Iot and Cloud
Iot and Cloud
VIGNESH K NOTES
NC4201 INTERNET OF THINGS AND CLOUD
S
connect and exchange data. This technology allows for the collection and sharing of data from a vast network of
Computer Science (Anna University)
TE
devices, creating opportunities for more efficient and automated systems.
Internet of Things (IoT) is the networking of physical objects that contain electronics embedded within their
NO
architecture in order to communicate and sense interactions amongst each other or with respect to the
external environment. In the upcoming years, IoT-based technology will offer advanced levels of services and
practically change the way people lead their daily lives. Advancements in medicine, power, gene therapies,
agriculture, smart cities, and smart homes are just a very few of the categorical examples where IoT is strongly
K
established.
Scan to open on Studocu
IoT is network of interconnected computing devices which are embedded in everyday objects, enabling them to
H
send and receive data.
Over 9 billion ‘Things’ (physical objects) are currently connected to the Internet, as of now. In the near future,
ES
this number is expected to rise to a whopping 20 billion.
GN
Low-power embedded systems: Less battery consumption, high performance are the inverse
factors that play a significant role during the design of electronic systems.
VI
Sensors : Sensors are the major part of any IoT applications. It is a physical device that measures
and detect certain physical quantity and convert it into signal which can be provide as an input to
processing or control unit for analysis purpose.
1. Different types of Sensors :
2. Temperature Sensors
3. Image Sensors
4. Gyro Sensors
5. Obstacle Sensors
6. RF Sensor
7. IR Sensor
8. MQ-02/05 Gas Sensor
9. LDR Sensor Collect and Transmit Data : For this purpose sensors are widely used they are used as per
10. Ultrasonic Distance Sensor requirements in different application areas.
Control Units : It is a unit of small computer on a single integrated circuit containing Actuate device based on triggers produced by sensors or processing devices : If certain condition is
microprocessor or processing core, memory and programmable input/output devices/peripherals. satisfied or according to user’s requirements if certain trigger is activated then which action to
It is responsible for major processing work of IoT devices and all logical operations are carried out performed that is shown by Actuator devices.
here. Receive Information : From network devices user or device can take certain information also for
Cloud computing: Data collected through IoT devices is massive and this data has to be stored on a their analysis and processing purposes.
reliable storage server. This is where cloud computing comes into play. The data is processed and Communication Assistance : Communication assistance is the phenomena of communication
learned, giving more room for us to discover where things like electrical faults/errors are within between 2 network or communication between 2 or more IoT devices of same or different
the system. Networks. This can be achieved by different communication protocols like : MQTT , Constrained
S
Availability of big data: We know that IoT relies heavily on sensors, especially in real-time. As these Application Protocol, ZigBee, FTP, HTTP etc.
electronic devices spread throughout every field, their usage is going to trigger a massive flux of
TE
TE
big data.
Networking connection: In order to communicate, internet connectivity is a must where each
NO
NO
physical object is represented by an IP address. However, there are only a limited number of
addresses available according to the IP naming. Due to the growing number of devices, this
naming system will not be feasible anymore. Therefore, researchers are looking for another
alternative naming system to represent each physical object.
K
K
There are two ways of building IoT:
1. Form a separate internetwork including only physical objects.
H
H
2. Make the Internet ever more expansive, but this requires hard-core technologies such as rigorous
ES
ES
cloud computing and rapid big data storage (expensive).
In the near future, IoT will become broader and more complex in terms of scope. It will change the world in
GN
GN
terms of
VI
IoT Enablers:
RFIDs: uses radio waves in order to electronically track the tags attached to each physical object.
Sensors: devices that are able to detect changes in an environment (ex: motion detectors).
Nanotechnology: as the name suggests, these are extremely small devices with dimensions usually
less than a hundred nanometers.
Smart networks: (ex: mesh topology).
Working of IoT
Working with IoT Devices :
Characteristics of IoT:
Massively scalable and efficient
IP-based addressing will no longer be suitable in the upcoming future. 3) Security - 7.7%
An abundance of physical objects is present that do not use IP, so IoT is made possible.
4) Retail - 8.3%
Devices typically consume less power. When not in use, they should be automatically programmed
to sleep. Modern Applications:
A device that is connected to another device right now may not be connected in another instant of 1. Smart Grids and energy saving
time. 2. Smart cities
Intermittent connectivity – IoT devices aren’t always connected. In order to save bandwidth and 3. Smart homes/Home automation
battery consumption, devices will be powered off periodically when not in use. Otherwise, 4. Healthcare
connections might turn unreliable and thus prove to be inefficient. 5. Earthquake detection
Desired Quality of any IoT Application : 6. Radiation detection/hazardous gas detection
Interconnectivity 7. Smartphone detection
It is the basic first requirement in any IoT infrastructure. Connectivity should be guaranteed from any devices on 8. Water flow monitoring
any network then only devices in a network can communicate with each other. 9. Traffic monitoring
10. Wearables
Heterogeneity 11. Smart door lock protection system
S
There can be diversity in IoT enabled devices like different hardware and software configuration or different 12. Robots and Drones
network topologies or connections but they should connect and interact with each other despite of so much 13. Healthcare and Hospitals, Telemedicine applications
TE
TE
heterogeneity. 14. Security
Dynamic in nature 15. Biochip Transponders(For animals in farms)
IoT devices should dynamically adapt themselves to the changing surroundings like different situation and 16. Heart monitoring implants(Example Pacemaker, ECG real time tracking)
different prefaces.
NO
NO
Advantages of IoT :
Self adapting and self configuring technology
For example surveillance camera. It should be flexible to work in different weather conditions and different light
situations (morning, afternoon, or night). 1. Improved efficiency and automation of tasks.
K
Just data collection is not enough in IoT, extraction of knowledge from the generated data is very important. For
example, sensors generate data, but that data will only be useful if it is interpreted properly. So intelligence is 3. Better monitoring and control of devices and systems.
one of the key characteristics in IoT. Because data interpretation is the major part in any IoT application because
without data processing we can’t make any insights from data . Hence big data is also one of the most enabling 4. Greater ability to gather and analyze data.
H
H
technology in IoT field.
ES
ES
5. Improved decision-making.
Scalability
The number of elements (devices) connected to IoT zone is increasing day by day. Therefore, an IoT setup should
6. Cost savings.
be capable of handling the expansion. It can be either expand capability in terms of processing power, Storage,
etc. as vertical scaling or horizontal scaling by multiplying with easy cloning
GN
GN
Disadvantages of IoT :
Identity
Each IoT device has a unique identity (e.g., an IP address). This identity is helpful in communication, tracking and
to know status of the things. If there is no identification then it will directly effect security and safety of any 1. Security concerns and potential for hacking or data breaches.
VI
VI
system because without discrimination we can’t identify with whom one network is connected or with whom we
have to communicate. So there should be clear and appropriate discrimination technology available between IoT 2. Privacy issues related to the collection and use of personal data.
networks and devices.
3. Dependence on technology and potential for system failures.
Safety
Sensitive personal details of a user might be compromised when the devices are connected to the Internet. So 4. Limited standardization and interoperability among devices.
data security is a major challenge. This could cause a loss to the user. Equipment in the huge IoT network may
also be at risk. Therefore, equipment safety is also critical. 5. Complexity and increased maintenance requirements.
Architecture
6. High initial investment costs.
It should be hybrid, supporting different manufacturer’s products to function in the IoT network.
As a quick note, IoT incorporates trillions of sensors, billions of smart systems, and millions of applications. 7. Limited battery life on some devices.
Application Domains: IoT is currently found in four different popular domains: 8. Concerns about job displacement due to automation.
1) Manufacturing/Industrial business - 40.2%
2) Healthcare - 30.3% 9. Limited regulation and legal framework for IoT, which can lead to confusion and uncertainty.
IoT architecture can be explained in either three or five layers. Many agree that the three-layer model is simple
– IoT Complete Architectural Stack to understand but leaves out some key details regarding how the data is used. Below is a breakdown of each
What Is IoT Architecture? layer, what it does, and why it’s important.
IoT architecture consists of the devices, network structure, and cloud technology that allows IoT devices to Perception
communicate with each other. A basic IoT architecture consists of three layers: The perception layer represents the physical IoT devices themselves. This can include health monitors, lighting
systems, autonomous vehicles, robotics, and security systems. Each IoT device collects data that requires
Perception (the sensors, gadgets, and other devices)
processing.
Network (the connectivity between devices)
Application (the layer the user interacts with) IoT sensors are inexpensive and can collect hundreds of different data points for processing. The data collected
will vary depending on the goals of the organization. For example, agricultural IoT devices can record
S
These layers support IoT devices through data collection and processing. This architecture goes beyond the OSI atmospheric data, moisture levels, solid temperature, and airflow to improve crop yield and revenue.
model to include the transformation of data into usable information. These insights allow businesses to take
TE
TE
Transport
immediate action through the use of automation, machine learning, and artificial intelligence.
The transport layer is responsible for sending collected data to the cloud or edge device for processing.
NO
NO
The transport layer relies on internet gateways to move data from the physical perception layer into
the processing phase.
Administrators typically rely on cellular and Wi-Fi networks to move data through the transport layer.
There are a few different technologies system admins can use during this stage:
K
K
Cellular 4G LTE / 5G
H
H
Wi-Fi
Bluetooth
ES
ES
Low-Power Wide-Area Networks
GN
Administrators can design their IoT architecture with a mix and match of transport protocols.
Administrators use IoT architecture to manage and support IoT devices. IoT devices can be anything from an Ultimately the transport protocol you use should be able to reliably support data from the sensor to
internet-connected light bulb to pressure safety sensors in a chemical plant. the closest internet gateway. We cover this concept in more detail in our IoT connectivity article.
VI
VI
These devices use small sensors to collect data about their environment and send that data to a server for Processing
processing. Servers process this data to create information and insights for businesses. Many times this
Once the data reaches the cloud or edge device the server can transform this data into information.
information is used to automate tasks that improve uptime and efficiency across multiple business systems. Modern IoT architectures leverage machine learning and artificial intelligence that create value by
IoT architecture makes this all possible by ensuring data gets where it needs to and is processed correctly. analyzing this data.
Without proper IoT architecture, networks would become unreliable, defeating the entire purpose of investing For example, if an IoT sensor is recording a high fluctuation in temperature, artificial intelligence can
in IoT in the first place. alert to this anomaly by monitoring the current temperature compared to its baseline. In this case, the
server might be able to send a command to an HVAC unit to lower the temperature and resolve the
issue.
The Five Layers of IoT Architecture
Processing typically occurs without human intervention, but humans still need to tell the server what The manufacturing industry was one of the earliest adopters of IoT technology with many companies seeking a
to do when certain rules are met or thresholds are broken. The application layer is where competitive advantage. IoT sensors can help manufacturers gain insight into processes that aren’t even
administrators manage IoT device orchestration, create rule sets, and set service-level agreements for connected to the internet.
their IoT architecture.
For example, replacing manufacturing equipment is expensive and requires downtime. This leaves many
If you’ve ever used an app to turn your lights on at home, you’ve used the application layer to do so. factories relying on older machines that don’t support internet connectivity. Businesses in this case can use IoT
Reliable IoT architectures use the application layer to control and manage their networks from a sensors to collect data and wirelessly transmit that information without having to replace the machine.
centralized dashboard. This centralization reduces complexity, especially in enterprise IoT networks,
Below are some examples of how manufacturers can benefit from IoT architecture:
which in turn improves efficiency and security.
S
Business Measuring change over time through short-range IoT sensors.
Developing demand forecasts by monitoring production rate in real time.
TE
TE
Finally, we arrive at the business layer, where information is transformed into business intelligence that
Tracking the cycle time to understand your baseline efficiency.
drives decision-making. Stakeholders and executives can use the insights collected at the application
Monitoring fluid levels, conductivity, and other data points for preventive maintenance.
layer to make better business decisions.
NO
NO
The business layer typically relies on reports and live dashboards for business intelligence. Information
collected from the application layer can be enriched further at this level through other integrations. For IoT in Agriculture
example, business intelligence analysts can correlate cost savings based on electricity consumption
K
K
When we think of IoT, many of us forget that farmers are taking advantage of IoT architecture to help improve
before and after smart lighting sensors were installed.
their yield, predict outputs, and even autonomously manage their crops. A major challenge with IoT
architecture on farms was the limited infrastructure and level of coverage required.
H
H
IoT Architecture Use Cases
ES
ES
Thanks to private 5G, farmers are now able to design and build their own 5G networks to support their IoT
It’s clear how IoT architecture transforms data, but where is it most useful? Below we’ll explore a few architecture across hundreds of acres of land. A few different ways farmers use IoT architecture include the
real-world IoT architecture examples to show how these networks create value. following:
GN
GN
IoT in Healthcare
Monitoring soil temperature to plant crops as early as possible.
Hospitals and clinics can generate a lot of untapped data that could be used to improve patient care
VI
VI
Using autonomous tractors and farmer equipment powered by GPS.
and increase operational efficiency. IoT architecture can help bridge the gap between isolated patient Finding the root cause of machinery issues with root cause analysis via a mobile app.
data and the health insights doctors can use to make better decisions and respond to alerts more Automatically adjusting water, temperature, and humidity levels for indoor growing operations.
quickly.
Devices such as health monitors, EKG machines, ventilators, and staff devices generate data that can
be transformed into valuable healthcare insights. Below are a few examples: The Future of IoT Architectures with Private 5G
Real-time patient health monitoring and alerts through IoT health sensors. The future of IoT architecture is quickly evolving to keep pace with advancements in enterprise 5G network
Equipment and inventory tracking with GPS/Bluetooth-enabled sensors. evolution, which will help administrators deploy more reliable IoT architectures and process data faster than
Preventive maintenance with IoT sensors that automatically create work orders. ever before.
Private 5G allows administrators to launch their own 5G mobile network similar to how organizations
own and control their own Wi-Fi networks. Organizations using the private model have full control over
their cellular resources, budget, and coverage. IoT Enabling Technologies: Wireless Sensor Networks
In the past, IoT architecture using cellular for transport had to rely on commercial networks for service.
This presented a few problems, especially for enterprise-level operations. Commercial cellular A Wireless Sensor Network (WSN) is a collection of devices which communicate through wireless
channels. A WSN consists of distributed devices with sensors which are used to monitor the
networks can throttle bandwidth, limit speeds, or charge overage fees if data usage surpasses a set
amount. environmental and physical conditions.
This can prove disastrous for networks using IoT architecture in environments like healthcare facilities
or enterprise systems. Unfortunately, commercial 5G plans can leave IoT networks with little resources
A WSN consists of a number of end nodes, routers and coordinators. End nodes can also act as routers.
during peak traffic times when they’re needed the most.
S
A coordinator collects data from all the nodes and is connected to Internet.
Another common issue on commercial cellular networks is the lack of interoperability between the
TE
TE
cellular network and internal applications. Commercial cellular networks fail to identify internal
applications, devices, and enterprise systems. This leaves administrators with little control over how
NO
NO
they divide and control cellular resources across their IoT architecture, and apply the crucial network
security policies that are in place for enterprise connectivity.
Private 5G solves these problems by giving administrators full control over their IoT network resources,
K
K
infrastructure, and service levels. For example, with a 5G IoT network, administrators can set granular
throughput and latency SLAs for specific applications across their environment. These rules are
enforced by artificial intelligence algorithms that continuously monitor and change network conditions
H
H
to ensure SLAs are met.
ES
ES
The Celona Solution
GN
GN
Celona partners with enterprise organizations to provide private cellular 4G LTE and 5G wireless
networks as part of their IoT architecture and as a seamless turnkey solution.
VI
VI
As part of a Celona 5G LAN, cellular access points can be quickly deployed throughout an enterprise
facility, enforcing service level objectives to key IoT applications and enabling proactive monitoring on
throughput and latency requirements. Examples of WSNs used in IoT systems:
By adopting cloud networking principles, a Celona 5G LAN makes implementing private cellular wireless Weather monitoring systems
for IoT architecture and systems an out-of-box experience. With its ability to directly integrate with
Indoor air quality monitoring systems
enterprise network security policies, its onboarding can be done alongside existing wireless and IT
Soil moisture monitoring systems
infrastructure, without interrupting business operations.
