize the operational cost to the
maximum extent.

Fog computing vs. Cloud computing


Cloud computing: The delivery of on-demand computing services is known as cloud
computing. We may use applications to store and process power over the Internet. Without
owning any computing infrastructure or data center, anyone can rent access to anything from
applications to storage from a cloud service provider.

It is a pay-as-you-go service.

By using cloud computing services and paying for what we use, we can avoid the complexity
of owning and maintaining infrastructure.

Cloud computing service providers can benefit from significant economies of scale by
providing similar services to customers.

Fog computing is a decentralized computing infrastructure or process in which computing


resources are located between a data source and a cloud or another data center. Fog computing
is a paradigm that provides services to user requests on edge networks.
Devices at the fog layer typically perform networking-related operations such as routers,
gateways, bridges, and hubs. The researchers envision these devices to perform both
computational and networking tasks simultaneously.

Although these tools are resource-constrained compared to cloud servers, the geological spread
and decentralized nature help provide reliable services with coverage over a wide area. Fog is
the physical location of computing devices much closer to users than cloud servers.

Table of differences between cloud computing and fog computing is given below:

Specialty Cloud Computing fog computing

Delay Cloud computing has higher Fog computing has low latency
latency than fog computing

Capacity Cloud computing does not Fog computing reduces the


provide any reduction in data amount of data sent to cloud
while sending or converting computing.
data.

Responsiveness The response time of the The response time of the


system is low. system is high.

Security Cloud computing has less Fog computing has high


Security compared to Fog Security.
Computing

Speed Access speed is high High even more compared to


depending on the VM Cloud Computing.
connectivity.

Data Integration Multiple data sources can be Multiple Data sources and
integrated. devices can be integrated.

Mobility In cloud computing, mobility Mobility is supported in fog


is Limited. computing.

Location Awareness Partially Supported in Cloud Supported in fog computing.


computing.

Number of Server Nodes Cloud computing has Few Fog computing has a Large
numbers server nodes. number of server nodes.
Geographical Distribution It is centralized. It is decentralized and
distributed.

Location of service Services provided within the Services are provided at the
Internet. edge of the local network.

Working environment Specific data center building Outdoor (streets, base stations,
with air conditioning systems etc.) or indoor (houses, cafes,
etc.)

Communication mode IP network Wireless communication:


WLAN, WiFi, 3G, 4G, ZigBee,
etc. or wired communication
(part of the IP networks)

Dependence on the quality Requires strong network core. It can also work in a Weak
of core network network core.

Difference between Fog Computing and Cloud Computing:


Information:
o In fog computing, data is received from IoT devices using any protocol.
o Cloud computing receives and summarizes data from different fog nodes.

Structure:
o Fog has a decentralized architecture where information is located on different nodes at
the source closest to the user.
o There are many centralized data centers in the Cloud, making it difficult for users to
access information on the networking area at their nearest source.

Protection:
o Fog is a more secure system with different protocols and standards, which minimizes
the chances of it collapsing during networking.
o As the Cloud operates on the Internet, it is more likely to collapse in case of unknown
network connections.

Component:
o Fog has some additional features in addition to the features provided by the components
of the Cloud that enhance its storage and performance at the end gateway.
o Cloud has different parts such as frontend platform (e.g., mobile device), backend
platform (storage and servers), cloud delivery, and network (Internet, intranet,
intercloud).

Accountability:

o Here, the system's response time is relatively higher compared to the Cloud as fogging
separates the data and then sends it to the Cloud.
o Cloud service does not provide any isolation in the data while transmitting the data at
the gate, increasing the load and thus making the system less responsive.

Application:
o Edge computing can be used for smart city traffic management, automating smart
buildings, visual Security, self-maintenance trains, wireless sensor networks, etc.
o Cloud computing can be applied to e-commerce software, word processing, online file
storage, web applications, creating image albums, various applications, etc.

Reduces latency:

o Fog computing cascades system failure by reducing latency in operation. It analyzes


the data close to the device and helps in averting any disaster.

