Open navigation menu
Close suggestions
Search
Search
en
Change Language
Upload
Sign in
Sign in
Download free for days
0 ratings
0% found this document useful (0 votes)
49 views
67 pages
Emailing Iot Book
Uploaded by
karaleutkarsh3696
AI-enhanced title
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content,
claim it here
.
Available Formats
Download as PDF or read online on Scribd
Download
Save
Save Emailing Iot Book (3) For Later
Share
0%
0% found this document useful, undefined
0%
, undefined
Print
Embed
Report
0 ratings
0% found this document useful (0 votes)
49 views
67 pages
Emailing Iot Book
Uploaded by
karaleutkarsh3696
AI-enhanced title
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content,
claim it here
.
Available Formats
Download as PDF or read online on Scribd
Carousel Previous
Carousel Next
Download
Save
Save Emailing Iot Book (3) For Later
Share
0%
0% found this document useful, undefined
0%
, undefined
Print
Embed
Report
Download
Save Emailing Iot Book (3) For Later
You are on page 1
/ 67
Search
Fullscreen
(unrra] INTRODUCTION @ Intemet of Things is a combination of various technologies. Basic required terms are heterogeneous network for communication of objects, required hardware of each object, processing / computing power of each object and security of each element in theo. + To accomdate the diversity of the IoT there is heterogenous mix of communication technologies, Which need to be adapted in order to address the needs of IoT applications such as energy efficiency, security and reliability. Number of manageable ‘communication technologies that address the need of IoT include wired and wireless technologies like Ethemet, Wi-Fi, Bluetooth, Zigbee, and Z-Wave. * Intelligent Transportation, Industry Automation, Logistics, Medical diagnosis, Service sector are areas, where the coupling of information and things can ‘create new business processes or enhance existing practices at better levels. eGR] act |] Tr Gateways «| Fig. 1.1 ; IoT basic architecture * Dynamic and Self-Adapting > IoT devices and systems may have the capability to dynamically adapt with the changing contexts and take actions based on their operating conditions, User's context, or sensed environment. * Self-Configuring ‘ > IoT devices may have self-configuring copabilty allowing a large number of devices to wor together to provide certain functionality like setup networking, fetch latest software upgrades. INTRODUCTION TO IoT + Interoperable Communication Protocols 2 oT devices may support a number of interoperable communication protocols and can communicate with other devices and also with the infrastructure. © Unique Identity > Each loT device has a unique identity and a unique identifier (such as an IP address or a URD. ‘+ Integrated into Information Network > oT devices are usually integrated into the information network that allows them to communicate and exchange data with other devices and systems. 1.1.2 Emerging Trends in IoT «Internet of Things, where everything gets connected, has become a realty! This ubiquitous penetration of technology has made lives easier, businesses smoother, ‘and people have been able to communicate better and faster. People are realizing that they are standing in the midst of a paradigm shift where they are able to connect everyday things with technology. ‘This has opened up an enormous potential in the world of information, where, with a proliferation of connected devices, you can enjoy several benefits. Internet of Things (oT) has promised several good things in the coming years. Here's a look at some of the emerging trends. ‘© Wearables that are not confined to the Wrist Alone. We have seen the smartest wristwatches and wristbands, but now wearables are available in headgear, body wear and footwear as well. In the coming years, we can imagine how smart headgear is going to become smarter. The same has been happening with body gear and footwear as well. * For example, athletes can track their performance using smart body gear, and footwear that would allow users to reach their workplace in half the time is becoming popular. Vehicles that have Become Smarter-there is a shifting driver behavior to the connected vehicles that have been released in the past year. - a.)reducing waste and improving tie produc 12: Sipe oc diagram of {he ble bling boc ofthe oT Sensors: the data collected. + These cloud based applications ae responsible for rendering effective meaning to the cat coleced Applications are contol by users and ae deivery point of parlrservies. ‘+ Examples of applation are: Home automation apps, security syste industal contol hub et. © | We can determine thit the information gathered by the sensing node (end node) is processed fist then via connectivity i reaches the embedded procesing nodes. These can be any embedded hardware devices and are processed there at wel. It then passes though the Ceonetviy nodes again and reaches the remote coud: based processing that can be any software and are sen to ‘the application node for the proper apped usage ofthe Information (at) with the vinue of central hb Hee siariphones 1+ Second by vitue of many kinds of communications technologies, it integrates objctreated information Jnto the information network and reaizes the Iintliget indexing and integration of the information2. INTERNET OF THINGS (COMP. BATU) DeTERNET OF TNS (COMP. BATU) Lets ccs the features ofeach ofthese atl 1 Sencrsconnectty and network 2. Gatmay and network 3. Management service calleted by the sensor devices to yield a valuable result of al the data collected. This actions paformed inthis ayer. ‘‘Als, cen station requesimmedte respons 12 the sustion This layer els in doog that by ‘he deta flow Tis Iyer is aco responsible for data mining, txt ring sevice anal et ‘+ Aapicaton layer forms the topmost lyer of oT _citctre whichis responsible for effective utzon ofthe data ctlete, ‘+ Vaous 107 applications inde Home Automation f= ‘ath E-Government et _bsracting data extracting information and mansgig | + lowadys safety and sectity Nona yt we ear sper oper ta fe contd hand abe pone and by means 1+ observes 9 deviation fom the normal oF expected behavior ofthe system orth urs. The system later perfor heat a “+ Anadis start with known scanty threats ia the oT ‘medium and examines how to provide security ryptagraphic algathms such as AES, OES wil be implemented, To prevent attacks no and sensor devices using Hight ‘weight intrusion detection sterhome systems anywhere and enjoy compet securitysome dtance +The resting fee electrons (and their whe parnes condoctelectty, thereby lowering eictace, The tases on the Wamework shown in figue, we have fried 9 suitable imperentaton model CatExhaust fan or can sand alertINTERNET OF THINGS (COMP. BATU a0 _______BERS2ucTION Toe +The nine growing community backing Arduino | * ‘rtm etc The chosen par of racodet and decoder for commusiston shoud have some somber of acres nd ta its (0) MQ Gas SensorStig ie SAPBR comecion pe 1ecPRs Sarg be APNG ‘Siege SPER ‘Sting te pa wate wich resist be acesses ‘Sib eee | Agicuture is one of the most i_NETRODUCTION TO ty (PR) sensor is 2 popular motion sensor for hobby projets > Wectic + Use enemsl ergy sources sich a8 batteries or other pes of letie energy 10 generate tion. Observed by the motion pattems that scoters produce, there ae hore whe ces lines, siltyFeiss cellar tor Cela networs pla wis, (225) aces oo | ion | covesazn orn INTERNET OF THONGS (comp. BATU) am _pernooucTion To tet + For instance, ot MaM gear atiows enterprise | vil sons and symptoms drop beneath orinay an Sie on thet smarghones ‘ast an | M2M-Inked We lp tool ought to robetcaly of eaupment wither ering. for you | admins” oxygen and futher cre unt a heathare frpertarves at he Scene LoT M2M addon allows Dents to monitor thee own homes instead of hospitals or care facies. renner OF TANGS (COMP. SATU)tecnaogy stack tat has vrous {ot devices and mid tecnelogies er ye. a2) _NeTRODUCTION TO eT associated services come together in ne device. What interests us most nthe scope of this article though are the sensor and actuators. we tackle asa separate oT layer Hesioess A ==. C® Taped — ChanevTeRner oF THINGS (COMP. BATU) 029 detect he eves or changes the enviroment and fer tte purposes for wich they were designe rcmuneate sbout these events changes of spec ich then ters ad et deve Wash parameters 10 i or ETRODUCTION TO tot + tssemtaly (or gateway pays a citi role on the Intersection of devices inthe stict sense (and thus the data frm 1T devices) and the network, doud or ata centers expired in our indepth aie on oT gateways where you can abo see there are gateways forthe Indust! Lo, gateways for what i know as feige computing, gateways for home automation, where they aggregate and orchestrate communications between home sensors and doud senees and much ay $0, this is a broad layer with multiple devices tml shone (fr ond har Kec (at utwne de fc. ae weed fr coment areaton enon snd cys ot ior exo (rea, te talon of the vit proses that et io te owl oF tenia Unda) 8 explo the management and on bowing of oT doves, te erode computing reve ctl aod anager. posing nd sgestion of tnd oh 1 Simply si: they pay acta role on multiple levels data rom oT deve really get leveraged. B + Asthere are more devices and thus more IT data, es easy to understand why mare functions and goals te packed in ToT gateways. Many sensors with often “+ However, as you can read in our article on the impact (of lof data on I inastvcure est anals of IoT data sl happens in a data center Hence the broad ‘arity of ToT gateways, from the edge tothe network ‘oF coud, whatever people wat Inthe contert ofthis layer we also must emphasize IT device management hich i key in 1 platforms on the level of M2M features iWired or wieess broadband communications may be used there to transer data to permanent date > Preprocessing: 1 data wil come from diferentter Tekapeiepreproesng maybe needed Td dean data Bete mening operon te ‘ace When an IT subsystem autonome 2 Goer not rere permanent storage ofits data But father keep the processing and storage in the frock, then ionetwork processing may BE Devomed in responce to reabtme or localized fo tn aran ten ny er airpten. The to ad ne efficiency, improved staff morale and an oom a ror Be Te internet of Things sounds Uke 2 staigh fone Pepe escpton of what it & — Simpy gy) interconnectvty of smart deve predicted there wil be aos Sn erarple given for mar cars are becoming mre common, even fs ving ea remain ong way of | (G) | Fig. 1a7 | LULA The Internet of Things and Business Process Management The lo is changing the way we lve ou Something that wil ony grow and grow, Something that al busineses need sae cous eta soe spel et adjustments : peli INTERNET OF THINGS (COMP, BATU) ay 7 ITRODUCTION TOI, ‘+ Data: As consumers use more and mare devices that ‘comer the market, whe the Iteret of Things in a busines sense either touches or wl touch almost al companies inyeaes to come +A PricenatechouseCoopers report Sensing the Future fof the Internet of Things pre transforming the everyday “physical objects at ‘TSurbund os no an ecoayrtem of ormaton at wil — eich ou ves, From refigeators to parting spaces toeRoOUCTION TOT IaaS, PaaS, and S205. Al thee pills an provide secs 1113.1 Grid/SOA and Cloud Computing the mort directly eloted works is he use of cst of ‘workstations (COW) and networks of workstations. + Google's server farms were based on the same phosephy of COW. In fact the Mopreduce systems a batch processing tension of the sater-barir- reduce primitives of MPLPVM a ee officer Eric Schmit seating at @ seu conference in 206. Se ten. oud compuing hat of Aigonne National Laboratory when be ntiated the Globus project in 1984 based on the works of PYMMPL. PBS/Condor (as Job schedulers of high- -performance computing or parallel supercomputing 5.3.49: Cloud hierarchy‘tema. and 50 on. Al of those tednoogitt a8 + ssv technologies butare not require, 370 Hardware Fig 1.59: Eat hypersior of Mv |perroouerion Yo 1. fPltform Portability + Ponty i 9 crcl feature in Co. Thee ace many. Fig. 156: CoT-baed middleware and its postionicon protect wt aoa coo te Bs resource tat ofr the most efecive sees Infomation + For example the process of chosing the best ers inthe envionment tat gives us the mst reale infomation One of the ey eset of # Resource ‘covery mechanism for miglewaes 1 ope wih trequen fares + Dewtopes must uit sestbizng aborths in certo bing the system nan orinary state ese ease: fares “Trumtworthiness Management Ts capability required in soil Inert of Tings spplcatons By tv eae we can develop tt aod | + Gedt_ mechinme (eg. achentiaion, hashing fexypion and et) 19 ewe that services ond intomaton tat rave been prepared fr ws by oer appleations cane om vusworty sens. +1 pays a bey roe in eablting wus elaonsps anocg fieent applications Ths wil eed 10 3 ‘ratable robust and secre stem. |. Adopabity + bn Cot ayrems, eirnment and retorts | * inkresrctce often change due to diferent reasons Incuting nodes maby, power rain. topology sh andee 1 Mary mistenares usushy has feed capabtis and ‘annot be customized to dyramic and unpredictable tuations Tis feature shows how mddievare should behave against enscnmental changes. an react | [TE bot satay and erica 1+ Tis cloud medals composed of the following ofp > Three serve modes aS, aaa S38 “of > Four Deployment Mode: Pruate cloud, pubic yp > Five serice, broad network acess, resource pootng, Incubator, SP-IBOIO1 Cloud. Intropeabilty Wie Paper v.00. > Cloud Management Working Group: 05?