Surveillance systems
If you’re building your IoT architecture and network for the future, Celona can help. Check out Smart grids
our private cellular wireless network planner to estimate the size of your Celona network indoors and Structural health monitoring systems
outdoors, or test-drive a Celona 5G LAN solution.
Cloud computing is a computing model in which applications and services are delivered over Internet. The
resources provisioned by cloud can be compute, networking or storage. Cloud allows the users to access
resources based on utility model. The characteristics of cloud computing are:
On demand: The resources in the cloud are available based on the traffic. If the incoming traffic
increases, the cloud resources scale up accordingly and when the traffic decreases, the cloud resources
scale down accordingly.
S
Autonomic: The resource provisioning in the cloud happens with very less to no human intervention.
TE
TE
The resources scale up and scale down automatically.
Scalable: The cloud resources scale up and scale down based on the demand or traffic. This property of
NO
NO
cloud is also known as elasticity.
Pay-per-use: On contrary to traditional billing, the cloud resources are billed on pay-per-use basis. You
have to pay only for the resources and time for which you are using those resources.
Ubiquitous: You can access the cloud resources from anywhere in the world from any device. All that is
K
K
needed is Internet. Using Internet you can access your files, databases and other resources in the cloud Cloud computing supports four basic deployment models. These models differ in the way how the cloud is built
from anywhere. and who are using the resources in the cloud. The four cloud deployment models are:
H
H
Public cloud
ES
ES
Private cloud
Cloud computing offers three basic service models using which users can subscribe to cloud resources. These
Community cloud
service models are:
Hybrid cloud
GN
GN
Infrastructure-As-A-Service (IAAS)
Platform-As-A-Service (PAAS)
VI
VI
Software-As-A-Service (SAAS)
These three service models can be illustrated as shown below. IAAS model provides the core infrastructure to
companies for building their own applications. This core infrastructure includes servers, storage, networking,
etc. PAAS model offers development runtimes for the users to build and deploy their application. SAAS model
offers already developed and deployed applications for the users to use. Examples of SAAS offerings are Gmail,
Facebook, DropBox, YouTube, etc.
In a public cloud the resources are shared between several users. Public cloud is generally maintained
by the cloud service provider. The management of the resources is taken care by the cloud service
provider. In a private cloud all the resources are used by a single organization. Such organization has
the complete control on the cloud and can follow all the necessary regulations. Private cloud offeres
greater flexibility when compared to the public cloud.
A community cloud is one whose resources are shared by two or more companies having shared goals.
Such clouds are generally used for conducting collaborated research. A combination of the previous
three clouds is a hybrid cloud. Big companies generally use hybrid cloud. The companies generally store
the sensitive data in the private cloud and other non-sensitive data in the public cloud. These four
types of cloud deployments are summarized in the below figure.
S
TE
TE
IoT Enabling Technologies: Communication Protocols
IoT Enabling Technologies: BigData Analytics Communications protocols form the backbone for IoT systems. They allow devices to communicate with each
NO
NO
other. Protocols define the data exchange formats, data encoding and addressing schemes for devices.
BigData is a collection of data coming from various types of sources. The data is often huge which cannot be Protocols also provide flow control, error control, and other functions.
handled by the traditional databases and data warehouses. BigData is often characterized by six Vs. They are:
K
K
Volume: Refers to the huge volume of data aggregated from various sources.
Variety: Refers to different types of data. Data can be structured, semi-structured or unstructured. IoT Enabling Technologies: Embedded Systems
Velocity: Refers to the speed at which the data is generated. Now-a-days the amount of data available
H
H
on the Internet per minute is several peta bytes or even more. Embedded system can be imagined as computing hardware with software embedded in it. An
ES
ES
Veracity: Refers to the degree to which the data can be trusted. If the data collected is incorrect or has embedded system can be an independent system or it can be a part of another larger system.
GN
Value: Refers to the business value of the collected. Even though we have huge amount of data, but it
is not useful for gaining profits in the business, such data is useless. An embedded system is a microcontroller or microprocessor based system which is designed to
Variability: Refers to the ways in which the big data can be used and formatted. perform a specific task. The key components include microcontroller/micrprocessor, memory,
VI
VI
networking units, I/O, and storage. It runs Real-Time Operating Systems (RTOS).
The data analytics framework consists of six steps namely: collection, cleaning, integration, analysis,
An embedded system has three components. They are:
visualization and alerting. These six steps can be summarized as shown in the below figure.
Hardware
Software
Real Time Operating system (RTOS) that supervises the application software and provide mechanism to
let the processor run a process as per schedule by following a plan to control the latencies
S
market. The exact value and creation of cryptocurrencies code face danger from mal-intentioned
Introduction :
hackers.
TE
TE
The Internet of Things (IoT) refers to the interconnectivity of physical devices, vehicles, home appliances, and
The blockchain companies are trying to boost security. Blockchain technology itself is not
other items embedded with electronics, software, sensors, and connectivity which enables these objects to
particularly vulnerable, but the app development process is.
connect and exchange data. The IoT concept involves extending Internet connectivity beyond traditional devices
NO
NO
6. Inadequate device security : Inadequate device security refers to the lack of proper measures to
like desktop and laptop computers, smartphones and tablets to a diverse range of devices and everyday things.
protect electronic devices such as computers, smartphones, and IoT devices from cyber attacks,
The ultimate goal of IoT is to offer advanced connectivity of devices, systems, and services that goes beyond
hacking, data theft, and unauthorized access. This can happen due to outdated software, weak
machine-to-machine communications and covers a variety of protocols, domains, and applications.
passwords, unpatched vulnerabilities, lack of encryption, and other security risks. It is important to
K
K
The Internet of Things (IoT) has fast grown to be a large part of how human beings live, communicate and do regularly update the software and implement strong security measures to ensure the security and
business. All across the world, web-enabled devices are turning our global rights into a greater switched-on area privacy of sensitive information stored on these devices. Many IoT devices have weak security
to live in. features and can be easily hacked.
H
H
There are various types of challenges in front of IoT. 7. Lack of standardization: Lack of standardization refers to the absence of agreed-upon
ES
ES
specifications or protocols in a particular field or industry. This can result in different systems,
Security challenges in IoT :
products, or processes being incompatible with each other, leading to confusion, inefficiency, and
1. Lack of encryption –
Although encryption is a great way to prevent hackers from accessing data, it is also one of the
GN
GN
decreased interoperability. For example, in the context of technology, a lack of standardization can
leading IoT security challenges.
cause difficulties in communication and data exchange between different devices and systems.
These drives like the storage and processing capabilities that would be found on a traditional
computer. Establishing standards and protocols can help overcome this and ensure uniformity and
VI
VI
The result is an increase in attacks where hackers can easily manipulate the algorithms that were
compatibility. There is a lack of standardization in IoT devices, making it difficult to secure them
designed for protection.
2. Insufficient testing and updating – consistently.
With the increase in the number of IoT(internet of things) devices, IoT manufacturers are more
8. Vulnerability to network attacks: Vulnerability to network attacks refers to the susceptibility of a
eager to produce and deliver their device as fast as they can without giving security too much of
although. network, system or device to being compromised or exploited by cyber criminals. This can happen
Most of these devices and IoT products do not get enough testing and updates and are prone to
due to weaknesses in the network infrastructure, unpatched software, poor password
hackers and other security issues.
3. Brute forcing and the risk of default passwords – management, or a lack of appropriate security measures. Network attacks can result in data theft,
Weak credentials and login details leave nearly all IoT devices vulnerable to password hacking and loss of privacy, disruption of services, and financial loss. To reduce vulnerability to network attacks,
brute force. it’s important to implement strong security measures such as firewalls, encryption, and regular
Any company that uses factory default credentials on their devices is placing both their business software updates, as well as educate users on safe internet practices. IoT devices rely on networks,
and its assets and the customer and their valuable information at risk of being susceptible to a making them vulnerable to attacks like denial-of-service (DoS) attacks.
brute force attack.
9. Unsecured data transmission: Unsecured data transmission refers to the transfer of data over a regular training on security and privacy policies. Additionally, organizations should have a plan in
network or the internet without adequate protection. This can leave the data vulnerable to place to detect, respond to, and recover from security incidents involving insiders. Employees or
interception, tampering, or theft by malicious actors. Unsecured data transmission can occur when contractors with access to IoT systems can pose a security risk if they intentionally or
data is transmitted over an unencrypted network connection or when insecure protocols are used. unintentionally cause harm.
To protect sensitive data during transmission, it is important to use secure protocols such as To address these challenges, it is important to implement security measures such as encryption, secure
SSL/TLS or VPN, and to encrypt the data before sending it. This can help to ensure the authentication, and software updates to ensure the safe and secure operation of IoT devices and systems.
confidentiality and integrity of the data, even if it is intercepted during transmission. IoT devices
Design challenge in IoT :
often transmit sensitive data, which may be vulnerable to eavesdropping or tampering if not
Design challenges in IoT (Internet of Things) refer to the technical difficulties and trade-offs involved in creating
properly secured.
connected devices that are both functional and secure. Some of the key design challenges in IoT include:
10. Privacy concerns: Privacy concerns refer to issues related to the collection, storage, use, and
Interoperability: Interoperability refers to the ability of different systems, devices, or components
S
sharing of personal information. This can include concerns about who has access to personal
information, how it is being used, and whether it is being protected from unauthorized access or to work together seamlessly and exchange data effectively. In the context of the Internet of Things
TE
TE
misuse. In the digital age, privacy concerns have become increasingly important as personal (IoT), interoperability is a critical challenge, as a large number of diverse devices are being
information is being collected and stored on an unprecedented scale. To address privacy concerns, connected to the internet. The lack of standardization in the IoT can lead to difficulties in
NO
NO
individuals and organizations need to implement appropriate security measures to protect communication and data exchange between devices, resulting in an fragmented and inefficient
personal information, be transparent about how it is being used, and respect individuals’ rights to system. To overcome this challenge, organizations and industry groups are working to establish
control their own information. Additionally, privacy laws and regulations have been established to standards and protocols to ensure interoperability between IoT devices. This includes the
provide guidelines and protections for individuals’ personal information. The vast amount of data development of common communication protocols, data formats, and security standards.
K
K
generated by IoT devices raises privacy concerns, as personal information could be collected and Interoperability is important for enabling the full potential of the IoT and allowing connected
used without consent. devices to work together effectively and efficiently. Ensuring that different IoT devices can work
11. Software vulnerabilities: Software vulnerabilities are weaknesses or flaws in software code that can together seamlessly and exchange data effectively.
H
H
be exploited by attackers to gain unauthorized access, steal sensitive information, or carry out Security: Security is a critical concern in the Internet of Things (IoT) as it involves the protection of
ES
ES
malicious activities. Software vulnerabilities can arise from errors or mistakes made during the sensitive data and systems from unauthorized access, theft, or damage. IoT devices are often
development process, or from the use of outdated or unsupported software. Attackers can exploit vulnerable to cyber attacks due to their increased exposure to the internet and their limited
computing resources. Some of the security challenges in IoT include:
GN
GN
these vulnerabilities to gain control over a system, install malware, or steal sensitive information.
To reduce the risk of software vulnerabilities, it is important for software developers to follow 1. Device security: Ensuring that IoT devices are protected from malware and unauthorized access.
secure coding practices and for users to keep their software up-to-date and properly configured. 2. Network security: Protecting the communication between IoT devices and the network from cyber
VI
VI
Additionally, organizations and individuals should implement robust security measures, such as attacks.
firewalls, antivirus software, and intrusion detection systems, to protect against potential threats. 3. Data security: Securing the data collected and transmitted by IoT devices from unauthorized
IoT devices often have software vulnerabilities, which can be exploited by attackers to gain access access or tampering.
to devices and networks. 4. Privacy: Protecting the privacy of individuals whose personal information is collected and
12. Insider threats: Insider threats refer to security risks that come from within an organization, rather transmitted by IoT devices. To address these security
than from external sources such as hackers or cyber criminals. These threats can take many forms, challenges, organizations should implement robust security measures such as encryption,
such as employees who intentionally or unintentionally cause harm to the organization, firewalls, and regular software updates. Additionally, they should conduct regular security audits
contractors who misuse their access privileges, or insiders who are coerced into compromising the and assessments to identify and address potential security risks. By prioritizing security,
security of the organization. Insider threats can result in data breaches, theft of intellectual organizations can help to protect the sensitive data and systems involved in IoT and reduce the
property, and damage to the reputation of the organization. To mitigate the risk of insider threats, risk of cyber attacks.Protecting IoT devices and the sensitive data they collect and transmit from
organizations should implement strict access controls, monitor employee activity, and provide cyber threats and unauthorized access.
Scalability: Scalability refers to the ability of a system to handle increasing workloads or numbers of many IoT devices are designed to be small, low-power, and operate using batteries. Some of the
users without a significant decline in performance. In the context of the Internet of Things (IoT), power consumption challenges in IoT include:
scalability is a major challenge as the number of connected devices is rapidly growing, leading to 1. Battery life: Ensuring that IoT devices have sufficient battery life to operate without frequent
an increased volume of data and communication. Scalability challenges in IoT include: recharging or replacement.
1. Data management: Effectively managing and storing the large amounts of data generated by IoT 2. Energy efficiency: Making sure that IoT devices are designed to use energy efficiently and reduce
devices. the overall power consumption of the system.
2. Network capacity: Ensuring that networks have sufficient capacity to handle the increased volume 3. Power management: Implementing effective power management techniques, such as sleep
of data and communication. modes, to reduce the power consumption of IoT devices when they are not in use.
3. Device management: Efficiently managing the growing number of IoT devices and ensuring that To address these power consumption challenges, organizations should adopt low-power technologies and
they can be easily configured and maintained. energy-efficient designs for IoT devices. They should also implement effective power management
S
To address these scalability challenges, organizations should adopt scalable architectures, such as cloud techniques, such as sleep modes, to reduce the power consumption of IoT devices when they are not in use.
computing, that can accommodate the growing number of IoT devices and the data they generate. By prioritizing power consumption, organizations can help ensure that their IoT systems are energy
TE
TE
Additionally, they should implement efficient data management and storage solutions, such as efficient, reducing costs and environmental impact. Minimizing the power consumption of IoT devices to
distributed databases and data lakes, to handle the increased volume of data. By prioritizing scalability, extend battery life and reduce costs.
NO
NO
organizations can ensure that their IoT systems can handle the growing number of connected devices Privacy: Privacy is a critical concern in the Internet of Things (IoT), as IoT devices collect, store, and
and continue to deliver high performance and efficiency. Designing systems that can accommodate large transmit large amounts of personal and sensitive information. Some of the privacy challenges in
numbers of connected devices and manage the resulting data flow effectively. IoT include:
1. Data collection: Ensuring that only the necessary data is collected and that it is collected in a way
Reliability: Reliability refers to the ability of a system to perform its intended function consistently
K
K
that respects individuals’ privacy rights.
and without failure over time. In the context of the Internet of Things (IoT), reliability is a critical
2. Data storage: Ensuring that the data collected by IoT devices is stored securely and that access to
concern, as the failure of even a single IoT device can have significant consequences. Some of the
it is strictly controlled.
H
H
reliability challenges in IoT include:
3. Data sharing: Controlling who has access to the data collected by IoT devices and ensuring that it is
ES
ES
1. Device failure: Ensuring that IoT devices are designed and built to be reliable and function
not shared without proper authorization.
correctly even in harsh environments.
To address these privacy challenges, organizations should implement robust privacy policies and
2. Network connectivity: Maintaining stable and reliable connections between IoT devices and the
GN
GN
procedures, such as data protection, data minimization, and data retention. They should also educate
network, even in the face of hardware or software failures.
users on the privacy implications of using IoT devices and encourage them to take steps to protect their
3. Data accuracy: Ensuring that the data collected and transmitted by IoT devices is accurate and
privacy. Additionally, organizations should adopt privacy-enhancing technologies, such as encryption
reliable.
VI
VI
and anonymization, to protect the privacy of individuals whose information is collected by IoT devices.