Flexibility in Network Bandwidth:

o Large amounts of data are transferred from hundreds or thousands of edge devices to
the Cloud, requiring fog-scale processing and storage.
o For example, commercial jets generate 10 TB for every 30 minutes of flight. Fog
computing sends selected data to the cloud for historical analysis and long-term storage.

Wide geographic reach:

o Fog computing provides better quality of services by processing data from devices that
are also deployed in areas with high network density.
o On the other hand, Cloud servers communicate only with IP and not with the endless
other protocols used by IoT devices.

Real-time analysis:
o Fog computing analyzes the most time-sensitive data and operates on the data in less
than a second, whereas cloud computing does not provide round-the-clock technical
support.

Operating Expenses:

o The license fee and on-premises maintenance for cloud computing are lower than fog
computing. Companies have to buy edge device routers.

Fog Computing vs. Cloud Computing: Key Differences


The concepts of Cloud vs. Fog are very similar to each other. But still, there is a difference
between cloud and fog computing on certain parameters.

Here's a point-by-point comparison of fog computing and cloud computing:

o The fog architecture is distributed and consists of millions of small nodes located as
close as possible to the client device. The cloud architecture is centralized and consists
of large data centers located around the world over a thousand miles away from client
devices.
o Fog acts as an intermediary between data centers and hardware and is closer to the end-
users. If there is no fog layer, the Cloud communicates directly with the equipment,
taking time.
o In cloud computing, data processing takes place in remote data centers. Fog is processed
and stored at the edge of the network closer to the source of information, which is
important for real-time control.
o Cloud is more powerful than Mist concerning computing capabilities and storage
capacity.
o The Cloud consists of some large server nodes. Fog consists of millions of tiny nodes.
o Fog does short-term edge analysis due to the immediate response, while Cloud aims for
a deeper, longer-term analysis due to a slower response.
o Fog provides low latency; Cloud provides high latency.
o Without an internet connection, a cloud system collapses. Fog computing uses different
protocols and standards, so the risk of failure is very low.
o Fog is a more secure system than Cloud due to its distributed architecture.

The table below helps you better understand the difference between Fog and Cloud,
summarizing their most important characteristics.
Benefits of Fog Computing:
o Fog computing is less expensive to work with because the data is hosted and analyzed
on local devices rather than transferred to any cloud device.
o It helps in facilitating and controlling business operations by deploying fog applications
as per the user's requirement.
o Fogging provides users with various options to process their data on any physical
device.

Benefits of Cloud Computing:


o It works on a pay-per-use model, where users have to pay only for the services they are
receiving for a specified period.
o Cloud users can quickly increase their efficiency by accessing data from anywhere, as
long as they have net connectivity.
o It increases cost savings as workloads can be transferred from one Cloud to another
cloud platform.

Fog Computing vs. Cloud Computing for IoT Projects


According to Statista, by 2020, there will be 30 billion IoT devices worldwide, and by 2025
this number will exceed 75 billion connected things.

These tools will produce huge amounts of data that will have to be processed quickly and
permanently. F fog computing works similarly to cloud computing to meet the growing demand
for IoT solutions.

Fog is even better on some things. This article aims to compare Fog vs. Cloud and tell you
more about Fog vs. cloud computing possibilities and their pros and cons.

We provide leading-edge IoT development services for companies looking to transform their
business.

Cloud Computing

We are already used to the technical term cloud, a network of multiple devices, computers, and
servers connected to the Internet.

Such a computing system can be figuratively divided into two parts:

o Frontend- is made up of the client device (computer, tablet, mobile phone).


o Backend- consists of data storage and processing systems (servers) that can be located
far from the client device and make up the Cloud itself.
These two layers communicate with each other using a direct wireless connection.

Cloud computing technology provides a variety of services that are classified into three groups:

o IaaS (Infrastructure as a Service) - A remote data center with data storage capacity,
processing power, and networking resources.
o PaaS (Platform as a Service) - A development platform with tools and components to
build, test, and launch applications.
o SaaS (Software as a Service) - Software tailored to suit various business needs.