- 40102 Architecture for Managing Clouds Write Paper VL00, and DSP-1SOLO3 Use Cases and brteractons for Managing Clouds White Paper vioo. > turopean Telecommuniations Standards Institute: TC doud defetion, > Standacde Accalration to Jumprtart Adoption ‘of Cloud Computing: 25 use case. 1 Incommunication among devices and between devices and edge oF devices and plaorms, especialy, seaxre evice Wentifcaon technology and next-generation eypregrphy “technologies such as embedded {eneryption are mayor enabling technologies for oT we cases Privacy enhancing technology and net eceration cryptography technologies such as searchable enexypton are necessary fr pracy. 115.1 dentty of Things “When devices which used tobe ina dosed system get ‘connected to an oT sytem, they can be the target of fjber attacks. wich are commen in IT systems. Sacoring the ideny of a device which enables the identieation ofeach device s import in order tosecure the tratworthiness of data generated by Govces aod the cesiiy of rests obtained by | vain that cata in stems, “+ Hence, identhing tings wi be 2 maj preeauiste for» sucess relation of 2 secre IT. st 45 iomety for humans is Becoming more and andar inthe euthetication of people. the same be the ete for things inthe future. Physica Unconable Functions (UF are the meas of bore for tings + cryptographic keys and identities can be dered from uclnable material properties alwing usage of PUFS with classialcypograpy, which is based on secret ys. The ciference is only hat the key i bound tthe port and cannot be separated, Adina ‘ayptographic protocols may be implemented though PUTS which can act seat alternatives in the eof quantum computes. 1A device connected o a oT system canbe located in fan environment where physical security cannot be provided, andi can be atacked by dismanting or by Physical ening. For ths reason, technologies 10 prevent the identfer of device trom being countered even when the device is physcaly | * uses Patforn source up tothe loud where theze data are used for ‘making important sometimes safety cital decisions, AR schemes require work that is linger in the catabase size. which constutes one drawback of this approuch. However, itis possible to amortize the cost or multiple queries and multiple users. 1+ Further research and development work is reeded powered devices. As for sofware remete attestation it is not possible to conceptually guarantee trust in the[INTERNET OF TINGS (COMP. sary) nerrooucTONTotet iina secutty senses net 1 sats. Depending on how eidence is cle sen might be spec sdeptatons of ocean | of ce ersing 3 secs ube. rote optimized foo opto wth ined |e | Fiocooat .working principle of any tree sensors 7. Whats actuation in oT? 18 plain various networking technologies shat can Be eed in. cer 7 svar oierentiatbetaeen MM andy ndarental devices and gateways, Fig.24: 31nd SA [2:2 HARDWARE COMPONENTS, ELEMENTS OF IoT tito improving personal and societal safety (Optimizations of operations boosting producti. res and reducing costs ae typiclyeect bo oo beter process onl terms of mtaring quips but oho Hseing theta fle upn the error > Las, but not least important is envionment smouton where nT can help us understand and ever manage those resources we hive, SENOS fan help protect side, ack water wage and * Objects indude both vital and physical objects, but se net inte to: ‘Area Networks, WiFi, Ethemet, lore optic fi tc) + Copabiitiesinctude, bu are net tinied to: > Gathering information, > Processing information > Storing information and > Presenting information =A process could incude > Tracking heath information, > Heating your home, > Uighting public streets, and > Keeping track of assets. ‘ere are very substatial economic advantages 10 | + + For everthing ftom robots ate a esting pad hand vaming blanket to honest fortune ling machines, purpotes. Some boards look a bit diferent from the ‘one below, but most Arduinos have the majory of these components in common: Power (USB / Barrel Jack) 1+ Every Arduino board needs a way to be connected to a power source. The Arduino UNO can be powered from 2 USB cable coming from your computer or 8 wall power supply (ike this) that is terminated in 9 barrel jack Inthe Use connection slbeled (Q) and the ba led Qh, 1+ The USB comeetion is also how you wil toad code conto your Arduino board. More on how to progran with Arduino can be found in our Intaling. ant Programing Arduino tutoeens oF Tacs (COMP. BATU) 20 Note Do NOT use 2 pomersuply reat than 20 Volts ou wit cverpomer and thereby desy) your Aruna. | « Fe recommenced vaage for most Aruino models is between 6 and 12 VOR. as (5V,33V, GNO, Analog, Distal PWM, AREF) > GND GE Shor for ‘Gro GGNO pins on the Ardina any of which ed to ground your rast > 5V(4)&33V GI: As you supplies 5 wos of power, and 23 vols of power. Most ofthe ed with the Arduino rh vets uTeRNET OF THINGS (COMP. Bary) 1+ At Sparitun we use many Arduinos and were abays looking forthe simplest most stable one Each boards 2 Bt clferent and no one board hat everthing We want 50 we decided to mate our own version that Combines al or favor feature. ‘+ The RecBoard can be programmed over @ USB Mia 8 able sing the Arana IDE. HN werk on Windows 8 witout having to change your secutty settings (we sd signed crves. unlike the UNO}. I's more stable Arduino Mega (13) 1+ The Arduino Mega is ke the UNO' bigbrother. thas ito 9 computer with 2 USB cable or power It withoa ets fk ote of Ds or buttons eyoard mouse ard more! > Over millon RespberyPishave ben sold before February 2015, making it the best-aaing Brin ‘computer. By November 2016 they had sold 11 rilton unt. 2.4.1 Raspberry Pi Model Bof 16 KB and a level 2 is used prima ernie oF THINGS (COMP. BATU > Lower level outt ic provied by # ra {GIO pins which support common protocols We re > The B-models hve an 8P8C Eheet port and the ‘saute 3 and Zero W hve on boord WF ana Buetoots 242. Pi Operating ystems + (he famalon oder ein» We stron for dowload as we bons, Windows 10. foT Core RISC. OS specie medi center istribur promotes Python and Scratch gee wih spo fr ELEMENTS oF ey | r vTERNET OF THINGS (COMP. BaTU) qurmpe ple? suman oF ot > As shipped. it can emit these: 6401350 EGA > Gentoo Ln+e Rasen Fi community mas described by Jamie ‘yr of FLOSS sotmae company AdCore as one of Fg. 227 Raspberry PLO - unMENTS oF enn OF THINGS (COMP. 04 = sme ig 2.20:Raspbemy PMs B20the primary operating ster Raspberry sngle-board cam Inctating Pactages tomo pie ‘do a-get upgrade uot gti Juloos 3) | sudo apt-get remove, | | 10 at et purge ad apt-get it upgrade | | Accessing Raspbery Pi || | Te Roi can be accessed in Uc trminl by secur shel “Wired networs for IT can be categorized a5 shor range fed tusbased acess nears most for ‘SCADA appheatons and B based networs for M2M and SCADA appicatons + The BP bated nerorts are widely wed and thei protocol sack it well own together wth telephony S57 and cable TV DOCSIS (dataovercable service ineace