To address these reliability challenges, organizations should implement robust and reliable hardware and
By prioritizing privacy, organizations can help to ensure that individuals’ rights and freedoms are respected, and
software designs for IoT devices, and conduct regular testing and maintenance to identify and resolve any
that sensitive information is protected from unauthorized access or misuse. Protecting the privacy of
issues. They should also implement redundant systems and failover mechanisms to ensure that the
individuals whose personal information is collected and transmitted by IoT devices.
system continues to function in the event of a failure. By prioritizing reliability, organizations can help
ensure that their IoT systems perform consistently and without failure, delivering the intended benefits Battery life is a limitation –
and results. Ensuring that IoT systems remain functional and accessible even in the face of hardware or Issues in packaging and integration of small-sized chip with low weight and less power
software failures. consumption. If you’ve been following the mobile space, you’ve likely see how every yr it looks like
there’s no restriction in terms of display screen size. Take the upward thrust of ‘phablets’, for
Power consumption: Power consumption refers to the amount of energy that a system or device
instance, which can be telephones nearly as huge as tablets. Although helpful, the bigger monitors
uses. In the context of the Internet of Things (IoT), power consumption is a critical challenge, as
aren’t always only for convenience, rather, instead, display screen sizes are growing to
accommodate larger batteries. Computers have getting slimmer, but battery energy stays the 5. Integration: Ensuring that IoT devices and systems integrate seamlessly with existing technology
same. and infrastructure.
Increased cost and time to market – 6. Network infrastructure: Building and maintaining the network infrastructure needed to support the
Embedded systems are lightly constrained by cost. large number of connected IoT devices.
The need originates to drive better approaches when designing the IoT devices in order to handle 7. Device management: Efficiently managing and maintaining the large number of IoT devices in a
the cost modelling or cost optimally with digital electronic components. deployment.
Designers also need to solve the design time problem and bring the embedded device at the right 8. Data management: Managing and analyzing the large amounts of data generated by IoT devices,
time to the market. and integrating it with existing data systems.
Security of the system – 9. Security: Ensuring that the IoT deployment is secure from threats such as cyber attacks, data
Systems have to be designed and implemented to be robust and reliable and have to be secure breaches, and unauthorized access.
S
with cryptographic algorithms and security procedures. 10. Cost: Balancing the cost of deploying and maintaining an IoT system with the benefits it delivers.
It involves different approaches to secure all the components of embedded systems from
TE
TE
prototype to deployment. Sensors and Hardware for IoT
Designers and engineers must carefully balance these design challenges to create IoT systems that are
Sensors in Internet of Things(IoT)
NO
NO
functional, secure, and scalable.
Deployment challenges in IoT : Sensors are used for sensing things and devices etc.
The deployment of Internet of Things (IoT) systems can present several challenges, including: A device that provides a usable output in response to a specified measurement.
The sensor attains a physical parameter and converts it into a signal suitable for processing (e.g. electrical,
K
K
1. Connectivity –
mechanical, optical) the characteristics of any device or material to detect the presence of a particular physical
It is the foremost concern while connecting devices, applications and cloud platforms.
quantity.
Connected devices that provide useful front and information are extremely valuable. But poor
H
H
The output of the sensor is a signal which is converted to a human-readable form like changes in characteristics,
connectivity becomes a challenge where IoT sensors are required to monitor process data and
changes in resistance, capacitance, impedance, etc.
ES
ES
supply information.
2. Cross platform capability –
IoT applications must be developed, keeping in mind the technological changes of the future.
GN
GN
Its development requires a balance of hardware and software functions.
It is a challenge for IoT application developers to ensure that the device and IoT platform drivers
VI
VI
the best performance despite heavy device rates and fixings.
3. Data collection and processing –
In IoT development, data plays an important role. What is more critical here is the processing or
usefulness of stored data.
Along with security and privacy, development teams need to ensure that they plan well for the
way data is collected, stored or processed within an environment.
4. Lack of skill set –
All of the development challenges above can only be handled if there is a proper skilled resource
working on the IoT application development.
The right talent will always get you past the major challenges and will be an important IoT
IOT HARDWARE
application development asset.
Repeatability: The deviation between measurements in a sequence under the same conditions.
The measurements have to be made under a short enough time duration so as not to allow
Transducer : significant long-term drift.
A transducer converts a signal from one physical structure to another. Dynamic Characteristics :
It converts one type of energy into another type. Properties of the systems
It might be used as actuator in various systems. Zero-order system: The output shows a response to the input signal with no delay. It does not
Sensors characteristics : include energy-storing elements.
1. Static Ex. potentiometer measure, linear and rotary displacements.
2. Dynamic First-order system: When the output approaches its final value gradually.
1. Static characteristics : Consists of an energy storage and dissipation element.
S
It is about how the output of a sensor changes in response to an input change after steady state condition. Second-order system: Complex output response. The output response of the sensor oscillates
Accuracy: Accuracy is the capability of measuring instruments to give a result close to the true before steady state.
TE
TE
value of the measured quantity. It measures errors. It is measured by absolute and relative errors. Sensor Classification :
Express the correctness of the output compared to a higher prior system. Absolute error = Passive & Active
NO
NO
Measured value – True value Analog & digital
Relative error = Measured value/True value Scalar & vector
Range: Gives the highest and the lowest value of the physical quantity within which the sensor can 1. Passive Sensor –
actually sense. Beyond these values, there is no sense or no kind of response. Can not independently sense the input. Ex- Accelerometer, soil moisture, water level and
K
K
e.g. RTD for measurement of temperature has a range of -200`c to 800`c. temperature sensors.
Resolution: Resolution is an important specification for selection of sensors. The higher the 2. Active Sensor –
H
H
resolution, better the precision. When the accretion is zero to, it is called the threshold. Independently sense the input. Example- Radar, sounder and laser altimeter sensors.
Provide the smallest changes in the input that a sensor is able to sense. 3. Analog Sensor –
ES
ES
Precision: It is the capacity of a measuring instrument to give the same reading when repetitively The response or output of the sensor is some continuous function of its input parameter. Ex-
measuring the same quantity under the same prescribed conditions. Temperature sensor, LDR, analog pressure sensor and analog hall effect.
GN
GN
It implies agreement between successive readings, NOT closeness to the true value. 4. Digital sensor –
It is related to the variance of a set of measurements. Response in binary nature. Design to overcome the disadvantages of analog sensors. Along with
It is a necessary but not sufficient condition for accuracy. the analog sensor, it also comprises extra electronics for bit conversion. Example – Passive infrared
VI
VI
Sensitivity: Sensitivity indicates the ratio of incremental change in the response of the system with (PIR) sensor and digital temperature sensor(DS1620).
respect to incremental change in input parameters. It can be found from the slope of the output 5. Scalar sensor –
characteristics curve of a sensor. It is the smallest amount of difference in quantity that will change Detects the input parameter only based on its magnitude. The answer for the sensor is a function
the instrument’s reading. of magnitude of some input parameter. Not affected by the direction of input parameters.
Linearity: The deviation of the sensor value curve from a particularly straight line. Linearity is Example – temperature, gas, strain, color and smoke sensor.
determined by the calibration curve. The static calibration curve plots the output amplitude versus 6. Vector sensor –
the input amplitude under static conditions. The response of the sensor depends on the magnitude of the direction and orientation of input
A curve’s slope resemblance to a straight line describes linearity. parameter. Example – Accelerometer, gyroscope, magnetic field and motion detector sensors.
Drift: The difference in the measurement of the sensor from a specific reading when kept at that
value for a long period of time. Types of sensors –
Electrical sensor : The pneumatic proximity sensor is an example of a contact type sensor. These cannot be used where light
Electrical proximity sensors may be contact or non contact. components may be blown away.
Simple contact sensors operate by making the sensor and the component complete an electrical circuit. Optical sensor:
In there simplest form, optical proximity sensors operate by breaking a light beam which falls onto a light
Non- contact electrical proximity sensors rely on the electrical principles of either induction for detecting metals
sensitive device such as a photocell. These are examples of non contact sensors. Care must be exercised with
or capacitance for detecting non metals as well.
the lighting environment of these sensors for example optical sensors can be blinded by flashes from arc
Light sensor: welding processes, airborne dust and smoke clouds may impede light transmission etc.
Light sensor is also known as photo sensors and one of the important sensor.
Speed Sensor:
Light dependent resistor or LDR is a simple light sensor available today. Sensor used for detecting the speed of any object or vehicle which is in motion is known as speed sensor .For
example – Wind Speed Sensors, Speedometer ,UDAR ,Ground Speed Radar .
S
The property of LDR is that its resistance is inversely proportional to the intensity of the ambient light i.e when
the intensity of light increases, it’s resistance decreases and vise versa.
TE
TE
Temperature Sensor:
Touch sensor: Devices which monitors and tracks the temperature and gives temperature’s measurement as an electrical
Detection of something like a touch of finger or a stylus is known as touch sensor. signal are termed as temperature sensors .These electrical signals will be in the form of voltage and is directly
NO
NO
proportional to the temperature measurement .
It’s name suggests that detection of something.
PIR Sensor:
They are classified into two types:
PIR stands for passive infrared sensor and it is an electronic sensor that is used for the tracking and
K
K
1. Resistive type measurement of infrared (IR) light radiating from objects in its field of view and is also known as Pyroelectric
2. Capacitive type sensor .It is mainly used for detecting human motion and movement detection .
Today almost all modern touch sensors are of capacitive types.
H
H
Ultrasonic Sensor:
Because they are more accurate and have better signal to noise ratio. The principle of ultrasonic sensor is similar to the working principle of SONAR or RADAR in which the
ES
ES
interpretation of echoes from radio or sound waves to evaluate the attributes of a target by generating the high
Range sensing:
frequency sound waves .
Range sensing concerns detecting how near or far a component is from the sensing position, although they can
GN
GN
also be used as proximity sensors.
Distance or range sensors use non-contact analog techniques. Short range sensing, between a few millimetres EUROPA: A Case Study for Teaching Sensors, Data
VI
VI
and a few hundred millimetres is carried out using electrical capacitance, inductance and magnetic technique. Acquisition and Robotics via a ROS-Based Educational
Longer range sensing is carried out using transmitted energy waves of various types eg radio waves, sound Robot
waves and lasers. by
Mechanical sensor:
Any suitable mechanical / electrical switch may be adopted but because a certain amount of force is required to
operate a mechanical switch it is common to use micro-switches.
Pneumatic sensor:
These proximity sensors operate by breaking or disturbing an air flow.
Georgios Karalekas
, EUROPA, an extensible, open software and open hardware robotic platform is presented focusing on
teaching physics, sensors, data acquisition and robotics. EUROPA’s software infrastructure is based
οn Robot Operating System (ROS). It includes easy to use interfaces for robot control and interaction
with users and thus can easily be incorporated in Science, Technology, Engineering and Mathematics
(STEM) and robotics classes. EUROPA was designed taking into account current trends in educational
robotics. An overview of widespread robotic platforms is presented, documenting several critical
parameters of interest such as their architecture, sensors, actuators and controllers, their approximate
cost, etc. Finally, an introductory STEM curriculum developed for EUROPA and applied in a class of
high school students is presented.
Keywords:
Stavros Vologiannidis
educational robotics; data acquisition; sensors; ROS; STEM
1. Introduction
S
Robotics represents an innovative field that encompasses various scientific domains, from physics
TE
TE
and electronics to mechanical engineering, mathematics and computer programming. The vast field of
* and artificial intelligence is also relevant to autonomous robots. Educational robotics is a rapidly evolving
multidisciplinary domain that brings together educators, companies and researchers in an effort to
create a new learning environment in schools and universities. Rooted in Papert’s seminal ideas on
NO
NO
computational thinking using LOGO programming and Mindstorms [1], educational robotics is
increasingly becoming popular in the classroom. It is supportive in teaching Science, Technology,
Engineering and Mathematics (STEM) [2,3] and in some cases it transcends the traditional science
border and becomes supportive of artistic activities (STEAM) [4,5].
Introducing robots in the classroom can become a suitable tool to instill new skills in young
K
K
learners and students; besides teamwork and creativity, students can develop interest in practical
concepts in physics and mathematics and get acquainted with topics in engineering [6]. Robotics can
John Kalomiros help teachers present the concept of system engineering and control. In addition, it can motivate young
students towards STEM-oriented career paths, which has become important following the expansion of
H
H
Department of Computer, Informatics and Telecommunications Engineering, International Hellenic
technology markets and their demand for engineering graduates. Interacting with robots can even be
University, 62124 Serres, Greece
beneficial for children in a kindergarten [7,8] and it can play an important therapeutic role in special
ES
ES
*
education [9].
Author to whom correspondence should be addressed. Innovative learning based on robotics also brings about the need to develop new curricula for
schools and universities, to cover gaps in documentation for teachers and students and to develop new
GN
GN
Sensors 2020, 20(9), 2469; https://doi.org/10.3390/s20092469
products in the form of simple, low-cost mobile platforms, according to the educational level of the target
Received: 27 March 2020 / Revised: 22 April 2020 / Accepted: 23 April 2020 / Published: 27 group. On the other hand, introducing robotics courses in schools calls for the parallel development of
April 2020 methods for the assessment of new educational technologies and the dissemination of their results [10].
As robot-based technologies are becoming mainstream in schools and universities, educational
VI
VI
(This article belongs to the Special Issue Convergence of Intelligent Data Acquisition and robotics is gaining its own spin and status among researchers, markets and educators, with new
Advanced Computing Systems) emerging conferences [11], special issues [12] and products [13,14] and with a boost in the relevant
literature [15].
Download
Within the constructivist approach of Piaget [16] and Papert [17], constructing the robot can be
Browse Figures considered an integral part of the learning procedure. Construction not only stimulates the creativity and
enthusiasm of young learners through an open-ended, problem-solving process in the real world, but it
also instills technological literacy and better understanding of the different parts that make up a robot
as an engineering system. This is especially true for primary and secondary (K-12) education [18];
Versions Notes however, it can also find application in college or university education, where lab exercises on robotics
often include a basic assembly of a simple robot, like a mobile cart driven differentially. Several of the
educational bots currently available as market products allow some level of assembly of the robot from
Abstract parts, while others encourage extensions of a ready product.
Robots have become a popular educational tool in secondary education, introducing scientific, The main challenges when designing a new robotic platform for education are component
technological, engineering and mathematical concepts to students all around the globe. In this paper accessibility, flexibility and cost. It is preferable to design platforms based on commodity components
that can be easily accessed in the market and replaced when needed. The platform should be flexible
enough to adjust to different teaching scenarios. In part, this means that an educational robot should 2. State-of-the-Art Educational Platforms
best follow a modular architecture in terms of sensors and accessories and in terms of software,
especially in order to span different curricula. Finally, a low-cost platform makes an investment in robotic In this section, several well-known mobile platforms used in education are presented, starting with
technology more plausible for a large classroom, where each small group of three or four students bots that have been adopted to teach computational thinking and basic notions of programming in
elementary school, proceeding with platforms that can be used in STEM classes which enhance
should share a robot with its accessories and build several projects around it.
engineering literacy in high school and ending with projects designed to teach autonomy or test
Using open-source software and open hardware in designing an educational system is important, computer vision and navigation algorithms in university and research. Of course, this presentation
especially for high school secondary education and for university courses. Open hardware, like Arduino cannot be exhaustive, since there is a large number of products, some very successful, others very
Uno [19], with its free programming environment and community support [20] can increase the level of promising, several of low cost and some based on open hardware/software. However, we took care to
student creativity and engagement in a robotics project. Similarly, the Raspberry Pi [21], although it include those platforms that appear often in the literature on educational robotic technology or are
does not exactly represent open hardware, is supported by a large community, runs a version of the promising in our opinion to lead a trend in a specific educational level. A comparative examination of
Linux Operating System and can be programmed using Python. Python is widely taught in Informatics the technology and specifications of such successful platforms can indicate how the next generation of
lessons in various high school curricula, as is the case in Greece. Hardware boards like the above educational robotic technology is going to evolve. A reference to most of the products that are not
provide user-friendly input/output support and can be easily adopted for other technology-oriented directly presented in this section can be found in the proposed literature. Humanoids and torsos, like
extra-curricular activities, beside educational robotics. NAO [41], Pepper [42] or the Robotis OP3 [43] are becoming part of the educational robotics ecosystem;
however, this review is limited to wheeled mobile platforms with a relatively low degree of complexity
S
The power of open software in educational robotics is best exemplified by the Robot Operating and with affordable cost in the context of school/college education.