By connecting your company to the Cloud, you can access the services mentioned above from
any location and through various devices.

Therefore, availability is the biggest advantage. Plus, there's no need to maintain local servers
and worry about downtimes - the vendor supports everything for you, saving you money.

Integrating the Internet of Things with the Cloud is an affordable way to do business. Off-
premises services provide the scalability and flexibility needed to manage and analyze data
collected by connected devices. At the same time, specialized platforms (e.g., Azure IoT Suite,
IBM Watson, AWS, and Google Cloud IoT) give developers the power to build IoT apps
without major investments in hardware and software.

Advantages of Cloud for IoT


Since connected devices have limited storage capacity and processing power, integration with
cloud computing comes to the aid of:

o Improved performance - faster communication between IoT sensors and data


processing systems.
o Storage Capacity - Highly scalable and unlimited storage space can integrate,
aggregate, and share huge data.
o Processing Capabilities - Remote data centers provide unlimited virtual processing
capabilities on demand.
o Low Cost - The license fee is less than the cost of on-premises equipment and its
ongoing maintenance.

Disadvantages of Cloud for IoT


Unfortunately, nothing is spotless, and cloud technology has some drawbacks, especially for
Internet of Things services.

o High latency - More and more IoT apps require very low latency, but the Cloud cannot
guarantee this due to the distance between client devices and data processing centers.
o Downtimes - Technical issues and network interruptions can occur in any Internet-
based system and cause customers to suffer from outages; Many companies use
multiple connection channels with automatic failover to avoid problems.
o Security and Privacy - your data is transferred via globally connected channels along
with thousands of gigabytes of other users' information; No wonder the system is
vulnerable to cyber-attacks or data loss; the problem can be partially solved with the
help of hybrid or private clouds.

Fog Computing
Cisco coined the term fog computing (or fogging) in 2014, so it is new to the general public.
Fog and cloud computing are intertwined. In nature, Fog is closer to Earth than clouds; In the
tech world, it's the same; Fog is closer to end-users, bringing cloud capabilities to the ground.

The definition may sound like this: Fog is an extension of cloud computing that consists of
multiple edge nodes directly connected to physical devices.
Such nodes tend to be much closer to devices than centralized data centers so that they can
provide instant connections.

The considerable processing power of edge nodes allows them to compute large amounts of
data without sending them to distant servers.

Fog can also include cloudlets - small-scale and rather powerful data centers located at the
network's edge. They are intended to support resource-intensive IoT apps that require low
latency.

The main difference between fog computing and cloud computing is that Cloud is a centralized
system, whereas Fog is a distributed decentralized infrastructure.

Fog is an intermediary between computing hardware and a remote server. It controls what
information should be sent to the server and can be processed locally. In this way, Fog is an
intelligent gateway that dispels the clouds, enabling more efficient data storage, processing,
and analysis.

It should be noted that fog networking is not a separate architecture. It does not replace cloud
computing but complements it by getting as close as possible to the source of information.

There is another method for data processing similar to fog computing - edge computing. The
essence is that the data is processed directly on the devices without sending it to other nodes or
data centers. Edge computing is particularly beneficial for IoT projects as it provides bandwidth
savings and better data security.

The new technology is likely to have the biggest impact on the development of IoT, embedded
AI, and 5G solutions, as they, like never before, demand agility and seamless connections.
Advantages of fog computing in IoT

The fogging approach has many benefits for the Internet of Things, Big Data, and real-time
analytics. The main advantages of fog computing over cloud computing are as follows:

o Low latency - Fog tends to be closer to users and can provide a quicker response.
o There is no problem with bandwidth - pieces of information are aggregated at
separate points rather than sent through a channel to a single hub.
o Due to the many interconnected channels - loss of connection is impossible.
o High Security - because the data is processed by multiple nodes in a complex
distributed system.
o Improved User Experience - Quick responses and no downtime make users satisfied.
o Power-efficiency - Edge nodes run power-efficient protocols such as Bluetooth,
Zigbee, or Z-Wave.