specteatin) protocols the vl Gnternet telephony, and cable TV) networks convergence plan Candicates $57 (Signaing Sytem 7) is 2 cial Cempenent of modern teeconmaniceions stems {PSTN 05, GPRS, ee), Every clin every networks {dependent on 557, Ukewse. every mobile phone use ‘eteperdent on 57 10 ow iernetwcrk roaring"use the wird neneors, wireless networks for oT ante categorized a5 flows: + Sorronge_tachuing_Neot_f communication 5,227: Short-and logge wiles networks (From Yuan in) te cont Same of have not ben diced pens [OPV over Low Power Wires Fens | Wawel romieury technology by Crone Stee {281 1 2008 he Waves Open Sanderd Altance arr OSA was cated to manage and gover the ‘ectclogy moving orvard + Apart fom new standards emering fom MIC Improvements other new tectnologie and standards ® Iriddenore capabiies 2 step furder ito the Communicating devices and incease the ubiquity Cert, and smarnes of devits nthe Internet of Things[TENNEY OF TANGS COMP. BATU) ax +The previously deserbed fst two stages of the OCM model show the procesies and venues of Row the Wit tot, more and mor become par of the I Intpiveonsencrginace/ Archtectre for Optimization You Dive insurance plc, 12.6.3 Manage To Create New Business Value_| + shang busines ReloyRides become poss > Ma gitenay > MaMuN > MOM devices For oter paris in the lo wave ei, the diagrams ‘rom ETSY and Og Intemational demonerated more ger oT system arnecurs. The ay to have 3 Single common pater tht can be weed for a Bnd veri appeations off The ota colactng layer fo, tom te ast mle WSN and the gateway, to the crs peor, ad alto the coe network can be sae ni nm cea ee ss coneemga teen aeas Smarphone compattiiesExample of satelite comectnty would include tly | ara meters that Send data to 2 remote sever, commercials updated on digital bilboards or cas via Intemet connec elumes, many Indusval purposes but pear fue where cost of satelite communication yadualy fang. the use of satelite technloay might become much more able and ineesting for consumers 2 wih WF is 2 wireless loca area nepirk: (WLAN) + Relatively high power usage 1 _rstabilty ad inconsistency of WF BLE (auetocth 40, lustooth Low Energy: Otc insoduced by Nokia and pesenty used a jor operaing syste such es 105, Andrei, Words Phone, Saber, OS % Un and Windows 8 RE wes fas low envy wage wile malting {he communis ge, scary and setup of sences Between devices, Bluetooth devices can adverse all of te services they provide. Tis rakes sing services ease, becouse relative 10 other Communication protocols i enables greterautorations fuck as secu, network address and permission tase Comparison of Wi 2 Bototh and ductat ae ose etet complement in bergen ad ge wr + aces pit cree wth an asyrneial er set etnacon whew poses al fic ‘od ough ces . aoe wl nappa were sone ders of Se Sipretin peste rd gh pede ore ee neat mess tou an reBluetooth techology mainly fds applications in the heathare, fess beacons, secuy, and home enterainmentindusies 1+ Symmenica beeen two Bletcth devices + Serves wall in simple applications where Wo vices are needed to connect with minimal configuration eg, acts and remote controls + Buetooth aces points do east athough they are ‘Any Bluetooth device in dacovereble made tarsmis the following nfornation on demand: + Eve smarprone as Blvtooth where the technology i centinveuty being upgraded and improved trough new hardware + tablished and widely used technology + Hardware cpabities changes very fest and wil eed tobe replaces + Running on tutery the Metin of an i8eacon is between Imonth 02 years +N people switch of Bluetooth, there are issues in ge ‘eriors to colect data from the endterment. THs ‘ice esa lock at some common bo sensors + anitemet of ings Gon ecosystem two things are ry important the Inemet and pycal cevies fe Sensors and acators. AS showm in Fg, 223, the botom layer of the loT system consist of Sensor‘OF THINGS (COMP. sary ~ werewer OF rane (come. 04 these can be used to manitor the temperate of sitIR Senaor Architecture ) erro srmeterr0804) (FrOseNp(8 STON) nm Tt Sensor Working a iL 2 ELEMENTS OF ty » | dowload | Ses on your Peay, enter this ae command * Mee se ; Er 8 Huey wad emote waster J Sk neon nd home enorme cone Ns og UMD inl 0. apd may atest in bob yon and € + The Da contains 8 suse mounted NTC thermistor ‘a ese humidity sensor. An C on the back of (Remade convene the esstance easements om Spear and humiy sensor ito gta output eres Celis nd Raa ey, + Mee ae Programming Steps ing the Adit DTI Python ray. We can rary sng Gt 0 if you dont have Gitwe of actor form it in nd asembling procetes Fo example, 4 be ol mgeer cyt which user sored ompresed ai energy inside 2 mea cinder to move {be working piston when the is tlesed OF nok compressed te ecaracy of the sensors at are (¢ esea eee possbe sauces of faut tat are rlnant to the Conyers pe are type of measurement shallsane OFTHINGS COMP, BATU) + Depending on the nature of the ToT system the lmporanc of at quay tat comes rom he aye of thing thin lem is indspensble. the endpoint sytem i for example prediction or ea-tie sage we have chosen Low * Te wo key pis fore operon fe sera: CT pin is an open-dein output that becomes Active when the temperature exceed programmable Cotca-tempecatie lit The INT pin alo an ope dian output that becomes active when the temperature exceeds 2 programmable Kit. The INT packet the temperature data‘DeTOAET oF TeNGS (COME. BATU Rl ae te th te = degen o red (2B20neShotMede FERS The NON seraoe then sends acne WOR insets necrn ray be more approprae fran IT appcaton 1088 2 one-shot reaieg when the nose # qaened 8 | 5 i ark 7 er grre te psy 9.251; Th trace rom te ASTI dita temperature 9.252: Interfacing the MTU21D humidity sensor 10 ress of O28 26 seer toa micecntr st sr nae 4 mrocontclerva Cin an Lo rene modevremurror nawas come, sary) 23. 9.258 wing codes once and you re 20d 690 + Br Unite most of the anquages mentioned 50 fa, 84 wes specaly designed for embedded ayes, Tal and compact and ha less merry se + ata Collections is sed for date fitering, ta ect sering, ard measurement. The protools id indecion mang by sering form rea-ime objec 1 ‘Gn work both way by collecting data fom devices oF ‘Seong dota to dees, Al the dat anasto 3 cet sere. «+ Devce Integration: Thi sftrare ensures that devices Dd and connect to netwoisfacitating information [A sable cooperation and communicationpose (COMP linked with 3ig 264: Th concpt mal f 0S 12126 Comparison between WAMP, COAP anderemerr oF anes (COMP. BAT oe 1 WAND is the only protocol tat 1s compavble with | + romser recy. > COAP an MQTT can not interact with Browess rect > For example, CoAP can be applied on 2 Frefor tn terms of messaping pater, WAMP is the only Protoco that supports RRC. > COAPi si uing the requstesponse model, + Alte tee protocol support PubSub. AS fr prowy empty and requirements WAMP suppers roxy 