System (ROS). ROS [22] is a middleware that runs on Linux and recently on Windows 10 and has
TE
TE
become a standard for robotics, in industry, education and research. It provides easy access to complex Table 1 lists fourteen widely used educational platforms as well as our proposed EUROPA robot.
software components and communicates with a great variety of hardware, like sensors and actuators. The table presents the basic technologies supported by each platform and the level of education they
It allows the robot integration with tools for simulation and visualization [23,24,25] and with libraries for best fit in. The current approximate cost of the platform is also given, as it is suggested by the distributor.
robotic vision, artificial intelligence and Simultaneous Localization and Mapping (SLAM). These In the last column, a reference to the literature presenting the platform capabilities or its exemplary use
NO
NO
powerful functionalities transform the robot from a simple programmable automatic system to a true in class is provided. Each one of the listed systems is illustrated in Figure 1. One industrial platform,
autonomous intelligent device, compliant with the technology of the Internet of Things (IoT). the Summit-XL, is also presented as a comparative reference.
A number of educational platforms have been presented as market products and have been
introduced in various levels of education. From Beebot [26,27] to Thymio II [28,29] to Scribbler 3 [30]
and LEGO EV3 [31,32,33], the educational market has provided teachers with ingenious tools to devise
K
K
innovative lessons on almost everything. Activities range from exhibiting a practical algorithm in
kindergarten to teaching concepts on motion and automation to understanding basic programming and
the role of sensors and actuators in a control loop. More advanced platforms, like the epuck [33,34], the
H
H
Turtlebot [35] and the Duckietown [36], introduce students to the use of single board computers, path
planning and environmental mapping. They use cameras and artificial intelligence for object recognition
ES
ES
and are suitable for research on advanced stochastic algorithms for localization and mapping. More
industrial-like robotic platforms, like DaNI and VEGA, are often adopted for the needs of the
postgraduate level and for research [37]. In the same category, the Pioneer mobile platforms by Adept
have been very popular for autonomous navigation research but they are gradually replaced by a line
GN
GN
of ROS based autonomous mobile platforms, like the Leo Rover [38]. Finally, pure industrial grade robot
platforms, like the RobotnikTM Summit-XL [39] or the Husky and Jackal unmanned mobile bases by
Clearpath RoboticsTM [40], are fully ROS based customizable platforms, suitable for research projects
and industrial or agricultural applications.
VI
VI
The contribution of this paper is twofold: first, we present a comprehensive review of the state of
the art on educational robotic platforms through K12 to college and university and second, we present
EUROPA, a new educational mobile platform based on ROS, which has been developed following the
main guidelines stipulated above: constructivist approach, accessibility of parts, modular flexibility and
open hardware and software technology. The platform has been introduced in a secondary school class
following the Greek educational system and has been positively assessed by students and tutors. A
short curriculum is also proposed for the blending of robotic technology with STEM teaching, in
secondary school.
The rest of the paper is structured as follows. In Section 2 we present a comprehensive state-of-
the-art review on the technology of educational mobile platforms through various levels of education.
In Section 3 the hardware and software architecture of the proposed EUROPA platform with its ROS
software architecture is presented. In Section 4 EUROPA is studied as a paradigm of introducing a
robot in class and the assessed curriculum is outlined. A configuration of EUROPA for teaching more
advanced robotics is also proposed, aiming to lessons on autonomous driving, typically applying to
university education. Finally, Section 5 concludes the paper.
driver. It features a number of sensors, like accelerometer, thermometer and infrared proximity sensors
for obstacle avoidance. Its basic actuators are two basic motors driven differentially, a loud-speaker
and leds. The platform is expandable using accessories and is poised to evolve into a STEM teaching
tool for higher grades or possibly into a ROS platform [45].
Edison is primarily a very affordable mobile platform for teaching STEM [46]. It is equipped with a
similar range of sensors and actuators, like Thymio, although it is not as “moody” and easy to
personalize as Thymio and it does not belong to the open hardware and software camp. It can avoid
obstacles and track a line using IR sensors and can respond to sound or play music using the integrated
sound/buzzer module. It can interact with other robots using light signals. It can be programmed using
three different versions of a programming environment: EdBlocks for programming with icons,
EdScratch, using a block based visual programming style and the text based EdPy, which is a version
of the Python language.
Lego Mindstorms EV3 [32] is a kit for educational robotics, consisting of a programmable brick
and a set of motors, sensors and TECHNIC elements that can be used to assemble the robot. EV3
S
continues the line of Mindstorms NXT, featuring a more powerful ARM9 processor and 64MB RAM. It
supports Wi-Fi and Bluetooth connectivity and can be programmed using the custom programming
TE
TE
environment Lego Mindstorms EV3 Home Edition, which is based on a block-based graphic language
originating from LabVIEW, by National Instruments. This platform is widely used in competitions.
Alphabot2 is a small mobile platform by Waveshare [47] that comes in various flavors. In its cost-
NO
NO
effective version it hosts an Arduino controller, while it can also come with a Raspberry Pi or with a BBC
micro:bit microcontroller. An ultrasonic distance sensor is used in all variations for obstacle avoidance.
Alphabot2 represents open hardware and can be programmed using the Arduino IDE or Python scripts,
depending on the controller.
Scribbler 3 and Activitybot are robots powered by the well-known Propeller CPU made by Parallax
K
K
[30]. Scribbler 3 is a robust plastic platform suitable mostly for elementary education, which can be
programmed using a block-based programming language. Activitybot features a metallic chassis and a
small breadboard for adding sensors and other circuitry. Besides the block-based graphical
environment, Activitybot can also be programmed in C.
H
H
The e-puck 2 [33,34] is a small differential wheeled robot designed for research and education. It
ES
ES
is powered by a STM32F4 microcontroller and features many sensors, like IR and Time of Flight
distance sensor, IMU, color sensor, etc. It is also suitable to study swarm and evolutionary robotics. It
Figure 1. Images of the mobile robot platforms listed in Table 1. supports C programming and ROS libraries.
GN
GN
Table 1. Most widespread mobile educational platforms: target group, cost and technology. The Robobo [48,49] is different from the above and represents an interesting experiment by the
University of Coruña. It consists of a mobile base and an attached smartphone. It makes use of the
CPU power of the smartphone and of sensors incorporated in it, mainly cameras, gyroscope,
accelerometer and GPS. The robot can be programmed using a Scratch web-based editor or a text-
VI
VI
based language and aims to introduce lessons on autonomy to secondary school students [50].
The Turtlebot 3 [35] is a relatively low-priced, small size differentially driven mobile platform based
The Beebot represents a category of toy robots appropriate for teaching introductory notions of on ROS. It is an open source collaboration project by several partners [14] and it is assembled from
control. It illustrates directional language and following steps in problem solving, like in a maze. It is high quality modular parts. It is based on 3D-printed expandable chassis and is controlled by an
used widely in kindergarten and elementary education with exciting results [26]. Being a toy rather than effective controller and Single Board Computer. The main sensor of the Turtlebot is a low-cost LIDAR
a well-defined robot vehicle, it is not well documented with regard to its mechanical and electronic that is able to perform navigation tasks and SLAM. It can also be expanded by other sensors, like RGB
specifications. and RGBD camera, supported by ROS software modules. It can be used as a mobile manipulator, by
attaching a manipulator module. The Turtlebot has been used successfully in graduate education and
The mBot is an introductory small robot by Makeblock [44]. It is based on a light metal chassis research [52].
and can be assembled from parts. It can be programmed either by a block-based graphical
programming interface based on scratch or using the Arduino Integrated Development Environment The Duckietown [36] is an open project proposed by a MIT team, intended for teaching robot
(IDE). Makeblock provides STEM teaching case studies in its webpage. autonomy or individual aspects of autonomous driving, like vision or nonlinear control, at a graduate or
postgraduate level. It consists of the Duckiebots, which are open inexpensive differentially driven mobile
Thymio II is a versatile open platform suitable for all levels of K12 education, best documented bots and a model environment representing a miniature town with roads, signs and inhabitants,
with activities for elementary school. It supports six basic “behaviors”, allowing obstacle avoidance, line assembled from modular tiles. The sole sensor of the Duckiebot is a monocular camera. Vision based
following, hand following, etc [28]. It is based on a PIC24 microcontroller unit with an H-bridge for motor algorithms are responsible for lane detection, sign or object recognition and localization of the robot in
the Duckietown [13]. More advanced algorithms allow path planning using metric and topological maps Figure 2. EUROPA and its components; (a) Bottom view; (b) Side view.
as well as vision-based Simultaneous Localization and Mapping. The system supports ROS for data
transfer between software nodes. It can be expanded for the study of multirobot behavior. The cost EUROPA follows the open hardware paradigm and uses open source software. The robot can be
given in Table 1 refers to a single bot without the Duckietown. built by the students themselves, under the appropriate instructions from their teachers, providing an
opportunity for hands-on experience with principles of electricity, electronics and engineering. Although
The Leo Rover [38] is a robust open source platform designed for autonomy research in outdoor the robot can be used for Science, Technology, Mechanics and Mathematics (STEM) [2,3], it can also
environment. It is customizable by add-ons, like a manipulator, GPS module, camera, IMU, etc. The be upgraded with sensors like a LIDAR, to allow for more advanced lessons and research on robotics.
robot is driven by four independent DC gear motors with suspension system and it is powered by EUROPA is based on ROS, which provides interoperability and extensibility. Although ROS stands for
Raspberry Pi and a Core 2 ROS driver board. Although it represents an open platform with a GitHub Robot Operating System, it is really a framework that sits on top of an existing operating system such
repository, it requires extensive programming by the developer for the execution of every specific task. as GNU/Linux. EUROPA includes a camera that can be used for image processing and object
Therefore, its scope is different than that of educational boards. recognition. In addition, it supports a plethora of sensors that can be added to the Raspberry Pi board
in order to support user-defined tasks.
Finally, the Summit-XL platform by Robotnik [39] is a versatile strong frame, based on a four-
wheel skid-steering configuration, designed for high load capacity. It can be easily switched to an omni- EUROPA includes a simulation environment. The robot was described in Unified Robot
directional configuration using mecanum wheels. It features an IMU and can receive a camera and a Description Format (URDF) and is simulated in the Gazebo environment [23]. Robot simulation allows
laser scanner. It also features a default radio system for remote operation and is suitable for research children to easily and safely experiment with algorithms and develop skills related to computer
S
and surveillance. It is controlled by a PC and it is programmed with open ROS architecture. Robotnik programming. Following simulation, students will be able to choose the best performing algorithms, test
produces a line of industrial-grade robots, of which the Summit-XL is a midrange example. them on the real robot in the physical world and understand the differences between robot behavior in
TE
TE
a simulated as opposed to a real environment. In addition, using the interface of rviz [25], the popular
Beside the platforms of Table 1, a reference should be given to a slightly different flavor of visualization tool for ROS, they will be able to visualize depictions of the robot movement and easily
educational solutions, namely the kits by Vex Robotics [53] and Pitsco/Tetrix Robotics [54]. These kits control the robotic arm. Finally, they can learn concepts like odometry and sensor visualization.
provide robust metal parts, sensors, motors, electronics and other hardware for the assembly of a range
NO
NO
of robots for education, hobby and competitions. They represent an advanced constructivist approach, 3.2. EUROPA Hardware
with an average cost of a medium range kit of the order of 900 €. EUROPA is built on a double plexiglas base, which supports all the robot’s mechanical and
electronic components. A rechargeable 10000 mAh battery is included, providing power to the
The platforms presented above give a review of current educational robotic technology and trace Raspberry Pi and motors. Two differentially driven DC motors with wheels and encoder disks are
its future evolution. Table 1 reveals a gap in low-cost educational platforms based on ROS. However, responsible for EUROPA’s locomotion, allowing a speed of up to 2 m/s with 8 N cm of maximum torque.
a unifying middleware like ROS is imperative for flexibility, adaptability, ease of development and This is enough for climbing on small ramps. In addition to the wheels, the robot rests on an
K
K
community support. In addition, the above analysis shows that connectivity within a local computer omnidirectional caster ball, located on the back.
network and browser-based programming tools are definite trends. Finally, the success of educational
platforms depends on their low-cost and on the versatility of programming tools, from block-based to On the upper side, we find the Raspberry Pi 3 B+ board, a two-motor controller shield dual H-
text-based programming, covering different educational levels and needs. These virtues were exploited bridge motor driver DRV8833 [55], the Raspberry Pi Camera Module Night Vision-Adjustable Focus
H
H
in the design and implementation of the EUROPA platform. (5MP, 1080p) [56] and the robotic arm. The arm rests on a base made of 4 spacers 5 cm long screwed
directly onto the robot chassis. The two axes of the arm are 3D printed and the joints are two Mini Pan-
ES
ES
Tilt Kits powered by micro servo motors (Servo Micro plastic gears Feetech FS90, 1.5 kg·cm). The
3. Materials and Methods: Presentation of the EUROPA Platform whole construction is characterized by simplicity and ease of assembly.
3.1. Overview of EUROPA The University Edition of EUROPA features a laser scanner for 360 degrees distance
GN
GN
EUROPA (EdUcational Ros rObot PlAtform) is a two-wheel, inexpensive differential drive robot measurement (LIDAR LDS1.5 [57]). It can measure a cloud of data around the robot up to a distance
with a manipulator. It is adequately scalable and flexible to fit into different educational levels and of 3.5 m and can support experiments on Simultaneous Localization and Mapping (SLAM).
different curricula. It allows programming with introductory or more advanced tools, depending on
educational level. Its main controller is the Raspberry Pi 3 B+. An introductory presentation of the initial At the bottom of the chassis there are two encoders with led-photodiode pairs (Waveshare, 12225)
VI
VI
version of EUROPA was given in [51]. Figure 2 shows the basic EUROPA components. [58] used for odometry measurements. Finally, there is a distance meter on the front of the robot that
can be used for obstacle avoidance (Ultrasonic Sensor 2–400 cm SR04) [59]. All accessories are
connected directly to the Raspberry board without the need for extra electronic controllers. Table
2 presents the parts list and their approximate costs.
the LIDAR are installed on Raspberry Pi. The Raspberry Pi hosts several Python scripts that act as Visualization of the robot movements and odometry via rviz.
ROS nodes. For example, they collect video from the camera [60], receive input from the LIDAR [61], Control of the movements of the robotic arm through Moveit [64].
measure wheel movement via wheel encoders to calculate odometry and publish the data as ROS A node responsible for SLAM using ROS’s hector_slam [65] metapackage.
topics. A desktop computer which is running the ROS master is connected to the robot via Wi-Fi. Using
the computer, the student or teacher can run either Python scripts or ROS user interfaces (UIs) [62] to
control the movement of the robot and visualize data. The robotic arm can also be controlled via rviz or 4. Results and Discussion: EUROPA in the Real World
RQT [24,25] from the computer. Additionally, the robot can be controlled by a mobile phone, using ROS 4.1. Europa in Secondary Education
Control API without the need of a computer. Although the proposed way is to work with the robot from Most approaches to school robotics are currently focused on writing a script of code for robot
a remote computer, the student or instructor can also connect a screen and a keyboard directly to the control, along with a Lego-type construction. Usually, students do not go deeper into hardware and
Raspberry Pi and control the robot without the need of any additional device. The rviz-based user seldom do they go properly into software design concepts. The complexity of issues like motor control,
interface can also show live video from the camera and data from the ultrasonic sensor. wheel encoders and other sensors is usually hidden even from the interested student. One goal of the
EUROPA project is to provide the students with an open platform for mechatronics concepts, ranging
from introductory to advanced. The teacher can choose to present a high-level overview of the system
or to teach in depth concepts. The students can acquire hands on experience with experiments in
physics, electricity and robotics. EUROPA was tested in two Greek schools, during the first semester
S
of the school year 2019-20. A STEM curriculum with applications in sciences, engineering and
programming was designed and implemented. The target group was second-grade high school
TE
TE
students, in the Greek system, which is equivalent to tenth or eleventh grade in the K12 system (ages
16–17). The curriculum that was used is briefly described below.