Disadvantages of fog computing in IoT


The technology has no obvious disadvantages, but some shortcomings can be named:

o Fog is an additional layer in a more complex system - a data processing and storage
system.
o Additional expenses - companies must buy edge devices: routers, hubs, gateways.
o Limited scalability - Fog is not scalable like a cloud.

Conclusion:
The demand for information is increasing the overall networking channels. And to deal with
this, services like fog computing and cloud computing are used to quickly manage and
disseminate data to the end of the users.

However, fog computing is a more viable option for managing high-level security patches and
minimizing bandwidth issues. Fog computing allows us to locate data on each node on local
resources, thus making data analysis more accessible.

Role of Cloud Computing in IoT


Innovations lead to a continuing expansion of technologies. IoT and cloud computing are now
two upcoming internet technologies that are closely linked, with one providing the
groundwork for the success of the other.
Cloud computing is helping the IoT in getting success. Cloud is a big factor in the success of
IoT. As cloud enable user to carry and access all thing over internet without any storage, IoT
is related with cloud computing. Future users of these technologies will gain a number of
benefits. As was already mentioned, cloud computing allows for scalability in the delivery of
applications and software as a service by enabling businesses to manage and store data across
cloud platforms.

What is IoT?
In, IoT we do not need interaction between human or between human and computer. We can
communicate data over a network of linked devices like objects, computers, or digital devices.

A heart monitor implant is an example of IoT usage. An in-built sensor that gives alert to driver
on path danger in car is also example of IoT. IoT device is an object which can transfer or
receive the data across network and can have IP address. IoT object should be capable of
having IP address.

Increased data output has led to the growth of IoT. Due to the Internet of Things Cloud
Service's excessive communication between cheap sensors in the IoT, there will soon be
billions of connected machines and devices joining human users.

Why Cloud Computing Is Essential For IoT?


As a result of cloud computing, storage options for personal and professional use have
undergone tremendous change. Data is also available from a distance, thanks to cloud
solutions' scalability and data dynamics. It has thus shown to be a successful solution for data
transfer across internet channels and via specialized direct links, depending on the
organization's needs.

The cloud is an excellent IoT enabler that satisfies the data-driven requirements of the
company. Cloud also offers technology framework. Using that framework, we can develop
better IoT devices.

Speed and scale are two essential aspects of cloud computing, and they work in unmatched
harmony with IoT networking and mobility. So, user can benefit more by combine use of cloud
computing and IoT. Unquestionably, some factors show that the cloud is necessary for the
success of IoT, and here are some of them.
Cloud Functions as a Distant Computing Power
On-premises infrastructure reliance is no longer a viable option. As usage of cloud and IoT
devices are increasing day by day, we generated large amount of data. We need to process that
data quickly using big data. The advantage of having a tonne of storage capacity in this
situation comes from the cloud. As we are heading towards 5G from 4G, cloud computing also
enables developer more speed in getting access to data.

IoT Data is More Secure And Private as a Result of Cloud Computing.


IoT involves significant data generation. And when you work with data, the data security and
data privacy become issue. IoT also makes use of mobility. Cloud uses advance encryption
algorithms and authentication. Which enable cloud to provide its user high security.

No Requirement For Hosting on-premises


For IoT devices, plug-and-play hosting services are necessary. This will become quite
expensive due to plug-and-play hosting services. This will cost more to organizations. This
type of hosting services needs hardware system. Due to the combined power of cloud
computing and IoT, you do not need to depend on substantial machinery. As cloud computing
infrastructure make it ready to use without having hardware storage device set-up offline. This
makes it easy for IoT hosting organizations.

Improved Device-To-Device Communication


We can use cloud technology for the communication using the IoT. Smart device can easily
connect with each other using IoT APIs. It also makes internal communication between
devices fast and easy.