1g, 268 Dicoverng pint ere by Ons 5p Fig. 2.7: Requestresponte in mONS protocol +10 mai ‘ Ihe ring toplogy and to beep the Tard lemation vested for that RAL wees Sout 1 oooAs: Ffomaton Object (O10) which i wed to leep the carent rank Gere) of the node, Stein be diane of wach ade 1 be tot 07 Some speci metic, and choc the Pretered parent path % Destnaion Advertement Cbjet (DAO) RPL roves pad tafe a wel ws dowrmard rac ‘por wing DAO messages by which unicats ‘Ssinaton informacion towards the selected aren 3. D00AG infomation Soicaton 1S) whichis used by 2 nde to acquire CIO messages fom 8 reacabe ajcert node. 4 0A0 Acknowledgment (OAD-ACK) which is a response to 3 DAO message ad it sent by 8 ORO ‘ect node ke a OAO pert or DOOAG root a. 268: DOOAG topalogy 1+ A DODAG stars to be formed when the oly rot is rode which consist the DODAG, stars sending its locaton using O10 mesiage to all Low-Power Lossy Nepore (UND levels. i | «each evel ecient outers register parent path and partcpation paths for each node. They ia tum ‘propagate the IO messages andthe whole DODAG gradu iit 2 | «when the OODAG is constructed then the prefered parent eave by arvter sands 2 2 default path tonarde the rot (upon utes).7 EASo or te sore te destaaton pretes | + GLoWPAN removes alot of PVs oveheady ‘btn by DIOS of other routers in its DIO messages 1 say, vay tat asa ING data an be ogo REET Ra rostes To ssppont downard utes | single EE 8021544 hop. can ate compres gt headers 0 two bytes rowters should emit and propagate DAO messages by wicsthg tf the root trough parent These mmesages Klentty the corresponding node of acute RPL rote work under one of two modes ef operation (MOP: Non Stoning or Stonng modes In Non Starng Rede RP routes messages move towards lower levels ‘based on F source roving. whereas in Storing mose Goward rating is based on destination TAG adcresses 2242 GlowPAn © Essence Reastnameny © aerate any © Coors a ecto ces) Low power Wirtiess Personal Area Networts (WANS) |” WAH many IoT communscatons may rely on have Sars SES Cera feet Hom former ine Woe tecrocge: He teed packet san leg aout power frserrrn 17 byes for EE 8025-9 varus nds (oven fr yeas epart Sareea ee SoS we low brow, ‘orecion natn ad marae + RE sos dos topes mates odoin a fio can communicate with 20 Frogmertaton header srouid be wad # deagans erage exceed 3 angle IEE 202156 bare sing any available topology at Ra+ EPCS are casted ito four pes: 96-64-64 ‘bt aD and 64-0 GM. Al types of 64bit EPCs support bout 16000 companies wih unique identities and ‘over 1 to 9 millon pes of products and 33 rion The 96-bit ype support about 258 milion compares with unique sdenties, 16 millon elses of produce 27d 68blon sea umber for ach clas to alow the chip to communicate with the tag reader > Radio Access Network (RANI: Which handles ee a pects | Se was ca Sr fon ton ne pe wi ema coe or wel arial comma (emp it ily ond by esp ‘SFO TPR ave operates in SM bard (rund 90, e van ana Hows ransnision rate of 40 Kop. The ert veer sto spportupto 20 tops. 1+ Rowing in tis protcl is petermed by source outing meted in wich console sits be pth nse 3 pect 1+ tae as denonsate ceptable peomance ad deste beig seta mre eperone Ban Zeek tasbean aed wey nsmarhome peas +2 spleatons can bereft rom ety anc deat of thr pooch Bs oval performance has terre ta esupeta a Bgbers petra (FLUENTIALPROTOCO a pein Famer fx appcatns define beer fe sanders and pool, tee ae same ober “rere ie sect nd iterpebiy shoud tetaken ita rots and arcs in Sper of ea pts to new scat obese hereonce shoud be on to the nase rensieed na yer of the‘of THINGS (COMP. BATU) overhead. tis uy #4 OF Secon User Datagram Protocol (UDP) is a Tr ST agen ee Tinga ete ean te see eee os So tone os ap he ooo patie decree oat ee ree ee overhead and latency. Here, UDP comes into picture. For roeeeees rae commit he ofrecer we reed UP. Ses Hoh = feromora & noted UDP pers pads to be Cropped net of proesng eyed paces Tae freeing n UDP 0 ako avs tit Ut XMPP uses the TLS protocol for secur 0 wes spec be reserved and the segment wil ach the desation buttWor on te er hard eden anor eer tapas men ova 2 st 2. {Plormation sent i frst broken into smaier chunks for UDP does svppor this thereore it depends on the higher yer protocols for eats segmentation UDP doesnt implement flow contol and depends on TOP is connection oriented, ie, it cess» conection for the transmission to take place, and once the transfers over that connection is termined. UDP on the cther hand is connections jst like IP Antena Protocd, 5 Reliability: TCP sends an acknowledgement when it receives 2 ace requests a revanamasion in cave apace is JoT APPLICATION DEVELOPMENT Orsini High-Performance Data Stresming :AS 3 rl. data clecon sams crsat of undreds vem thowsnds of eecrone devices. Thrfre. fr the ttScent sveuming of uh lage volumes of Inlrmatn its racessay to tink ver independent ‘hain tat re dferen from wader packet testes + Greate an internet of Things Platform : The lot Plater is sto softare tos tat colectvey help to sptematze, store and process cata received from ect devices ana sed, Such sluions ensure the api delivery ofthe proceed resute to the end user, even inthe event of ‘he data cllecion devices fare 13.1 Developing an Internet of Thngs-Based ‘Application hardware Oevices designed to colect characterized by. Jy on levels of power consumption: [> Wee transits to support communication: > Primitive embedded OS. purchase of auch equipment not tasks for the developer, sine all Yor development of Internet of ed wih a rumber of collection of necessary ye & oud oF similar+ Develop the server-side of dat-handing algorithms, "ro srt and analyze the collected lefermation, oT ‘View of proving een data tansmision over ow- speed networs possbity of remote devce proven and ceonfguaten. : | MACHINNAIS rmacbinaia oT platfoms provides a web enabled, Iroduat and exensble Javan and Ce runtime Crarererent for developing ToT gateway applications Bato sippors a wide varety of senor and incuieg Tirkefoge,(GE platform as a sence software for indus OTH ‘sed on the concept of oud found It adds asset tronagerent device secuty and rel time, presictve Grays that alo supports beterogeneous dats equstion access. and storage. GE predx was parsing of GE and MP, te future looks even better “hingSpeak is another foT platform that lets you UT ave to wnt your own AL imine deve to abstoct data fom The good news i that a set of approaches and best at emering around the use and Aeveopment of oT device AMS. Aeady, mest. (28 there have ether open AMI or AIS that the 33.2 The Data Interface + Wit so many oT devees om there mony pinzatons ae foised on gtheing data rom al conmacted devices. Dat troes yan can be sed or such thingsa= > Determining data ptters that may requ faesoF Iainterance. Forex, data generated by jet engines cn be abe to determine