4.1.1. Robot Construction
NO
NO
Figure 3. EUROPA control structure. The robot was constructed by the students with instructions from the teacher, and at the same
time, an introductory lesson on sensors and motors was given. Initially, there was a reference to voltage,
Additionally, the stream from the camera can be used to devise solutions to problems such as line
current and operation of DC motors. Past school lessons on these topics were revisited.
following, while LIDAR and odometry can be used for Simultaneous Localization and Mapping (SLAM)
[63] and navigation. 4.1.2. Motors and Sensors
The next step was to provide students with a basic understanding of the role of sensors and
K
K
ROS and Gazebo provide communication, simulation and visualization tools. These modules are
actuators. A presentation was given on servo motors and Pulse Width Modulation (PWM) was
needed to perform tasks such as image processing and sensor calibration. Robot Operating System
explained. A lesson on sensors was given, and different sensors were presented. The principle of data
allows the use of modules and applications available in the ROS ecosystem. ROS provides modules
acquisition in a digital system was introduced and the use of a library for transferring data from a sensor
for navigation, arm manipulation and SLAM. The ROS master is running on the PC, which is responsible
to a Python program was explained. Then, the principle of the distance sensor was illustrated using a
H
H
for the communication between the various nodes running on the robot and computer. Any nodes that
simple setup with a speaker and a microphone. Students were asked to calculate distance using time
run in the ROS cluster can communicate with each other by exchanging information. Information
ES
ES
of flight, revisiting first grade physics. The photo-interrupter included in EUROPA provided the
circulates in the form of messages organized in topics, to which each one node either publishes or
opportunity to introduce aspects of the interaction of light with matter. Finally, the camera was
subscribes.
introduced and a reference to image processing was made. The role of the camera in the recognition
The different nodes that exist in EUROPA robot are described below. All nodes referred to as of the environment was discussed.
GN
GN
custom nodes have been created by the EUROPA team for use with the EUROPA robot.
4.1.3. Robot Simulation
3.3.1. Nodes that Run Exclusively on the Robot In the next lesson, the robot’s simulation was presented to students using rviz [37] and Gazebo
A custom Python node for DC motor control. environments. The students were also given the Unified Robot Description Format (URDF) file
VI
VI
A custom Python node for translating position information to appropriate command signals for describing the robot. The XML file was analyzed focusing on specific physical properties of the robot.
the servo motors of the robotic arm. The students understood how a robot can be described using geometric figures and physical properties.
A node for streaming video from the camera. Then, the students experimented by changing specific parameters to the existing robot description and
A node for the LIDAR operation which publishes data using ROS hls_lfcd_lds_driver saw how the robot was affected in the virtual environment.
driver [61].
4.1.4. Writing Python Scripts for EUROPA (Part 1)
A custom Python node for publishing distance measurements collected from the distance sensor.
A custom Python node for publishing odometry data from the wheel encoders. The next lesson presented a Python script that receives input from the computer keyboard and
3.3.2. Nodes that Run either on the Remote Computer or on the Robot itself (If It is Connected translates it into robot motion commands. The students applied knowledge from lessons on circular
to a Screen and a Keyboard) motion and revisited notions on angular and linear velocity, applying them in real-world conditions.
A custom Python node for moving the robot using the keyboard. 4.1.5. Writing Python Scripts for EUROPA (Part 2)
A custom Python node for the movement of the robotic arm. The next lesson was to direct the robot to a specific position by applying the Pythagorean Theorem
A custom node to watch the video captured by the robot camera and other basic trigonometric equations. A Python script was created and explained before execution.
A custom Python node to identify color lines and to send velocity messages that control the At this point, it is important to note that students were watching the robot movements both in the
movement of the robot. simulation environment and in real life.
A custom Python node for moving the robot to a specific position on the xy plane.
3.3.3. Nodes and Simulations that Run Exclusively on the Remote Computer
Simulation of the robot in a virtual environment via the Gazebo application.
4.1.6. Data Acquisition from Wheel Encoders and Odometry Computation 4.3. Performance Evaluation Experiments
During this lesson, the students first learned to use interrupts in order to get the encoder data and 4.3.1. Odometry Evaluation
thus calculate angular velocity of each wheel. Additionally, students calculated odometry by applying During this test, we commanded the robot to traverse a predefined orthogonal path with
high school grade physics kinematics and published odometry information to ROS. dimensions 0.8 m by 2 m and return to its original position. In Figure 4, the performed path is shown in
red. The robot follows the commands quite accurately, with a most notable deviation from the
4.1.7. Controlling the Robot Arm of EUROPA (Part 1) commanded path observed during the final stages of the route. Although the robot was commanded to
The next lesson focused on the robotic arm of the robot. Geometry and algebra were linked to the end up exactly at its starting point, the difference between the end point and the starting position is 3
movement of the arm. In addition, students were introduced to the concept of torque and they were cm in the horizontal axis and 9 cm in the vertical one. The blue line corresponds to the odometry as
familiarized with it by using different gears in Lego constructions. Continuing with this lesson, a simple perceived by the robot. Odometry was measured using optical encoders. The axes units in the figure
movement of the arm was performed. A Python script for arm control was provided, and the students correspond to cm.
were asked to parameterize it. In addition, they used rviz with RQT to control the robotic arm. Different
angles for the servomotors were given, and the students tried to determine theoretically the position of
the tip of the robotic arm.
S
order to place the tip at a specific position in 3D space. In this way, they were introduced to the
importance and difficulty of the inverse kinematic problem. When they understood the difficulty of the
TE
TE
problem, the Moveit! package [64] was presented, which provides the arm with the capability to perform
complex movements using ready-made libraries and kinematic model solutions. Again, the students
had the opportunity to see the simulated and real robot repeating the same movements.
NO
NO
4.2. Advanced Robotics Course with EUROPA
With the addition of the camera and the LIDAR, EUROPA becomes an efficient platform for
teaching more advanced robotics courses. Such courses are often part of the curriculum in college or
university; however, interested high school students can be benefited as well. After a series of
introductory notions, students can continue the learning process, focusing on concepts related to
computer vision, machine learning and robot autonomy. The following experiments were demonstrated
K
K
in the same class of high school students who attended the set of lessons outlined in paragraph 4.1. Figure 4. Evaluation of odometry measurements using the optical encoders.
4.2.1. Tele-Operation of EUROPA Using the Camera 4.3.2. Mapping
This project includes tele-operation of the robot using the camera and the distance meter. Hector-SLAM is a ROS package that is able to solve the robot localization and mapping problem
H
H
Students were viewing live video from the robot’s camera displayed on their computer, and through this for a 6DOF vehicle equipped with a laser scanning system (LIDAR) and inertial sensors [66]. The
image they tele-operated the robot from their computer keyboard. To improve the movements of the
ES
ES
package fuses 3D robot attitude and position information obtained from an Inertial Measurement Unit
robot in the room, they also used distance measurement and a simple obstacle avoidance Python script. with a 2D SLAM process. The SLAM process in Hector-SLAM is based on occupancy grid mapping
combined with 2D pose estimation. At each step, the system aligns the new laser scan endpoints with
4.2.2. Line Following Using the Camera
the map learned so far. The optimization of the alignment process results in an estimate of the new
The goal of this project was to use the camera as a color sensor in order to direct EUROPA to
GN
GN
position of the robot in the 2D map. In this way, the environmental map and the robot pose are produced
follow a yellow line painted on the floor. At the beginning of the lesson, the principles of digital vision
incrementally, starting from a known pose.
sensors were explained to students and a reference was made to RGB color space. A simple
experiment with the camera and a simple user interface based on OpenCV demonstrates how object In our EUROPA robot, the movement is on a plane and only the position (x, y) and orientation ψ
VI
VI
colors are transformed in RGB values, using the camera. Then, HSV color space was introduced and on the plane is relevant. Therefore, only the 2D SLAM process is active and IMU information is not
an explanation was given as to why it is best to use HSV in conditions of unstable luminosity. A simple required. We have built a model environment, with approximate dimensions 2 m × 2 m, which can be
line-following algorithm based on color detection was presented and was applied in a Python script traversed by the robot, starting from a known initial position and completing full circles around a corridor.
based on OpenCV. The program measures deviations from the yellow line measured in pixels and At each step, the laser scanner acquires a cloud of points from the surrounding walls and computes the
transforms them into appropriate wheel speeds for the differential drive. The algorithm is robust and new change in translation and orientation, based on a transformation that gives the best alignment with
results in smooth line following, better than using the infrared sensor commonly applied to this kind of the previous map. Knowing the new pose, the occupancy grid is updated.
experiment.
In Figure 5 the environmental map created by the Hector-SLAM process is presented. Occupied
4.2.3. Simultaneous Localization and Mapping cells are shown in black, while lighter color represents empty space. The red line illustrates the ground
The last experiment introduces the advanced topic of Simultaneous Localization and Mapping truth information of the model environment. The green line is the pose as it is computed during the
(SLAM). At the beginning of the lesson, a reference was made to how the LIDAR works, and the SLAM process. The mapping was created after two loops around the corridor and the vehicle ended at
students saw a point cloud in rviz, representing the distances from the obstacles in the room. its starting position. The Hector-SLAM package does not require odometry from optical encoders as
Subsequently, reference was made to mapping and its importance in robotics. Finally, the concept of input in the process.
Bayesian update using sensor measurements was introduced in general terms and a connection was
made to similar concepts taught in mathematics lessons on probabilities. The Hector SLAM function
[65] was introduced and students saw the mapping of their classroom in rviz.
Figure 6. Line-following setup—The yellow line is the target path, the red line is the true path.
The actual robot path is shown by the red line. In Figure 7, the displacement of the robot from the
center of the yellow line is shown, measured in mm. In this figure, the horizontal axis is the distance
covered by the robot. At the starting point the robot was not in the center of the yellow line and had a
10-degree clockwise rotation. The line-following algorithm extracted color features from the image
frame captured by the camera, using the OpenCV library. A simple P-controller was selected in order
to direct the robot across its path. The P-controller was selected for educational reasons. The
oscillations observed in Figure 7 are mainly due to the simplicity of the controller.
S
TE
TE
NO
NO
K
K
Figure 5. Evaluation of the robot’s ability to create maps.
H
H
The origin of the inertial frame is considered to coincide with the starting point of the robot track.
The map was generated by teleoperating the robot with linear velocities less than 0.5 m/sec and angular Figure 7. Line-following—displacement of the robot related to the line.
ES
ES
velocities less than 0.314 rad/sec. Both the map and the pose estimation are considered to be
satisfactory for the educational purpose served by our experiment. 4.4. Assessment of EUROPA in the Classroom
The target group for the assessment was two second-grade high school classes or 22 and 23
4.3.3. Line Following Performance students in Greece of ages 16 to 17. The lessons were performed as a part of a series of technology
GN
GN
In order to assess the performance of the line following problem, we have created a yellow curved projects that have been added into the Greek curriculum during the past few years and correspond to
path of a total of 4.2 m, as in Figure 6. a weekly workload of 2 h. The main goal of EUROPA in these technology projects was to provide
students with real world science examples and a better understanding of notions that they have already
been taught in lessons such as physics, mathematics and computer science. The students were
VI
VI
acquainted with more advanced technological subjects and were motivated for independent learning
and discovery. The acceptance of the platform was enthusiastic. All students were able to follow,
understand and work on the EUROPA robots without any serious problems and some of them were
even willing to drill down to the robot’s architecture.
Regarding physics and mathematics, EUROPA’s impact was evident since among others,
students had a chance to relate theoretical kinematics and dynamics with practical robot movement.
They saw that the distribution of mass in an object can affect its movement. They applied theoretical
knowledge on rotational movement to wheel rotation and connected it to odometry calculations. They
also had a chance to apply trigonometry and vector analysis to real world problems. EUROPA also
proved to be a great medium for the introduction of students to new concepts such as sensors,
actuators, control, and physical computing. In programming lessons, the students applied programming
skills in solving real problems, which gave them a totally new incentive for writing code and
understanding programming structures. They faced the notion that hardware abstraction and standards
are particularly important in order to make sensory information usable and that working in simulation is
quite different than working in the real world.
At the end of the semester, the students had clearly a better understanding of real-world problems As one moves to an advanced level, there are custom boards for IoT projects. Also, there are custom designs for
solved by science, and their interest in technology was higher than with a similar course designed with wearables, GSM, LCD screens, USB converters, Ethernet and Bluetooth.
a LEGO-like platform. The openness of the platform and the advanced scenarios that were shown to
the children proved to be quite important to motivate them.
5. Conclusions
This paper reviews existing educational robot platforms for various levels of education, from
kindergarten to university. Our research reveals that there is a gap in the low-cost range of ROS-based
educational robotics. However, ROS-based robotics is versatile and has great potential for integration
with free simulation and visualization software, as well as with advanced sensors. A ROS-based, low-
cost platform can support advanced projects, like machine vision, machine intelligence, localization and
mapping. This gave us the incentive to build EUROPA which is a cheap and versatile open platform
based on ROS. It can cover a range of applications, from basic educational robotics to advanced
applications, such as vision and mapping. Its main controller is the Raspberry Pi, which is supported by
S
a great community and can readily use a plethora of applications. The platform is currently being
assessed in two secondary schools in Central Macedonia, Greece, under a pilot robotics curriculum.
TE
TE
Future work includes redesigning both the platform and the curriculum, after receiving feedback from
pilot schools. We also aim to build an online community, supporting students and teachers with
educational material and extensive documentation.
NO
NO
Arduino?
K
K
Arduino is a completely open-source electronics platform that was developed in Ivrea, Italy, in 2003. As an Arduino’s IoT boards
aside, the name Arduino comes from a bar where the developers often met to discuss their projects.
H
H
There are different components present in any Arduino project: boards, modules and shields. Using an easy-to-
use Arduino software, one can write code on Java, C or Python and upload it to the boards, modules or shields.
ES
ES
In addition, there are many different versions of Arduino boards that are popular. Of these, Arduino Uno is
extremely common and one of the best boards for entry-level projects.
GN
GN
VI
VI
Arduino Wi-Fi Shield
To support extra features, Arduino supports special boards called shields which are available on top of Arduino
boards.
A typical Arduino board, such as Uno, consists of different components, as shown below.
S
TE
TE
Applications of Arduino in IoT
NO
NO
Many of these projects are available at Arduino Project Hub. From automatic garage parking to baby monitors,
metal detectors and industrial robotic hands, one can learn creative IoT designs.
If you want to replicate one of these interesting projects, you can order an Arduino kit online. Arduino’s open
K
K
source community is extremely helpful and supportive to those wanting to build something of their own.
H
Power source: power usually comes from a computer USB cable to the board’s USB ports. It can also
come from a wall supply unit.
ES
ES
Analog pins: the pins numbering five or higher connect to a breadboard or other wires. As shown in the
picture, the pins are marked for voltage from 0 to 5V.
Digital pins: the pins numbering thirteen or higher provide sensitive inputs from the computer.
Accordingly, they can help power an LED, push buttons or inject programs.
GN
GN
Power LED indicator: to show whether the device is on or off, a power LED indicator comes in picture.
Micro-controller: in the above diagram, the ATmega328 micro-controller is providing signals to the
board. In fact, it is really the brain of the Arduino board.
VI
VI
Reset button: the Reset button connects the reset pin to ground and restarts any code on the Arduino.
Crystal oscillators: these provide clock signals to the ATmega328 micro-controller.
As the IoT space evolves with more interesting projects, circuit boards of Arduino or Raspberry Pi will gain huge
importance. Currently, there is hardly any IoT project where these don’t find end applications. A lot of future
articles on this site will feature projects or information relating to Arduino.
Introduction to IoT Using the Raspberry Pi With the maker movement comes a host of DIY electronic platforms, such as Arduino and Raspberry Pi. Arduino
(see Figure 2) is a small and inexpensive electronic board that allows you to connect to various external
accessories (such as sensors) and create applications to use the data collected.
One of the buzzwords used heavily in the IT industry for the past couple of years is the term IoT, which stands
for Internet of Things. IoT refers to all of the things that are, well, connected to the Internet, and that's how it
got its name. However, IoT isn't really a new concept, because for as long as we can remember, we've been
connecting devices to the Internet.