Less Cost of Ownership


While preventing enterprises from putting up the infrastructure, cloud technology also
provides many resources. As a result, it saves lot of money on infrastructure construction.
Additionally, because there is no idea of local systems, hardware, and software in the cloud,
the IT teams are abler to concentrate on their regular tasks.

Program For Business Continuity


Business continuity is guaranteed by cloud computing, even if unexpected disasters occur
while it is being used. There is no danger of data loss because data is maintained on additional
distinct servers, which is considerably more crucial in the case of IoT-based architecture.
IoT innovations with low entry barriers require hassle-free hosting options. As a result, cloud
computing in IoT is a suitable solution. IoT players can use the power of distant data centers
due to cloud computing without requiring on-premises gear and software. IoT cloud
computing is the best option financially because users need to adhere to the pay-as-you-go
concept. It also saves a tonne of money upfront.

This helps businesses can launch massive IoT projects with ease. This removes many obstacles
to entry for the majority of IoT-based organizations.

Communication Between Devices


By using cloud computing in proper way, IoT devices can communicate with each other
seamlessly. As a result, connected devices and smart devices can communicate with various
reliable APIs. In this way, networked technologies are made possible by cloud computing.

Conclusion
Every firm works individually to keep up with this evolving technology's pace. IoT technology
is predicted to connect billions of devices, and the information that these devices produce will
be challenging to handle and process using the current methods.

CHALLENGES FACING CLOUD-BASED IoT INTEGRATION


There are a vast number of challenges faced by the integration of Cloud and IoT. Some of
which are listed below:
Devices and their capacity
Device’s security approaches normally depend on the encryption most of the security
approaches whenever we talk about it depends upon encryption but when going about IoT the
entire environment is all about constrained environments and the devices are also about
constrained devices which means they are not having sorts of luxury in terms of resource
availability in terms of memory in terms of processor speed in terms of many things they are
constrained even including power so when you go with encryption it is not a good fit for this
constrained environment are constrained devices and this complex encryption and decryption
may take time for this constrained devices it might not work well so these products with
constrained resources are most vulnerable to the side-channel attacks and reverse engineering
of the algorithms is also possible so it is not a great idea to go with encryption techniques
towards the constrained environment this is the first challenge that we normally face. Sensitive
information leakage can also occur due to multi-tenancy. Moreover, public-key cryptography
cannot be applied to all layers because of the processing power constraints imposed by IoT
objects. New challenges also require specific attention; for example, the distributed system is
exposed to several possible attacks, such as SQL injection, session riding, cross-site scripting,
and side-channel. Moreover, important vulnerabilities, including session hijacking and virtual
machine escape are also problematic.
Authorization and the Authentication
Although security and privacy are both critical research issues that have received a great deal of
attention, they are still open issues that require more effort. Indeed, adapting to different threats
from hackers is still an issue. The device authorization is not a separate work it also goes with
authentication the device authorization must go hand-in-hand with authentication and is pretty
critical when it comes to IoT products because you are not only authorized but also you need to
authenticate so the one who tries to access this must establish their identity before proceeding
further with the Gateway access and to other cloud resources so I would each platform with the
two-factor authentication and usage of strong passwords are the major ones that we are relying
on till so you need to think about this aspect of the security authentication and authorization
both are to be very good just the point that you need to remember.
Updates
The third aspect the device updates whenever you have a device it gets updates these states in
terms of member update or something security patches firmware or the software will have
several challenges means every day every second now and then we see that there are a lot of
new security threats are coming in and how do we address it we normally address it through the
patches on the security firmware updates so these updates are to be very good and this might
not be feasible or possible with every IoT device so how do we handle it do we have a chance
to go ahead and update the firmware of every IoT device concerning the newly incoming attacks
in that case that is fine but there are some cases where we really may not have an opportunity to
go ahead and update the firmware because of constrained environments and all those stuff so
many a times the device roller may not also show much interest in applying an update this very
important point, forgetting the importance of the security updates we postpone this security
updates so that’s the major problem that we are facing and that’s one of the biggest challenges.
Communication Channel
The communication channel needs to be much secured the encrypting messages before the
transfer is good but the better one is to use the transport encryption and to adapt the standards
like TLS(Transport Layer Security) see this point here in the communication channels when
you are about to send before that you encrypt and standard the first point that we said is the
encryption that is happening in the devices but now we are talking about the so there is a lot of
difference between these two points so understand the difference and when we talk about the
vulnerabilities it can cost constraints it can be expertise constraints it can be known operation
of the software by the customers it can be the market created the way the mandate for speedy
deployment when it has to be fast it cannot go for multiple checking that is that has to happen
to make sure the system is secure and operational constraints all these are the major security
vulnerabilities that we are facing when one deploys any IoT devices. Besides, when critical IoT
applications move into the Cloud, issues arise because of the lack of trust in the service provider,
information regarding service level agreements (SLAs), and the physical location of data.
Retain collected data
The sensor data should be stored and processed securely the sensor data may come from
different sensors it is attached to different equipment all the different equipment could be at
different places so it is a challenge we need to make sure that the data integrity has to be
maintained including some checksums or signatures that can be included to make sure that the
original raw data is not modified during the transfer what it means is that we have generated the
data that should go to the destination and in between the data should not be changed so what do
we have checksums we have other methods we can make sure that the data order is not changed
and all those are to be practised and most an important point the data that you think is not
required anymore should be removed retaining that data will increase the complexity and will
cost us more in the maintenance part of it.
Performance
The performance here is concerned with the network bandwidth which depends upon the type
of IoT sensors and applications for which they are used. If the application is not at an industrial
level, then large bandwidth is not required else the transfer of heavy amounts of data from
sensors to cloud requires a large amount of bandwidth. This is because timeliness might be
affected by unpredictable matters and real-time applications are very sensitive to performance
efficiency. Cloud environments; indeed, this is because broadband growth is not keeping pace
with storage and computation evolution.