whether an ergine needs. attention ahead of regulor > ita prodved by done hat are programmed to cofit) ager elds to determine the eters finigation > Data produced by a heath acy tracker may indicate atthe wearer sin danger of sfteing fom bestsuoke or het attack Acti trackers are 380 being sed 8 os physicians can use to ‘tack her patents between exis While the npes of dae acesed on devices vary (peat, common vies indudeplcng that data within tig. data systems for data ara processes to ale te data nel eve or nears tne, Dita cnc is joined at the bip with KT. Puling the data ff devices beaming eter, ad fine ara Gr be dat i where innovation i curing, For Grampa, hesttvae providers might anaes heath Cramer tate gxthe information from patient, carte patterns tat te pabert might change to rove welnes or dagnose dieses eaebout creating composites of services oud serces/APs and device sevicesAP. eer, ncuing toa for AP management and seuy ‘of THINGS (COMP. BATU) Duta Anabss Sceens ~ stata Process Control leatons Cp Cok, DaR Chart, Bl ure) * Communication Pos ~RSZ32 / RSAES / Ethernet for ‘ammurication wth machines 8 ld ntrents + Analog Input Pot for capturing deta from process sesers + Digital put 7 Output Pons for crate machine ron 4.42 Industrial Internet of Things oT) ~ Applications _______ [pant Perfomance Mentoring Grodin Power reed At Sea Wate, Spe iy (iso Caprese Sart Fee System), Quality Werk Processes, Warehouse & toverton) Solar Plant Monitoring / SCADA fnverters, Curent * Sring Mets rr Mees Entomer See),“5 Gauging = WOT Seman, Dal Gwge, VE Mirometer, Air Gauge. Pog Gwe. Hesht GO sgn Fates + Process Meitrng (Sess & Inserts, Cet Peromanes) + Monitor cess Parameters = coent VolaBe Termpertire Radiation Power Fac WEGh PSB 1+ Machine Monitoring (Assembly Machines Pray & | | ‘Secondary Packaging Machines) + Montor Machine Parametes Production Court Speed, MTBF, MTRR, Equipment Etfceng, Famed & | ‘the edge using SYSAN. The company has thousands of deioynens of SAM rong on anda types ae lone sucha wind farms and reo +H hom Wc Vara can be ed a a cetataed {et sre and wee for a dat. Toot uch 08 ‘fare Peo puto then wae ts data, ob tear to bud dia ins for ue bythe Tianate crate vue hom dapat corer ore. 35.6 oT Challenges at Becomes obvious when locking a the range of Sorage soluons on of is the lack of sandarzation inthe mae today.‘becoming inconsistent or cut of tp with copies tM datacenter, ‘+ As we move forward, the challenge for data 50709" ‘nd. data management companies i to deve0P ‘andards and tool that teat data outside the Ja center with the sme level of security and conssteoy eos * ie pil 's ooh ‘of COW. In fact, the Map sere fom Wee bed ote ay Rede estes tae Pressing eee rin Scan MEU, evelopment sjstens (Much ie doud the term grid 's chosen as an analogy to the eleial power grid that proves consistent, pervasive, dependsbe anparant access to elect power, iespecve of source) 1+ They computing concept was ceed to lan Foster ral Laboratory when be niated the‘ified user intrace via web series (sah af the “Amazon We Series) and SOA ove te Intent * Middeware i an imporant enabler which provide ‘anearaton anny hopes Sige B 8 on bev ings ad spain seve and an acon of ets Rona or application services. om E + Fig 211 shows @ general vision of CoT-based ‘deme sd es th over cnpt of a well a its positon in the design and the main ter offers and aac of midlewares. Fenty Feably son of the mostimportant apabities that a milevae can ofr olT or CoT syste. By using riddeware part of application developer concems Ihe cowed becauta 8 can handle conficing ‘sues the to eommunicton between applications. ond tings + There ae ferent kinds of Nesbit (29, response + Tansparency 82 tie or delay fenbiiy. Asa rest exbiliy moves from aplication lev! to mideeware level in oder to nate sifeent foe of Beil. I is essential to eerie which sftare of hardware components reeds ote Reb. a Thelevetof fealty is inpotant becouse high level of Fenty means mere connectiy API nd processing pert which snot enonable for mutile domains wehnns ta esorce constrained oT networks ns many completes and architectural Menace hides itn getats fom both sppiation and obec iforaeetpey can comericate wth the minimum fie acter side's cecesary tals of information esnctve festre of idceware thet caper nebhd for orem end ust on> Platform Transparency : Middleware variety of platforms, it lets org one. cording to the appliation n° plans. According to the appt © how the ders of eject yay Ths wil lead rage. the nature of software iy of COT eau Components Ineroper ved by Standardization, ratty eS 2 CoT platform should be able to te from everywhere, anytime with any jpcaions oF + Developers must use sel ed raiay te | Preventing and other acts of reora ee _ ise, een te network or Sing te Bugs Rail be eveochening.Oesgring 2 maintainable Midderar ‘rom ouset is important Providing {lrastdocertaton and feecack chet can hlphl for designing stble and extendable middleware Resource Dicovery + Ao CoF system includes muitile heterogeneous devices Thre is no reiable and global knowledge shout alabily of mentioned dees + Resource scovery is actully» proces that uted by 3 network, Afer sending a search quer, resource Ascovey protocol wil automatically choose the best resource that offers the most effective sevices and isformation 1+ For example, the process of choosing the best sensor coder toting the stem nt cenenption and et) 10 infomation tat have Beensent Working Group 05 ogy Manasing Clouds White Paper DetrtonsTeonemies and Use Cases, Sl dou Teco Fo: in, > lod Secrty Alianes: Security Guidance for oc! Aes of Foeus in oud Computing Cloud ‘ont Mari Top Treats to Cd Computing > Storage Networking Industry Assodaton: Cloud Songe Tedd Wort op, Cou! Daa forte fastest gromh Garner predicts the change of Trower 2010 (SaaS 72% PAS: 26% la: 2X) and a1 Sas. 61%, Pa 36% lan 38). Howes, this fredcion roy 28 court te earue of Pans rence on percentage among the hve SP segments{of APPLICATION DEV, OPM ower, low enKM,Collabtive, Zimby wireless enironee a8 "sey Tess envionment ang OpenProj, opt thes, PS, "rt Secaty, and Pray haves: + nat an eral fcr fr the sucess of he ‘burgeoning MCC paradigm. * Gontrctng + ruse, secre envionment is an Sen ise whichis exerted when the ene lads he tig ete fot end nd back end ees (ov wits and wad nets). vy tmes (Manyto-One MSV Viruaztin ating, Web sericea oducts. ‘ed the Internet equte novel ightwight methods ‘37.3 The Cloud of Things Architecture ‘scale and robust architectures requ to ensure ‘oper working ad implementation of a CoT bated ‘nyse. The architecture must cope wih the never + There are many top 10. tp ‘loud providers on the web with Goosle search fencing requirements of the end user along with tacking the challenges ‘The defi archtecure for Cloud of Things which rious components that constitute it Below is the cetaled desertion of 2 layered architecture along with ts various actos pening to Cloud of Things A. Sensing Layer This layer compres of the various kinds of sensors present inthe system. The work ofthe sensors i to (gate information and tranamit it o the subsequent neta 1 Sensors act asthe eyes and ears for the system and detec events and trast the colected information. Every sensor can be categorized on the ba of tree parameters namely, sensor ype, methodology and sensing parameter. 