In this article, we'll take a closer look at IoT and what it means to developers. In particular, we'll use the
Raspberry Pi as an example, and explore some of the cool things that you can build using it.
The term IoT is so overused that some people in the industry are renaming it to IoE – Internet of Everything,
because almost everything is connected to the Internet in some way.
S
What the Internet of Things (IoT) Really Is
TE
TE
According to Wikipedia, IoT is defined to be:
"...the network of physical objects - devices, vehicles, buildings and other items - embedded with electronics,
NO
NO
software, sensors, and network connectivity that enables these objects to collect and exchange data".
K
K
H
H
Figure 2: The Arduino UNO board
ES
ES
Another open-source hardware platform that has gotten very popular with hobbyists these days is Raspberry Pi.
It's really a computer, by all definitions. Raspberry Pi is a low-cost, credit card-sized computer that connects to a
computer monitor or TV using HDMI, and uses a standard keyboard and mouse. It can run a host of operating
systems, such as Raspbian (Debian Linux), Android, Windows 10, IoT Core, etc.
GN
GN
Raspberry Pi has gone through a few iterations and Table 1 shows the list of Raspberry models released over the
years and their prices.
VI
VI
Of the various models, Raspberry Pi 3 (see Figure 3) and Raspberry Pi Zero (see Figure 4) stand out.
Besides data collection and data analysis, the ability to act on the data collected instantly is also an important
criterion in deciding if a system is an IoT system. If the data gathered by rain gauges installed in drains in the
previous example indicated that a particular drain has an unusually high level, the maintenance crew is alerted
and dispatched immediately to monitor and address the situation.
Another factor driving the momentous adoption of the IoT system is the rise of the maker culture. The maker
culture encourages hobbyists (and professionals alike) to create their own devices as well as tinker with existing
ones to find solutions to solve their specific problems.
The easiest way to install the Raspbian OS for the Raspberry Pi is to download NOOBS
from: https://www.raspberrypi.org/help/noobs-setup/.
The Raspbian OS boots off a micro-SD card and the entire operating system runs off the card. A typical Class 4
8GB micro-SD card is sufficient for most purposes, but you have the option to connect it to an external hard disk
or flash drive for more storage.
Once the Raspbian OS is installed, you can proceed to log into it and see a full windowed system (see Figure 5).
The default username is pi and the password is raspberry .
S
TE
TE
NO
NO
K
K
Figure 3: The Raspberry Pi 3
H
H
Figure 4: The Raspberry Pi Zero
ES
ES
Raspberry Pi 3 is the third generation of Raspberry Pi and it packs quite a formidable punch in its credit card-
sized package. Most notably, in addition to the standard features of the Raspberry Pi (such as four USB 2.0 ports Figure 5: The Raspbian OS uses the LXDE (Lightweight X11 Desktop Environment) for managing user interactions
and built-in Ethernet), it has:
Connecting the Raspberry Pi to the Outside World - GPIO Pins
GN
GN
A 1.2GHz 64-bit quad-core ARMv8 CPU The Raspberry Pi has a 40-pin GPIO (General Purpose Input/Output) connection, which makes it very easy to
802.11n Wireless LAN connect to the outside world. To connect the GPIO to external sensors, you can:
Bluetooth 4.1 Low Energy (BLE)
VI
VI
The powerful CPU coupled with Wireless LAN and Bluetooth 4.1 radio makes it an ideal candidate for IoT Connect the sensors directly to the GPIO pins using jumper wires
projects, because multiple sensors can be connected to it simultaneously. In addition, the Raspberry Pi has a 40- Connect the GPIO pins to a ribbon cable, which in turn connects it to a breadboard. The Adafruit Pi
pin GPIO (General Purpose I/O) connector for interfacing with external sensors. T-Cobbler Plus - Breakout + Cable for Raspberry Pi A+/B+/Pi 2/Pi 3 (see Figure 6) is one such
product. This option is ideal during the prototyping phase.
The Raspberry Pi Zero is the smallest Raspberry Pi ever made, and although it doesn't have a processor that's as
powerful as the Pi 3, its small size is especially suited for embedded projects (such as wearables, etc.), where
space is a premium.
One of the most popular OSs used for the Raspberry Pi is the Raspbian Operating system. The Raspbian OS is
based on the Debian OS, optimized for the Raspberry Pi hardware. The easiest way to install the Raspbian OS for
the Raspberry Pi is to download NOOBS from https://www.raspberrypi.org/help/noobs-setup/. NOOBS stands
for New Out Of Box Software.
S
TE
TE
Figure 8: The labels on the various pins on the Adafruit Pi T-Cobbler Plus
The GPIO pins on the Raspberry Pi are divided into the following groups:
NO
NO
Power: Pins that are labeled 5.0v supply 5 volts of power and those labeled 3V3 supply 3.3 volts of
power. There are two 5V pins and two 3V3 pins.
GND: These are the ground pins. There are eight ground pins.
Input/Output pins: These are the pins labeled with the # sign, for example, #17, #27, #22, etc.
K
K
These pins can be used for input or output.
Figure 6: The Adafruit Pi T-Cobbler Plus Breakout + Cable for Raspberry Pi I2C: I2C is a serial protocol for a two-wire interface to connect low-speed devices like
microcontrollers, EEPROMs, A/D and D/A converters, I/O interfaces, and other similar peripherals
For project prototyping, my favorite is using the second option: the Adafruit Pi T-Cobbler Plus. The Adafruit Pi T- in embedded systems. These pins are labeled SDA and SCL.
H
H
Cobbler Plus connects to the Raspberry Pi via a ribbon cable (see Figure 7). UART: The Universal Asynchronous Receiver/Transmitter allows your Raspberry Pi to be connected
to serial peripherals. The UART pins are labeled TXD and RXD.
ES
ES
SPI: The Serial Peripheral Interface is a synchronous serial communication interface specification
used for short distance communication, primarily in embedded systems. The SPI pins are
labeled MOSI, MISO, SCLK, CE0, and CE1.
GN
GN
ID EEPROM: Electrically Erasable Programmable Read-Only Memory is a user-modifiable read-only
memory that can be erased and written to repeatedly through the application of higher than
normal electrical voltage. The two EEPROM pins on the Raspberry Pi (EED and EEC) are also
secondary I2C ports that primarily facilitate the identification of Pi Plates (e.g., Raspberry Pi
VI
VI
Shields/Add-On Boards) that are directly attached to the Raspberry Pi.
Connecting to a Sensor to Detect Motion
To demonstrate how to use the GPIO to connect to an external sensor, we'll now use a PIR motion sensor to
detect motion. For this, I used the Parallax PIR Motion Sensor (see Figure 9). The PIR Sensor detects motion by
measuring changes in the infrared (heat) levels emitted by surrounding objects of up to three meters.
Figure 7: Connecting the Adafruit Pi T-Cobbler Plus to the Raspberry Pi
One of the advantages of using the Adafruit Pi T-Cobbler Plus is that you have a clear labeling of the various
GPIO pins (see Figure 8).
S
TE
TE
Figure 9: The Parallax PIR Motion Sensor
Figure 11: A PIR Motion sensor connected to the Raspberry Pi
The Parallax Motion sensor has three pins (see Figure 10):
GND: The ground pin. Connect this pin to the GND on the GPIO. Bonding the Raspberry Pi and the Sensors: The Python Programming Language
VCC: The voltage pin. Connect this pin to one of the 5V pins on the GPIO.
NO
NO
OUT: The output pin. Connect this to one of the Input/Output pins on the GPIO. Now that the Raspberry Pi is connected to the PIR Motion Sensor, it's time to write the code to make things
work. In the Raspbian OS, Python is a first-class citizen, and the support for Python comes right out of the box.
With its clean syntax and ease of learning, Python is a first choice for hobbyists and beginners to foray into the
world of the Raspberry Pi. Coupled with the huge community support for Python, it's no wonder that it's the
language of choice for developers.
K
K
Open a Terminal window in the Raspbian OS and create a text file by typing the following command:
H
H
ES
ES
$ nano motiondetection.py
The above command uses the NANO text editor and creates a file named motiondetection.py . Enter the
statements as shown in Listing 1.
GN
GN
Listing 1. Source code for using a PIR Motion Sensor
import RPi.GPIO as GPIO #1
import time #2
VI
VI
Figure 10: The layout of the various pins on the PIR Motion Sensor
pirsensor = 4 #3
When the PIR Motion sensor detects motion, it outputs a high signal on its output pin. You need to write an
application to read the value of this output pin. Figure 11 shows a PIR Motion sensor connected to the T- GPIO.setmode(GPIO.BCM) #4
Cobbler Plus.
Depending on the PIR Motion Sensor that you're using, the arrangement of the various pins isn't always in the GPIO.setup(pirsensor, GPIO.IN, GPIO.PUD_DOWN) #5
same order as described. It's important to verify and connect the correct pins to the correct GPIO pins.
Connecting the wrong pins to the Raspberry Pi can permanently damage the PIR Motion Sensor.
In the figure, the red line is the VCC and should be connected to the 5V pin on the GPIO. The yellow line is the previous_state = False #6
OUTPUT and is connected to pin #4 on the GPIO. The black line is the GND and should be connected to GND on
the GPIO. current_state = False
while True: #7
changes from false to true ), or that the sensor is resetting itself (when the state changes
time.sleep(0.1) #8
from true to false ) a few seconds after motion has been detected.
previous_state = current_state #9 #12: If the current state is true , it means that motion has been detected.
#13: Print out the string “Motion Detected!”
current_state = GPIO.input(pirsensor) #10 When the PIR Motion Sensor detects motion, its output will be 1 ( true ), and a few seconds later, it's
automatically reset to 0 ( false ).
if current_state != previous_state: #11
Acting on the Sensor Data
if current_state: #12
Now that the PIR Motion sensor is sensing motion, let's put it to good use. A good application of this project is
print("Motion Detected!") #13 to install the Raspberry Pi and the motion sensor at home to monitor for unexpected movement. You could
mount the sensor near your door to detect movement outside the house when there's no one at home.
When you are finished typing in the code, exit the NANO editor by pressing Ctrl-X and then pressing Y to save
the file. Press Enter to save it to the current directory. To run the Python script, type the following command in Once motion is detected, the Raspberry Pi could send a push notification to an Android device via the Google
Terminal:
S
Cloud Messaging (GCM). A detailed description of Android and GCM is beyond the scope of this article, but
here's what's required for an Android app to receive a push notification:
TE
TE
$ python motiondetection.py
Wave your hand in front of the PIR Motion Sensor. You should see the following output on Terminal: The developer of the Android application needs to apply for an API key
at https://console.developers.google.com.
NO
NO
Once the Android application is installed on the device, it needs to register with Google
programmatically to obtain a registration ID. This registration ID uniquely identifies the application
Motion Detected! on a particular device so that GCM can push a message to it.
K
Now that you've written your first Python code, it's useful to understand what it does and how it works. We'll
dissect the code line-by-line:
The RPI.GPIO is a library that allows your Python application to easily access the GPIO pins on your Raspberry Pi.
H
H
#1: The latest version of Raspbian includes the RPI.GPIO Python library pre-installed, so you can
simply import that into your Python code. The RPI.GPIO library allows your Python application to
ES
ES
easily access the GPIO pins on your Raspberry Pi. The as keyword in Python allows you to refer to
the RPI.GPIO library using the shorter name of GPIO.
#2: The application is going to insert some delays in the execution, so you need to import the time
GN
GN
module.
#3: You declare a variable named pirsensor to indicate the pin number for which the Output pin
on the PIR sensor is connected to the GPIO pin. In this example, it's GPIO pin #4.
#4: There are two ways to refer to the pins on the GPIO: either by physical pin numbers (starting
VI
VI
from pin 1 to 40 on the Raspberry Pi 2/3), or Broadcom GPIO numbers (BCM). Using BCM is very
useful with a ribbon cable (such as the Adafruit T-Cobbler Plus) to connect the Raspberry Pi to the
breadboard. The BCM numbers refer to the labels printed on the T-Cobbler Plus (see Figure 8). For
this example, we're using the BCM numbering scheme. That means that when we say we're
getting the input from pin 4, we're referring to the pin printed as #4 on the T-Cobbler Plus.
#5: Initialize the pin represented by the variable pinsensor as an input pin. Also, we use a pull-
down resistor (GPIO.PUD_DOWN) for this pin. Figure 12: How Google Push Notification works using Google Cloud Messaging (GCM)
#6: There are two variables to keep track of the state of the sensor.
#7: We use an infinite loop to check the state of the sensor repeatedly. Figure 12 summarizes the interaction between the various parties in a push notification system. In particular, it
#8: Inserts a slight delay of 0.1 second to the execution of the program shows how you can use the Raspberry Pi to send push notifications:
#9: Save the current state of the sensor. 1. The Android app sends an activation request to Google's GCM Server.
#10: The GPIO.input() function reads the value of the GPIO pin (#4 in this case). When motion is 2. When the registration is successful, the GCM Server returns a Registration ID to the app.
detected, it returns a value of true . 3. In the real world, the Registration ID should be sent to a server maintained by the developer, who
#11: Compare the previous state and the current state to see if the motion sensor has a change in will then save it into a database.
state. If there's a change, it means that either the sensor has just detected motion (when the state
4. The developer also needs to write another application to communicate with the GCM server to
post_data_json = json.dumps(post_data) #11
send the push notification to a particular user(s). In this project, we'll use the Raspberry Pi to send
the message to a user via the GCM Server.
print
5. Once the GCM server receives the message, it sends the push notification to the app.
To send a push message via Google's GCM server, you can use a variety of programming languages, such as C#,
print "Data to post to GCM Server"
Python, Node.js, etc. Because Python is already supported in Raspbian, it's natural to use it.
print "--------------------------"
Open a Terminal window in the Raspbian OS and create a text file by typing the following command:
print post_data_json
S
import requests #1
#post the data to GCM Server
TE
TE
import json #2
r = requests.post(gcm_url, data=post_data_json, #12
headers=headers)
gcm_url = "https://android.googleapis.com/gcm/send"; #3
NO
NO
print "Response from GCM Server"
K
#replace <reg_id> with your own
print "Status : ", r.status_code
reg_id = ["<Registration_ID>"] #5
print "Text : ", r.text
H
H
headers = {'content-type':'application/json', #6 print "--------------------------"
ES
ES
'authorization':'key=' + api_key}
Dissecting the Code
GN
GN
#notification payload As usual, it's useful to understand what the code is doing:
data = { #7
#1: Import the Requests Python library that helps you to send HTTP requests to a server easily
without worrying about query strings, form-encoding your POST data, etc.
VI
VI
"sender" : "Raspberry Pi",
"event" : "Motion Detected!" #2: Import the JSON library so that you can print out the data that was sent to the GCM server in
JSON format.
}
#3: The end point for Google's GCM server.
#4: The API Key that you've obtained from Google. This identifies the application developer
sending the push notification.
#create a dictionary to store the data to post
#5: The Registration ID(s) of the application receiving the notification. You get this Registration ID
from the application after it has registered with Google. In the real world, this Registration ID
post_data = {} #8 should be sent to the server maintained by the developer to provide a complete list of Registration
IDs of the app installed on the users' devices. If you want to send a push message to multiple
post_data['data'] = data #9 recipients, separate the Registration IDs with commas (,).
#6: The HTTP header to sent to the GCM server to authenticate the identity of the sender.
post_data['registration_ids'] = reg_id #10 #7: The content of the push message. Here, you're sending two key/value pairs, indicating who's
sending the message and the event. For GCM push messages, you can send multiple key/value
pairs. The Android application receiving the push message simply specifies the key(s) to extract the
#convert dictionary to JSON value(s).
#8: You create a dictionary to store the content of the push message together with the Listing 3. Calling the pushgcm.py from motiondetection.py
registration ID(s) of the recipient(s).
#9: You set the content of the push message in the dictionary. import RPi.GPIO as GPIO
#10: You set the recipient(s) of the push message.
import time
#11: You use the json.dumps() function to convert the dictionary object into a JSON string so that
you can print it out to examine its content.
import os #1
#12: You use the requests.post() function to post the push message to the GCM server.