Connecting IoT with Cloud


Connecting IoT (Internet of Things) devices to the cloud is a crucial aspect of modern IoT
systems. By integrating IoT devices with cloud services, you can store, analyze, and manage
data generated by these devices on a scalable and secure platform. Here's a general outline of
the steps involved in connecting IoT to the cloud:

1. Choose the right cloud service provider: Select a cloud service provider that suits
your needs and requirements. Major cloud providers like Amazon Web Services
(AWS), Microsoft Azure, Google Cloud Platform (GCP), and others offer IoT-specific
services to facilitate device connectivity and data management.

2. Set up IoT devices: Prepare your IoT devices by ensuring they have the necessary
sensors, communication modules (e.g., Wi-Fi, Bluetooth, Zigbee, LoRa, etc.), and
firmware to connect to the internet and send data to the cloud.

3. Implement communication protocols: Choose a suitable communication protocol


for your IoT devices to communicate with the cloud. Common protocols include
MQTT (Message Queuing Telemetry Transport), CoAP (Constrained Application
Protocol), and HTTP/HTTPS.

4. Security considerations: IoT devices are often vulnerable to security threats, so it's
essential to implement robust security measures. This includes using secure
communication protocols, encrypting data in transit and at rest, and implementing
authentication and authorization mechanisms to ensure only authorized devices can
access the cloud.

5. IoT Gateway (optional): For more complex IoT systems or devices that cannot
directly connect to the cloud, you may need an IoT gateway. The gateway acts as an
intermediary that collects data from the devices and forwards it to the cloud securely.

6. Cloud IoT services: Leverage the IoT services provided by your chosen cloud
provider. These services often include IoT hubs, device management platforms, data
storage solutions, and real-time data processing and analytics capabilities.

7. Device registration and management: Set up processes to register and manage your
IoT devices on the cloud platform. This involves assigning unique identifiers to each
device and tracking their status and metadata.