1 sensor ype defines which type of sensor itis Le error fi 9 homogeneous or 8 heterogeneous eer or it a single, dimensional or trtdmersional ent Fig. 212: Mobile loud computing architectne Open-Source $04 Projects: Zoho, fy Challenges of mice restock Pentaho, Palo Bl Suite, Jesper, Poceszmater, | Compared with 27205, Alfresco, Sugarchi,by device is allotted a unique id and address ofthat device levels. WSN oF Wireless Sensor Net ep ser ens, motors, pulleys, ete The The actuation layer comprises of robe process of ies of robotic ams, LED ‘The proces of actuation of manual aed ress aes, uD | Gana genet ae oe ‘must consider security and > The Sensor or Acustor: For ca or eampl 3 oa te tf eon war ere wile an una tom psa non 3 ding oF opening 2 vie when a Center and ensures that network bandwidth snot exceded atthe data rot equal data from all that safes defied cites how each ofthese tages is plemented wil depend, he numberof oT sensors and devices the volume a row this data i processed. An diecive JT exonsen Srentnion & one way ofFp Ht] SE any ‘whether Involved in the industil Internet or sy , leveraging the benefits FIT devices tat complement |, 2 seine uthetcton sd 5 4 afi ein a CES Connected denen ie wards for protecting dierent cost ie to create 90s of + OBE aking Sure %0 CTERE pracy Jewomanen ent va, ae So may ee a coy ans zoe ie * cial ot aptatons the moscaion of ent ita or the injection of invalid data may lead tothe ls of huran tes, for eagle in remote heath moniter ster. 1+ An stacker may intercept netwoie packets, ey ther contets nd inject them back into the network Jn rer to prevent he modfcaton of messages by mls of auty eves, message itty must be enue. + Aahantetion ees to two. ferent secutty requirements: ently aubertiction and dita org ntentation + aa ofgn autentiation ensires that 8 messige gates rom ocean ety I order to prevent the icon ofa data by maious exter devs tet aster must rode data ign athetation inject fae information into the emer by eeoring mesages and epg te Irvge et ness ens tat tacts ant ijetintrmaton. rt techno rctares (8) * Mandatory of role ferating system wait trough the use of anne ris atl pe ener ied 1 Sn . pray, whe ener eosin rerworkcbased 2c ON gat someone managed © seal motivated intative by digital cert providers. That sa the primary concer ishowto manage authentication, | Yansmting | and‘+ Avalaty ofthe foT must be reaized inthe hardvare 1 Gteny Davies: *T Gatway dees acta 3 communion tetera ad ene * ToT Gateway Devices ae emerging at ky elements in beng not-gen dees tothe tant of Ths They hep agate protec fr netwoting, he manage rage and eg ana ont dt 2 + Wegated and interelated penpecve fact da fon sec betwen ege devices od Arist prvacy can potently deliver an ip thecout protection sues inthe I. Therefore. we ave chosen Indl Delopent Ks: 2 abe stuctue as 2 modeing mecharism for secu, Inst and pvcy nthe + nds lo Development ts prove an entire, igh ‘at dezgnenvcrmet fr engineers ad sluton deveopmertindustial envrorment an be tuned ino 2 prodocion ready voit The tot requirements bp providing * tarda patos spaning For power Aiv-based designs to powetl malo fest generation nel Atom ToT issues: + aera 2 ye srt ees fo the tg a a ogee wd marge SCN Compote tecralogis am to prod innoatie sess + The weet modes of wap ad tile reg ad esl west be bet rome, meager er ad ‘sre’ seo MO md ves + Security (authorization) + Trust reputation) ‘Privacy (responded) Tiss depicted in Fig 3.14 Seadoo 0 eee ae"THs wil supplement to get infomation about home ‘Renting foe pit protection which an ge fle Sergiy idertante omerctbehesein Working uct integity of bridges and other infastucture‘+ To provide 1oT appicatons it can be in Una platform and QT eestor OE ‘+ To provide secured communication the light weight ‘xyptographic algorithms such as AES, DES wil be inplemerted + To prevent attacks in 1oT and sensor devices using light weight intrusion detection system + Sanoture Anis Teehnigue: Captured age 9 tent Snes we opened and comets tava on ses aswell as te range of sersng,2: su ran sl ‘cals grand conga eee ‘t2r to hear, The Sound Sensor can measure in esa ve op 0 908 ~stou of agrmont. Fr capuen 45 i hea sient "oc ad 50% sabato scone Laing some tance acy a4 + Stars rm 100% i anal convertion oe tthe senor omc played at normal evel and 30-100% represents a ange rom people sowing to mac fang a igh volumes. These anges are asuning 2 (Saane of sot 1 meter beeen the sound source to te Sour Sesor (2 wa ght Dependent Restor: + AotDR sa component that has 2 fal resistance tht canes wth the gb rest Wat fas won ‘Tis lows theta be ied night Sensing creat. + AlightDependet Resistor LOR isa ght contraed fatal estar The ressance of ts decreases with inrmsng indent ight tery o exhibits photo ond, An UR can be apd in ghtssive Greecor cruts, tod ght and daactvted someting eatsLop THINGS (Lum, wATU) boa const of analog . | ‘outpat pins (00-013), i g Fig A13: Block agram of ater * This si pation monitoring is based on the Block ie is oyna oatorng system. 1+ When we wil connect to Arduino then wil sense all wil gv the Plstion level in PPM (Pats 'MQU3S gas sensor wil give the output in levels and we have to conver i into PM, So fot convering the output in PPM, we have ed a ibrar for MQI3S gi sensor. + Sersor was ging Us value of $0 when there was no (gas arian the ae quality safe levels 350 PPM and # should not exceed 1000 PPM. When It exceed the Tit of 1000 PPM, then i wil cause Headaches, tepinss and stagnant, sty ir and if exceeds eyord 2000 POM tent wil cause increased heat tard ary diferent sets When te value wil and webpage wll, Pneumonia, lung and aggravetedastima. ppogeric emissions named 35 pumped into the atmosphere reaction and further ead to‘tem to use epproprine quanty of water oi oven nigaon, mn | 7 12F 1 sed to Keep the fees updated about the "eguary updsted on a wel su. ay 18 characters gern nd page sing GSM.GPRS ts LCD each characteris ether the wate spikes are ON/OFF at any shen ‘ire. A, the sensor readings are tranamited to a ‘Thing speak channel to generate graphs for ans. Ped naan | SO a ete ee rin ete om sas oi Wan van sg ogee ter stores the data to be gaye onthe ofthe amount of fresh water used in irigation aso fe, + Unplanned use of water inchertety recut in platform. Its mainly used in RF and Reet. ‘+ These decoders are mainy used