#13: After the message was sent to the GCM server, it responds with the status. Here, you print pirsensor = 4
out the content type of the response, followed by the status of the HTTP request, as well as the
details of the sending (such as if the message was successfully sent or failed to send, the ID of the
message, etc.). GPIO.setmode(GPIO.BCM)
Before you can run the Python code to send a push notification to the Android device, you need to download
and install the Requests Python library. To do that, type the following command in Terminal : GPIO.setup(pirsensor, GPIO.IN, GPIO.PUD_DOWN)
S
$ sudo pip install requests
previous_state = False
TE
TE
Once Requests is installed, type the following command to execute the pushgcm.py script:
current_state = False
$ sudo python pushgcm.py
NO
NO
If the push message is delivered successfully to the GCM server, you should create an output similar to the
following: while True:
time.sleep(0.1)
previous_state = current_state
Data to post to GCM Server current_state = GPIO.input(pirsensor)
K
K
--------------------------
{ if current_state != previous_state:
"registration_ids": ["<Registration_ID>"],
"data": { if current_state:
H
H
"event": "Motion Detected!",
"sender": "Raspberry Pi" print("Motion Detected!")
ES
ES
}
} os.system("python pushgcm.py") #2
--------------------------
In line #1, you need to import the os module so that when motion is detected you can use
GN
GN
Response from GCM Server
------------------------ the os.system() function (in line #2) to perform a shell operation - specifically, to execute
Header : application/json; charset=UTF-8 the pushgcm.py script.
Status : 200
Summary
VI
VI
Text : {
"multicast_id":8838766867169688347,
"success":1, In this article, we've attempted to define what an IoT system is and to illustrate it with a very simple and
"failure":0, practical example: using the Raspberry Pi and detect motion and triggering a push notification when one is
"canonical_ids":0, detected. We welcome your comments and ideas on the IoT systems that you've built.
"results": [
{
Pull-Up and Pull-Down Resistors
"message_id":"0:1461392749167691%62851a86f9fd7ecd"
} A GPIO pin's value floats between 0 and 1 if it isn't connected to voltage. This is known as “floating.” In the case
] of the GPIO pin connected to the output value of the PIR Motion Sensor, the GPIO pin's value is undefined
} before the sensor detects any motion. In this case, you need to use a pull-down resistor to always “pull-down”
-------------------------- (GPIO.PUD_DOWN) the value to 0, so that you can be sure that the only time the pin value changes to 1 is when
To complete this project, you need to modify the motiondetection.py script so that when a motion is detected, the sensor detects motion.
the pushgcm.py script is called to send a push notification to the Android application. Listing 3 shows the
addition.
Likewise, you can also configure a GPIO pin using the pull-up resistor (GPIO.PUD_UP). Instead of setting a pin
value to always 0, a pull-up resistor “pulls-up” the value to 1. This is useful in cases where some sensors (such as
push buttons) set the GPIO pin to 0 when triggered (e.g., the button is pushed).
Google Cloud Messaging (GCM) allows an Android application to receive push notification from an application
developer even if the application isn't running. To learn more about GCM, head
to https://console.cloud.google.com/projectselector2/home/dashboard for a detailed description on how you
can enable your Android apps to use GCM to receive push notifications.
Table 1: The Raspberry models released over the years
Models Price
S
TE
TE
Raspberry P1 Model A US $25
NO
NO
Raspberry P1 Model B US $35
K
Raspberry P2 Model B US $35
H
Raspberry P1 Zero US $5
ES
ES
GN
GN
VI
VI
Downloaded by Hopeserveenterprises Hope ([email protected]) Downloaded by Hopeserveenterprises Hope ([email protected])
lOMoARcPSD|42770001 lOMoARcPSD|42770001
Types
There are two available versions of NodeMCU as version 0.9 & 1.0 where the version 0.9 contains ESP-12 and
version 1.0 contains ESP-12E where E stands for "Enhanced".[11]
S
Pins[edit]
TE
TE
NodeMCU provides access to the GPIO (General Purpose Input/Output) and a pin mapping table is part of the
API documentation.[19]
NO
NO
I/O ESP8266
index pin
0 [*] GPIO16
K
K
1 GPIO5
H
H
ES
ES
2 GPIO4
NodeMCU is an open source firmware for which open source prototyping board designs are available. The name
GN
GN
"NodeMCU" combines "node" and "MCU" (micro-controller unit).[8] Strictly speaking, the term "NodeMCU"
refers to the firmware rather than the associated development kits.[citation needed] 3 GPIO0
Both the firmware and prototyping board designs are open source.[8]
VI
VI
The firmware uses the Lua scripting language. The firmware is based on the eLua project, and built on the 4 GPIO2
Espressif Non-OS SDK for ESP8266. It uses many open source projects, such as lua-cjson[9] and SPIFFS.[10] Due to
resource constraints, users need to select the modules relevant for their project and build a firmware tailored to
their needs. Support for the 32-bit ESP32 has also been implemented.
5 GPIO14
The prototyping hardware typically used is a circuit board functioning as a dual in-line package (DIP) which
integrates a USB controller with a smaller surface-mounted board containing the MCU and antenna. The choice
of the DIP format allows for easy prototyping on breadboards. The design was initially based on the ESP-12
module of the ESP8266, which is a Wi-Fi SoC integrated with a Tensilica Xtensa LX106 core, widely used in IoT 6 GPIO12
applications (see related projects).
7 GPIO13
8 GPIO15
11 GPIO9
12 GPIO10
[*] D0 (GPIO16) can only be used for GPIO read/write. It does not support open-drain/interrupt/PWM/I²C or 1-
S
Wire.
TE
TE
NO
NO
K
K
An overview of protocols involved in Internet of Things devices and applications. Help clarify with IoT layer
technology stack and head-to-head comparisons.
The Internet of Things covers a huge range of industries and use cases that scale from a single constrained
H
H
device up to massive cross-platform deployments of embedded technologies and cloud systems connecting in
ES
ES
real-time.
Tying it all together are numerous legacy and emerging communication protocols that allow devices and servers
GN
GN
to talk to each other in new, more interconnected ways.
VI
VI
At the same time, dozens of alliances and coalitions are forming in hopes of unifying the fractured and organic
IoT landscape.
Infrastructure
IPv6 - "IPv6, is an Internet Layer protocol for packet-switched internetworking and provides end-to-end
datagram transmission across multiple IP networks.
6LoWPAN - "6LoWPAN is an acronym of IPv6 over Low power Wireless Personal Area Networks. It is an adaption
layer for IPv6 over IEEE802.15.4 links. This protocol operates only in the 2.4 GHz frequency range with 250 kbps
transfer rate."
UDP (User Datagram Protocol) - A simple OSI transport layer protocol for client/server network applications
based on Internet Protocol (IP). UDP is the main alternative to TCP and one of the oldest network protocols in
existence, introduced in 1980. UDP is often used in applications specially tuned for real-time performance.
- QUIC (Quick UDP Internet Connections, pronounced quick) supports a set of multiplexed connections between
S
two endpoints over User Datagram Protocol (UDP), and was designed to provide security protection equivalent
to TLS/SSL, along with reduced connection and transport latency, and bandwidth estimation in each direction to
TE
TE
avoid congestion.
- Aeron - Efficient reliable UDP unicast, UDP multicast, and IPC message transport.
NO
NO
uIP - The uIP is an open source TCP/IP stack capable of being used with tiny 8- and 16-bit microcontrollers. It
was initially developed by Adam Dunkels of the "Networked Embedded Systems" group at the Swedish Institute
of Computer Science, licensed under a BSD style license, and further developed by a wide group of developers.
DTLS (Datagram Transport Layer) - "The DTLS protocol provides communications privacy for datagram protocols.
K
K
The protocol allows client/server applications to communicate in a way that is designed to prevent
The following Channel Guide:
eavesdropping, tampering, or message forgery. The DTLS protocol is based on the Transport Layer Security (TLS)
Provides overview list of popular protocols and standards helping power IoT devices, apps and
protocol and provides equivalent security guarantees."
H
H
applications
ROLL / RPL (IPv6 routing for low power/lossy networks)
ES
ES
Drill down on specific layers or industry specific protocols
NanoIP
List head-to-head comparisons of popular protocols (ie: mqtt vs xmpp)
"NanoIP, which stands for the nano Internet Protocol, is a concept that was created to bring Internet-like
GN
GN
networking services to embedded and sensor devices, without the overhead of TCP/IP. NanoIP was designed
Protocols with minimal overheads, wireless networking, and local addressing in mind."
Rather than trying to fit all of the IoT Protocols on top of existing architecture models like OSI Model, we have Content-Centric Networking (CCN) - Technical Overview
VI
VI
broken the protocols into the following layers to provide some level of organization: "Next-gen network architecture to solve challenges in content distribution scalability, mobility, and security.
1. Infrastructure (ex: 6LowPAN, IPv4/IPv6, RPL) CCN directly routes and delivers named pieces of content at the packet level of the network, enabling automatic
2. Identification (ex: EPC, uCode, IPv6, URIs) and application-neutral caching in memory wherever it’s located in the network. The result? Efficient and
3. Comms / Transport (ex: Wifi, Bluetooth, LPWAN) effective delivery of content wherever and whenever it is needed. Since the architecture enables these caching
4. Discovery (ex: Physical Web, mDNS, DNS-SD) effects as an automatic side effect of packet delivery, memory can be used without building expensive
5. Data Protocols (ex: MQTT, CoAP, AMQP, Websocket, Node) application-level caching services."
6. Device Management (ex: TR-069, OMA-DM) Time Synchronized Mesh Protocol (TSMP)
7. Semantic (ex: JSON-LD, Web Thing Model) A communications protocol for self-organizing networks of wireless devices called motes. TSMP devices stay
8. Multi-layer Frameworks (ex: Alljoyn, IoTivity, Weave, Homekit) synchronized to each other and communicate in timeslots, similar to other TDM (time-division multiplexing)
Security systems.
Industry Vertical (Connected Home, Industrial, etc) Discovery
mDNS (multicast Domain Name System) - Resolves host names to IP addresses within small networks that do Mihini/M3DA
not include a local name server. "The Mihini agent is a software component that acts as a mediator between an M2M server and the
Physical Web - The Physical Web enables you to see a list of URLs being broadcast by objects in the environment applications running on an embedded gateway. M3DA is a protocol optimized for the transport of binary M2M
around you with a Bluetooth Low Energy (BLE) beacon. data. It is made available in the Mihini project both for means of Device Management, by easing the
HyperCat - An open, lightweight JSON-based hypermedia catalogue format for exposing collections of URIs. manipulation and synchronization of a device's data model, and for means of Asset Management, by allowing
UPnP (Universal Plug and Play) - Now managed by the Open Connectivity Foundation is a set of networking user applications to exchange typed data/commands back and forth with an M2M server, in a way that
protocols that permits networked devices to seamlessly discover each other's presence on the network and optimizes the use of bandwidth"
establish functional network services for data sharing, communications, and entertainment. AMQP (Advanced Message Queuing Protocol)
Data Protocols "An open standard application layer protocol for message-oriented middleware. The defining features of AMQP
MQTT (Message Queuing Telemetry Transport) are message orientation, queuing, routing (including point-to-point and publish-and-subscribe), reliability and
S
"The MQTT protocol enables a publish/subscribe messaging model in an extremely lightweight way. It is useful security."
for connections with remote locations where a small code footprint is required and/or network bandwidth is at - Additional Resources
TE
TE
a premium." DDS (Data-Distribution Service for Real-Time Systems)
-Additional resources "The first open international middleware standard directly addressing publish-subscribe communications for
NO
NO
MQTT-SN (MQTT For Sensor Networks) - An open and lightweight publish/subscribe protocol designed real-time and embedded systems."
specifically for machine-to-machine and mobile applications JMS (Java Message Service) - A Java Message Oriented Middleware (MOM) API for sending messages between
-Mosquitto: An Open Source MQTT v3.1 Broker two or more clients.
- IBM MessageSight
K
K
CoAP (Constrained Application Protocol) LLAP (lightweight local automation protocol)
"CoAP is an application layer protocol that is intended for use in resource-constrained internet devices, such as "LLAP is a simple short message that is sent between inteligent objects using normal text, it's not like TCP/IP,
WSN nodes. CoAP is designed to easily translate to HTTP for simplified integration with the web, while also bluetooth, zigbee, 6lowpan, WiFi etc which achieve at a low level "how" to move data around. This means LLAP
H
H
meeting specialized requirements such as multicast support, very low overhead, and simplicity. The CoRE group can run over any communication medium. The three strengths of LLAP are, it'll run on anything now, anything in
ES
ES
has proposed the following features for CoAP: RESTful protocol design minimizing the complexity of mapping the future and it's easily understandable by humans."
with HTTP, Low header overhead and parsing complexity, URI and content-type support, Support for the LWM2M (Lightweight M2M)
GN
GN
discovery of resources provided by known CoAP services. Simple subscription for a resource, and resulting push "Lightweight M2M (LWM2M) is a system standard in the Open Mobile Alliance. It includes DTLS, CoAP, Block,
notifications, Simple caching based on max-age." Observe, SenML and Resource Directory and weaves them into a device-server interface along with an Object
-Additional resources structure."
VI
VI
- SMCP — A C-based CoAP stack which is suitable for embedded environments. Features include: Support draft- SSI (Simple Sensor Interface)
ietf-core-coap-13, Fully asynchronous I/O, Supports both BSD sockets and UIP. "a simple communications protocol designed for data transfer between computers or user terminals and smart
STOMP - The Simple Text Oriented Messaging Protocol sensors"
XMPP (Extensible Messaging and Presence Protocol) Reactive Streams
"An open technology for real-time communication, which powers a wide range of applications including instant "A standard for asynchronous stream processing with non-blocking back pressure on the JVM."
messaging, presence, multi-party chat, voice and video calls, collaboration, lightweight middleware, content ONS 2.0
syndication, and generalized routing of XML data." REST (Representational state transfer) - RESTful HTTP
-Additional resources -Additional Resources in context of IoT
- XMPP-IoT HTTP/2 - Enables a more efficient use of network resources and a reduced perception of latency by introducing
"In the same manor as XMPP silently has created people to people communication interoperable. We are header field compression and allowing multiple concurrent exchanges on the same connection.
aiming to make communication machine to people and machine to machine interoperable."
spectrum ("ISM band") to communicate by establishing standard rules for co-existence, data representation,
SOAP (Simple Object Access Protocol), JSON/XML, WebHooks, Jelastic, MongoDB signalling, authentication and error detection.
Websocket Bluetooth
The WebSocket specification—developed as part of the HTML5 initiative—introduced the WebSocket JavaScript Bluetooth works in the 2.4 GHz ISM band and uses frequency hopping. With a data rate up to 3 Mbps and
interface, which defines a full-duplex single socket connection over which messages can be sent between client maximum range of 100m. Each application type which can use Bluetooth has its own profile.
and server. The WebSocket standard simplifies much of the complexity around bi-directional web Eddystone - A protocol specification that defines a Bluetooth low energy (BLE) message format for proximity
communication and connection management. beacon messages.
JavaScript / Node.js IoT projects ZigBee
A list of IoT software projects like Contiki, Riot OS, etc can be found here. The ZigBee protocol uses the 802.15.4 standard and operates in the 2.4 GHz frequency range with 250 kbps.
The maximum number of nodes in the network is 1024 with a range up to 200 meter. ZigBee can use 128 bit
S
AES encryption.
EnOcean
TE
TE
Communication / Transport laye
EnOcean is a an energy harvesting wireless technology which works in the frequencies of 868 MHz for europe
Ethernet
and 315 MHz for North America. The transmit range goes up to 30 meter in buildings and up to 300 meter
WirelessHart
NO
NO
outdoor.
"WirelessHART technology provides a robust wireless protocol for the full range of process measurement,
WiFi
control, and asset management applications."
WiMax
DigiMesh
WiMax is based on the standard IEEE 802.16 and is intended for wireless metropolitan area networks. The range
K
K
"DigiMesh is a proprietary peer-to-peer networking topology for use in wireless end-point connectivity
is different for fixed stations, where it can go up to 50 km and mobile devices with 5 to 15 km. WiMAx operates
solutions.
at frequencies between 2.5 GHz to 5.8 GHz with a transferrate of 40 Mbps.