8. Data ingestion and storage: Design the data ingestion process to receive data from
the IoT devices and store it in the cloud. Define the data schema and storage strategy
based on the type and volume of data you expect to handle.
9. Data processing and analytics: Implement data processing pipelines and analytics to
gain valuable insights from the IoT data. This may involve real-time processing or
batch processing, depending on your application's needs.

10. Visualization and application development: Create user interfaces or applications to


visualize the data and provide insights to end-users or stakeholders. You can build
dashboards, reports, or integrate the data into existing applications.

11. Scalability and monitoring: Ensure that your IoT-cloud infrastructure can scale to
handle a growing number of devices and data. Implement monitoring and alerting
mechanisms to detect issues and address them promptly.

Remember that the specifics of connecting IoT to the cloud can vary depending on your IoT
device types, application requirements, and the cloud provider you choose. Always consider
security, scalability, and data privacy throughout the process
Challenge in integration of IoT with Cloud
Integrating IoT (Internet of Things) with cloud services can be a complex endeavour, but it
offers numerous benefits in terms of data analysis, remote management, and scalability.
However, there are several challenges you may encounter during this integration process:
1. Data Volume and Scalability: IoT devices generate massive amounts of data, which
can overwhelm traditional cloud architectures. Handling this data influx requires a
scalable and reliable cloud infrastructure capable of managing data streams from
numerous devices simultaneously.
2. Data Security: IoT devices often collect sensitive information. Ensuring data
encryption, secure transmission, and access control is critical. Unauthorized access to
IoT data could have severe consequences.
3. Latency and Real-time Processing: Some IoT applications, such as industrial
automation or autonomous vehicles, demand real-time data processing. Reducing
latency between IoT devices and cloud services is crucial for these applications. Edge
computing and fog computing can help address this challenge by processing data
closer to the source.
4. Interoperability: IoT devices come from various manufacturers and may use
different communication protocols. Ensuring interoperability and standardization is
essential to make different devices work together seamlessly.
5. Device Management: Maintaining and managing a large number of IoT devices can
be challenging. This includes software updates, firmware management, and remote
monitoring. A robust device management system is required.
6. Power Consumption: Many IoT devices are battery-powered, and sending data to the
cloud can be energy-intensive. Optimizing data transmission and device power
consumption is important for long-term sustainability.
7. Cost Management: Storing and processing vast amounts of IoT data in the cloud can
be costly. Careful planning and resource allocation are necessary to manage expenses.
8. Reliability and Redundancy: IoT applications often require high availability. Cloud
providers should offer redundancy and failover options to ensure data remains
accessible even in the event of failures.
9. Data Ownership and Compliance: Determining data ownership, complying with
data privacy regulations, and managing consent for data collection can be complex,
especially when dealing with data from multiple devices and users.
10. Data Analytics and Insights: Once data is in the cloud, extracting meaningful
insights and value from it can be challenging. Implementing data analytics and
machine learning processes to derive actionable insights is a key component of IoT
cloud integration.
To address these challenges, it's essential to carefully plan your IoT architecture, select
appropriate cloud services, and implement security best practices. Working with experienced
IoT and cloud integration experts can also help navigate these complexities and create a
robust and secure IoT system
What is Cloud Storage?
geeksforgeeks.org/storage-systems-in-cloud

Cloud Computing in general is termed as a different service through the Internet. It has
various resources which include tools and applications like data storage, databases,
servers, networking, etc. It has applications, platforms, and infrastructure which is
surrounded by servers, laptops, desktops, phones, and tablets.

In Cloud Computing, Cloud storage is a virtual locker where we can remotely stash any
data. When we upload a file to a cloud-based server like Google Drive, OneDrive, or
iCloud that file gets copied over the Internet into a data server that is cloud-based actual
physical space where companies store files on multiple hard drives. Most companies
have hundreds of the ese servers known as ‘server farms’ spanning across multiple
locations. So, if our data gets somehow lost we will not lose our data because it will be
backed up by another location. This is known as redundancy which keeps our data safe
from being lost.