for remote control applications tke burglar lar, car doo a wo scaszeP on pein = i = Ane reine col wt THE ‘and accordingly ligating the flds or the: form is used to implement the oat es anvion needed Setup uses soil mosture sss whi meant | dpe{oT CASE STUDIES «wen the sl moire i JOW the SEO" module raphicaly depicts the sensor vais, AATIPPARUSCURL. tp | Seng Rapa Tenants aes ett cnet oases AToATTPACTION- Sint be repeat ATCPSERD penal . "ie romain mon is waramitad to an ‘Online database fom where i i used to ply on 2 vretite The weopage plays the moisture contentin Si which hasbeen died into two categories: Low and igh + Pump ist be switched on when the more content slow. The testo values depend onthe ype of 0 sed * es tom eto sno we ao varied and detache Agricutwe | one of the most waterconsuming + Tiyan wesefomaten tm ol mote ero Satan the pblens cede eng maul", nd cumbersome process of irigaion by enabling fie tzaton of water exoceslcatons implemented ty “4. Desrbe how folowing 9F bt impacts wil the Internet of Things oT) ve? ‘What impacts wil the Intemet of Tings oT have ‘en Weather Monitoring Sytem? ‘hat meant by a Home Intrusion Detection inthe conte of teret of Tings 001? ‘ne Poition Monitoring ye trigation ner Mentoring Sytem (Home ntusion DetectionMODEL QUESTIOy INTERNET OF THINGS (Cor BATU) (P.2) ee Max. Marks : 199 Time : 3 Hours Instructions to the candidates : (1) Each Question carries 20 Marks (2) Attempt any five questions to the following {) Mlustrate your answers with neat sketches, diagram etc, wherever necessary te id should mention it {8) I some part or parameter is noticed to be missing, you may appropriately assume it an leary, 2 (@) Define M2M and lot technology and loT M2M application, Uo) (©) Explain fundamental device and gateways. U9) 2. (@) What is sensing in 1oT? Explain sensor types. fio (b) Explain YO Interface with architecture. fq) 3. (@) Explain implementation of device integration in IoT, fg} (®) Explain device storage Unstructured data. fg) 4 (@) Explain home automation with architecture. 9] (b) Explain air pollution ‘monitoring. No} 5. (@) Explain communication protocol, no) (©) Explain service discovery protocols in detail no, §. (2) Explain storage on cloud computing, no) (B). Explain cloud standards in detail to) Eanes For the current Semester the End Semester Examin: femplate is being provided to all the pay Per setters,
You might also like
Introduction To IoT
PDF
100% (3)
Introduction To IoT
11 pages
Iot Notes
PDF
No ratings yet
Iot Notes
33 pages
It Era Chapter 5
PDF
No ratings yet
It Era Chapter 5
34 pages
AJU191627
PDF
No ratings yet
AJU191627
34 pages
Chapter-2 IoT Final
PDF
No ratings yet
Chapter-2 IoT Final
16 pages
Unit-2 Iot
PDF
No ratings yet
Unit-2 Iot
53 pages
IOT Hands On Approach
PDF
No ratings yet
IOT Hands On Approach
514 pages
IoTUnit1pdf 2021 12 03 11 08 55
PDF
No ratings yet
IoTUnit1pdf 2021 12 03 11 08 55
63 pages
Unit - 1
PDF
No ratings yet
Unit - 1
39 pages
Sensors and IoT 1
PDF
No ratings yet
Sensors and IoT 1
39 pages
Iot Domains
PDF
No ratings yet
Iot Domains
27 pages
IOT Ch-1
PDF
No ratings yet
IOT Ch-1
68 pages
Chapter Four IoT
PDF
No ratings yet
Chapter Four IoT
47 pages
Emerging
PDF
No ratings yet
Emerging
32 pages
941ed817-c3e9-4ceb-abe5-bf22b9b387f8
PDF
No ratings yet
941ed817-c3e9-4ceb-abe5-bf22b9b387f8
35 pages
Iot Endsem
PDF
No ratings yet
Iot Endsem
19 pages
Unit 4
PDF
No ratings yet
Unit 4
16 pages
Iot Unit-1
PDF
No ratings yet
Iot Unit-1
32 pages
Internet of Things (Iot)
PDF
No ratings yet
Internet of Things (Iot)
12 pages
IOT - Micro Notes
PDF
No ratings yet
IOT - Micro Notes
2 pages
IoT Writeup
PDF
No ratings yet
IoT Writeup
21 pages
Iot CH1
PDF
No ratings yet
Iot CH1
56 pages
Iot - AITK
PDF
No ratings yet
Iot - AITK
12 pages
IOT Module 4
PDF
100% (2)
IOT Module 4
17 pages
IoT Unit I
PDF
No ratings yet
IoT Unit I
72 pages
Unit - 1 Notes Iot
PDF
No ratings yet
Unit - 1 Notes Iot
14 pages
IOT Decode - Compressed
PDF
No ratings yet
IOT Decode - Compressed
108 pages
Unit-4 Etie Notes
PDF
No ratings yet
Unit-4 Etie Notes
5 pages
Iot QB
PDF
0% (1)
Iot QB
51 pages
The Internet of Things Unit 1
PDF
No ratings yet
The Internet of Things Unit 1
27 pages
Assignments Activity #19 - Big Data Analytics Recommendation Assignments Activity #20 - Evaluating Amazon Data With EMR Notebooks
PDF
No ratings yet
Assignments Activity #19 - Big Data Analytics Recommendation Assignments Activity #20 - Evaluating Amazon Data With EMR Notebooks
36 pages
AJU191627 Removed
PDF
No ratings yet
AJU191627 Removed
31 pages
Chapter-2 IoT Final
PDF
No ratings yet
Chapter-2 IoT Final
15 pages
1iot Basics
PDF
No ratings yet
1iot Basics
5 pages
Lecturer 3.1 Hardware Components in IoT Solution
PDF
No ratings yet
Lecturer 3.1 Hardware Components in IoT Solution
48 pages
Presentation Prepared by Inocentes, Peter Charles Rahim, Haguiar Pescadero, Althea
PDF
No ratings yet
Presentation Prepared by Inocentes, Peter Charles Rahim, Haguiar Pescadero, Althea
18 pages
Internet of Things (Architecture and Design Principles) : By: Dr. Raj Kamal
PDF
100% (1)
Internet of Things (Architecture and Design Principles) : By: Dr. Raj Kamal
30 pages
Eti Chapter 2
PDF
No ratings yet
Eti Chapter 2
34 pages
Itet 4
PDF
No ratings yet
Itet 4
48 pages
Ocs 352 Iot Unit 2
PDF
No ratings yet
Ocs 352 Iot Unit 2
26 pages
IOT Notes1
PDF
No ratings yet
IOT Notes1
15 pages
Internship Report Iot
PDF
No ratings yet
Internship Report Iot
38 pages
Unit 2.3
PDF
No ratings yet
Unit 2.3
52 pages
Updated Notes Unit-1
PDF
No ratings yet
Updated Notes Unit-1
23 pages
Chapter 1
PDF
100% (3)
Chapter 1
45 pages
IOT
PDF
No ratings yet
IOT
25 pages
Iot Unit 1
PDF
No ratings yet
Iot Unit 1
49 pages
ES&IOT Unit 3
PDF
No ratings yet
ES&IOT Unit 3
28 pages
Introduction To The Internet of Things
PDF
No ratings yet
Introduction To The Internet of Things
7 pages
IoT Final Report
PDF
No ratings yet
IoT Final Report
31 pages
Internet Last
PDF
No ratings yet
Internet Last
12 pages
INTERNET OF THI-WPS Office
PDF
No ratings yet
INTERNET OF THI-WPS Office
23 pages
Internet of Things: by Abdulaziz Oumer
PDF
100% (2)
Internet of Things: by Abdulaziz Oumer
29 pages
FIoT Material
PDF
No ratings yet
FIoT Material
50 pages
Chirag IT Training
PDF
No ratings yet
Chirag IT Training
18 pages
Introduction To Iot Chapter 2 Notes
PDF
No ratings yet
Introduction To Iot Chapter 2 Notes
25 pages
IoT Unit - I
PDF
No ratings yet
IoT Unit - I
43 pages
Introduction To Internet of Things (IoT)
PDF
No ratings yet
Introduction To Internet of Things (IoT)
94 pages
The Internet of Things (IoT)
PDF
No ratings yet
The Internet of Things (IoT)
20 pages
Page 3 PDF
PDF
No ratings yet
Page 3 PDF
4 pages
Acid 01
PDF
No ratings yet
Acid 01
11 pages
A
PDF
No ratings yet
A
5 pages
HCL
PDF
No ratings yet
HCL
1 page
Paragraph Construction CRT 2.
PDF
No ratings yet
Paragraph Construction CRT 2.
4 pages