Features of Cloud Storage System:


The key features of cloud computing are as follows.

It has a greater availability of resources.


Easy maintenance is one of the key benefits of using Cloud computing.
Cloud computing has a Large Network Access.
It has an automatic system.
Security is one of the major components and using cloud computing you can secure
all over the networks.

Storage Systems in the Cloud


There are 3 types of storage systems in the Cloud as follows.

Block-Based Storage System


File-Based Storage System
Object-Based Storage System

Let’s discuss it one by one as follows.

1. Block-Based Storage System –


Hard drives are block-based storage systems. Your operating system like Windows
or Linux actually sees a hard disk drive. So, it sees a drive on which you can create
a volume, and then you can partition that volume and format them.
For example, If a system has 1000 GB of volume, then we can partition it into 800
GB and 200 GB for local C and local D drives respectively.

1/3
Remember with a block-based storage system, your computer would see a drive,
and then you can create volumes and partitions.

2. File-Based Storage System –


In this, you are actually connecting through a Network Interface Card (NIC). You are
going over a network, and then you can access the network-attached storage server
(NAS). NAS devices are file-based storage systems.
This storage server is another computing device that has another disk in it. It is
already created a file system so that it’s already formatted its partitions, and it will
share its file systems over the network. Here, you can actually map the drive to its
network location.
In this, like the previous one, there is no need to partition and format the volume by
the user. It’s already done in file-based storage systems. So, the operating system
sees a file system that is mapped to a local drive letter.

3. Object-Based Storage System –

In this, a user uploads objects using a web browser and uploads an object to a
container i.e., Object Storage Container. This uses the HTTP Protocols with the rest
of the APIs (for example: GET, PUT, POST, SELECT, DELETE).
For example, when you connect to any website, you need to download some
images, text, or anything that the website contains. For that, it is a code HTTP GET
request. If you want to review any product then you can use PUT and POST
requests.
Also, there is no hierarchy of objects in the container. Every file is on the same level
in an Object-Based storage system.

Cloud Storage Architecture


Cloud Storage architecture flow is as follows :

The Cloud Storage Architecture consists of several distributed resources, but still
functions as one, either in a cloud architecture of federated or cooperative storage.
Durable through the manufacture of copies of versions.
Ultimately, it is usually compatible with data replication advantages.
Companies just need to pay for the storage they actually use, normally an average
of a month’s consumption. This does not indicate that cloud storage is less costly,
but rather that operating costs are incurred rather than capital expenses.
Cloud storage companies can cut their energy usage by up to 70 percent, making
them a greener company.
Storage and data security is inherent in the architecture of object storage
The additional infrastructure, effort, and expense to incorporate accessibility and
security can be removed depending on the application.
Tasks for storage management, such as the procurement of additional storage
space, are offloaded to the service provider’s obligation.

2/3
It provides users with immediate access to a wide variety of tools and software
housed in another organization’s infrastructure through a web service interface.
Very few backups servers are located in different locations across the globe, cloud
storage may be used as a natural disaster-proof backup.
With the WebDAV protocol, cloud storage can be mapped as a local drive

Advantages of Cloud Storage


Scalability – Capacity and storage can be expanded and performance can be
enhanced.
Flexibility – Data can be manipulated and scaled according to the rules.
Simpler Data Migrations – As it can add and remove new and old data when
required and eliminates disruptive data migrations.
Recovery -In the event of a hard drive failure or other hardware malfunction, you
can access your files on the cloud.

Disadvantages of Cloud Storage


Data centers require electricity and proper internet facility to operate their work,
failing which system will not work properly.
Support for cloud storage isn’t the best, especially if you are using a free version of
a cloud provider.
When you use a cloud provider, your data is no longer on your physical storage.
Cloud-based storage is dependent on having an internet connection. If you are on a
slow network you may have issues accessing your storage.

3/3

You might also like