ISA100.11a
LPWAN
H
H
"ISA100.11a is a wireless networking technology standard developed by the International Society of Automation
Weightless
ES
ES
(ISA). The official description is "Wireless Systems for Industrial Automation: Process Control and Related
Weightless is a proposed proprietary open wireless technology standard for exchanging data between a base
Application"
station and thousands of machines around it (using wavelength radio transmissions in unoccupied TV
IEEE 802.15.4
GN
GN
transmission channels) with high levels of security.
IEEE 802.15.4 is a standard which specifies the physical layer and media access control for low-rate wireless
NB-IoT (Narrow-Band IoT) A technology being standardized by the 3GPP standards body
personal area networks (LR-WPANs). It is maintained by the IEEE 802.15 working group. It is the basis for the
VI
VI
ZigBee,ISA100.11a, WirelessHART, and MiWi specifications, each of which further extends the standard by
LTE-MTC (LTE-Machine Type Communication) - Standards-based family of technologies supports several
developing the upper layers which are not defined in IEEE 802.15.4. Alternatively, it can be used with 6LoWPAN
technology categories, such as Cat-1 and CatM1, suitable for the IoT.
and standard Internet protocols to build a wireless embedded Internet.
NFC
EC-GSM-IoT (Extended Coverage-GSM-IoT) - Enables new capabilities of existing cellular networks for LPWA
Based on the standard ISO/IEC 18092:2004, using inductive coupled devices at a center frequency of13.56 MHz.
(Low Power Wide Area) IoT applications. EC-GSM-IoT can be activated through new software deployed over a
The data rate is up to 424 kbps and the rangeis with a few meters short compared to the wireless
very large GSM footprint, adding even more coverage to serve IoT devices.
sensornetworks.
ANT
LoRaWAN - Network protocol intended for wireless battery operated Things in regional, national or global
ANT is a proprietary wireless sensor network technology featuring a wireless communications protocol stack
network.
that enables semiconductor radios operating in the 2.4 GHz Industrial, Scientific and Medical allocation of the RF
RPMA (Random phase multiple access) A technology communication system employing direct-sequence spread SensorML
spectrum (DSSS) with multiple access. "SensorML provides standard models and an XML encoding for describing sensors and measurement
processes."
Cellular: Semantic Sensor Net Ontology - W3C
GPRS/2G/3G/4G cellular "This ontology describes sensors and observations, and related concepts. It does not describe domain concepts,
- View a more complete overview of IoT communication and technologies here. time, locations, etc. these are intended to be included from other ontologies via OWL imports."
Wolfram Language - Connected Devices -"A symbolic representation of each device. Then there are a standard
set of Wolfram Language functions like DeviceRead, DeviceExecute, DeviceReadBuffer and
DeviceReadTimeSeries that perform operations related to the device."
RAML (RESTful API Modeling Language) - Makes it easy to manage the whole API lifecycle from design to
S
sharing. It's concise - you only write what you need to define - and reusable.
SENML (Media Types for Sensor Markup Language) - A simple sensor, such as a temperature sensor, could use
TE
TE
this media type in protocols such as HTTP or CoAP to transport the measurements of the sensor or to be
configured.
NO
NO
LsDL (Lemonbeat smart Device Language) - XML-based device language for service oriented devices
Multi-layer Frameworks
Alljoyn - An open source software framework that makes it easy for devices and apps to discover and
communicate with each other.
K
K
IoTivity is an open source project hosted by the Linux Foundation, and sponsored by the OIC.
IEEE P2413 - Standard for an Architectural Framework for the Internet of Things (IoT)
Thread - Built on open standards and IPv6 technology with 6LoWPAN as its foundation.
H
H
IPSO Application Framework (PDF)
ES
ES
"This design defines sets of REST interfaces that may be used by a smart object to represent its available
resources, interact with other smart objects and backend services. This framework is designed to be
GN
GN
complementary to existing Web profiles including SEP2 and oBIX."
OMA LightweightM2M v1.0
"The motivation of LightweightM2M is to develop a fast deployable client-server specification to provide
VI
VI
machine to machine service.
LightweightM2M is principly a device management protocol, but it should be designed to be able to extend to
meet the requirements of applications. LightweightM2M is not restricted to device management, it should be
able transfer service / application data."
Weave - A communications platform for IoT devices that enables device setup, phone-to-device-to-cloud
communication, and user interaction from mobile devices and the web.
Telehash - JSON+UDP+DHT=Freedom
A secure wire protocol powering a decentralized overlay network for apps and devices
Semantic Security
IOTDB Open Trust Protocol (OTrP) - A protocol to install, update, and delete applications and to manage security
"JSON / Linked Data standards for describing the Internet of Things" configuration in a Trusted Execution Environment (TEE).
X.509 - Standard for public key infrastructure (PKI) to manage digital certificates and public-key encryption. A constrained network. This new Distance Vector Routing Protocol was named the IPv6 Routing Protocol for Low
key part of the Transport Layer Security protocol used to secure web and email communication. power and Lossy networks(RPL). The RPL specification was published as RFC 6550 by the ROLL working group.
Vertical Specific
In an RPL Network, each node acts as a router and becomes part of a mesh network. Routing is performed at the
IEEE 1451:
IP Layer. Each node examines every received IPv6 packet and determines the next-hop destination based on the
The IEEE 1451, a family of Smart Transducer Interface Standards, describes a set of open, common, network-
information contained in the IPv6 header. No information from the MAC layer header is needed to perform the
independent communication interfaces for connecting transducers (sensors or actuators) to microprocessors,
next determination.
instrumentation systems, and control/field networks.
IEEE 1888.3-2013 - “IEEE Standard for Ubiquitous Green Community Control Network: Security”
Modes of RPL:
IEEE 1905.1-2013 - “IEEE Standard for a Convergent Digital Home Network for Heterogeneous Technologies”
IEEE 802.16p-2012 - “IEEE Standard for Air Interface for Broadband Wireless Access Systems”
This protocol defines two modes:
IEEE 1377-2012 - “IEEE Standard for Utility Industry Metering Communication Protocol Application Layer”
S
1. Storing mode: All modes contain the entire routing table of the RPL domain. Every node knows how to reach
IEEE P1828 - “Standard for Systems With Virtual Components”
TE
TE
every other node directly.
IEEE P1856 - “Standard Framework for Prognostics and Health Management of Electronic Systems”
2. Non-Storing mode: Only the border router(s) of the RPL domain contain(s) the full routing table. All other nodes
in the domain maintain their list of parents only and use this as a list of default routes towards the border router.
NO
NO
The abbreviated routing table saves memory space and CPU. When communicating in non-storing mode, a node
RPL (IPv6 Routing protocol) always forwards its packet to the border router, which knows how to ultimately reach the final destination.
RPL stands for Routing Protocol for Low Power and Lossy Networks for heterogeneous traffic networks. It is a RPL is based on the concept of a Directed Acyclic Graph (DAG). A DAG is Directed Graph where no cycle exists.
routing protocol for Wireless Networks. This protocol is based on the same standard as by Zigbee and 6 Lowpan This means that from any vertex or point in the graph, we cannot follow an edge or a line back to this same point.
K
K
is IEEE 802.15.4 It holds both many-to-one and one-to-one communication. All of the edges are arranged in a path oriented toward and terminating at one or more root nodes.
It is a Distance Vector Routing Protocol that creates a tree-like routing topology called the Destination Oriented
A basic RPL process involves building a Destination Oriented Directed Acyclic Graph (DODAG). A DODAG is a DAG
H
H
Directed Acyclic Graph (DODAG), rooted towards one or more nodes called the root node or sink node.
rooted in one destination. In RPL this destination occurs at a border router known as the DODAG root. In a
The Directed Acyclic Graphs (DAGs) are created based on user-specified specific Objective Function (OF). The OF
ES
ES
DODAG, three parents maximum are maintained by each node that provides a path to the root. Typically one of
defines the method to find the best-optimized route among the number of sensor devices.
these parents is the preferred parent, which means it is the preferred next hop for upward roots towards the
root. The routing graph created by the set of DODAG parents across all nodes defines the full set of upwards
GN
GN
roots. RPL protocol information should ensure that routes are loop-free by disallowing nodes from selected
DODAG parents positioned further away from a border router.
VI
VI
Implementation of RPL Protocol:
The RPL protocol is implemented using the Contiki Operating system. This Operating System majorly focuses on
IoT devices, more specifically Low Power Wireless IoT devices. It is an Open source Model and was first bought
Directed Acyclic Graph
into the picture by Adam Dunkels.
The IETF chartered the ROLL (Routing Over Low power and Lossy networks) working group to evaluate all three
The RPL protocol mostly occurs in wireless sensors and networks. Other similar Operating Systems include T-
routing protocols and determine the needs and requirements for developing a routing solution for IP smart
Kernel, EyeOS, LiteOS, etc.
objects. After the study of various use cases and a survey of existing protocols, the consensus was that a new
routing protocol should be developed for IP smart objects, given the characteristics and requirements of the
URI: The Uniform Resource Identifier Explained The double forward slashes after the first colon are then only necessary if the authority part is filled.
Furthermore, authority can also contain user information that is then detached from the domain’s @ symbol,
The concept of URLs is familiar to most people. A URL is a web address that is used to direct users to websites and finally another port designation, which in turn is separated from the domain with a colon.
on the internet. But what is a URI? The concept of URIs was conceived of by the forefather of the World Wide
Web, Tim Berners-Lee. When he first used the term in RFC 1630, he was still speaking of a Universal Resource A typical web address is a good example: "https://example.org/test/test1?search=test-question#part2"
Identifier. Since then, however, through, among other things, publications by the World Wide Web Consortium
scheme: https
(W3C), URI has been established as the acronym for the Uniform Resource Identifier, and to this day still goes by
authority: example.org
it. With regard to the original idea, however, nothing has changed.
path: test/test1
Contents query: search=test-question
fragment: part2
1. What is the Uniform Resource Identifier (URI)?
S
2. URI Syntax
TE
TE
In the example, the URI refers to one part of a website. This part (part2) is accessed via HTTP; is located on a
3. URI Reference
device with example.org as the identifier and can be found at the specified path if one performs a search
4. URI vs. URL vs. URN
beforehand. With the Uniform Resource Identifier, an email address can also be identified:
NO
NO
What is the Uniform Resource Identifier (URI)? "mailto:[email protected]".
The Uniform Resource Identifier (URI) is intended to identify abstract or physical resources on the Internet. What scheme: mailto
these resources are supposed to be can vary according to the situation. It can thus be, a website, for example. path: [email protected]
K
K
However, email senders and recipients can also be identified via URI. Applications use the unambiguous
In this case, not only are the mandatory components contained in the URI. Other potential resources can be
designation to identify a resource or to request data from it.
identified with this syntax, such as files or even telephone numbers.
H
H
Protocols such as HTTP or FTP can function on this basis as the form of identification is predefined by the URI
ES
ES
Note
syntax. From this URI, a system can read where and how certain information should be identified.
Although it’s true that the path is a mandatory specification in every URI, the part’s content can be empty. In
URI Syntax
other words, “http://example.org/” is a valid URI with an empty path.
GN
GN
A URI consists of up to five parts. However, only two of these are mandatory. URI schemes, in other words, the first part of every URI, are managed by the IANA. Although one can also use
VI
VI
their own schemes, those that have been confirmed by the organization are known throughout the entire
scheme: Gives information about the protocol being used.
Internet. The best-known schemes are:
authority: Identifies the domains.
path: Shows the exact path to the resource. about: Browser information
query: Represents a request action. data: Embedded data
fragment: Refers to a partial aspect of a resource. feed: Web feeds
file: Files
Only scheme and path must appear in every identifier. In the URI syntax, all components are listed successively
ftp: File Transfer Protocol
and separated by specific, predefined characters.
git: Version management with Git
http: Hypertext Transfer Protocol
scheme :// authority path ? query # fragment
https:Hypertext Transfer Protocol Secure
imap: Internet Message Access Protocol location-independent and permanently designates a resource. Thus, if URLs are primarily known in the form of
mailto: Email addresses web addresses, a URN can, for example, also appear as an ISBN to permanently identify a book.
news: Usenet newsgroups
URL and URN follow the URI syntax. For this reason, both designation types are URI subsets. URL and URN are
pop: POP3
thus always URIs. Conversely, Uniform Resource Identifiers are neither URLs nor URNs.
rsync: Data synchronization
sftp: SSH File Transfer Protocol
ssh: Secure shell
tel: Telephone numbers
urn: Uniform Resource Names
S
Tip
The IANA publishes an official list of all known URI schemes.
TE
TE
URI Reference
NO
NO
In order to not always have to write (and save) a complete URI specification, many applications use a shorter
version of the syntax. For the shortened version to be properly understood, there must always be a base URI
that is fully formulated. The URI references are then resolved internally. For this reason, one distinguishes
absolute references from relative ones. The absolute URI functions independently of context and consists of at
K
K
least scheme, authority and path. The relative reference is in the actual short form. With this form, only the
deviation from the base URI is specified. A relative URI must, for this reason, always be located in the same
H
H
namespace, as is the case with the base URI.
ES
ES
With the relative reference, no scheme is specified. To be able to distinguish relative URIs from absolute URIs,
no colon may appear in the first segment of a path because the part before the colon would then be interpreted
GN
GN
as a scheme. Among the relevant references one distinguishes three different types that one recognizes each
time via a marker at the beginning of the path:
VI
VI
A relative path reference begins without a forward slash.
An absolute path reference begins with a forward slash.
A network-path reference begins with two forward slashes.
There is a lot of confusion regarding the very similar sounding URI, URL and URN abbreviations. The uncertainty
is underpinned by the fact that all three concepts are, in technical terms, also related to each other.
The Uniform Resource Locator is used to display where a resource is located. For this reason, the URL is also
utilised when surfing on the Internet to navigate to specific websites. In contrast, the Uniform Resource Name is
WiFi
The role of WiFi in the IoT space is often overlooked. WiFi is well suited to support certain IoT
S
TE
TE
Power Range Data Rate Latency Spectrum
NO
NO
Fi HaLOW Low Long Moderate Low Unlicensed
Moderate to
WiFi 5 and 6 Moderate High Low Unlicensed
K
K
long
H
H
Moderate to
LTE Cat-M Low Moderate Low Licensed
WiFi has the advantage of addressing a very wide variety of profiles because of the proliferation of its family of long
ES
ES
standards. This means it will play a role in most IoT environments, alone or interworking with more specialized
protocols, or with cellular. Some IoT applications, such as vehicular services, or video-based apps like connected
Very
GN
GN
security cameras, will need the bandwidth of the wireless broadband network, implemented to enable other LTE Cat-IoT Very low Long Low Licensed
low
requirements like low latency (In critical environments this may take place in a private network or slice).
VI
VI
WiFi is uniquely placed to support broadband and narrowband IoT applications from a common platform that LoRa Very low Long Low Low Unlicensed
can work at varying levels of power consumption and signal range. The next release of 5G standards, Release 16,
will prioritize IoT-focused capabilities such as latency below four milliseconds and very high availability, to
Very
support emerging cases in the URLLC (ultra-reliable low latency communications) category. Sigfox Very low Long Very low Unlicensed
low
LPWAN
Low power wide area network (LPWAN) connections are a particularly interesting example of the need for
multiple technologies for IoT, potentially with WiFi, the most ubiquitously installed in networks and devices, as a
unifying link. This is the main area, along with the well-established WPAN standards, where there are non-WiFi
S
technologies operating at scale in an unlicensed spectrum. WiFi and LoRaWAN are two of the most adopted
TE
TE
unlicensed technologies and together they address a large proportion of IoT Applications. The approaches for
these technologies are disrupting private-public business models and also enabling participation in 5G success.
The WBA and the LoRa Alliance have published a joint white paper to demonstrate how these two widely
NO
NO
deployed IoT Connectivity technologies can be utilized in tandem to effectively support a vast array of
Applications.
Light Fidelity (Li-Fi) is VLC, visible light communication technology developed by research team at University of
Edinburgh, including Professor Haas. Professor Harald Haas authored term. Light Fidelity is modern wireless
K
K
LPWAN will support applications such as intelligent transportation, smart lighting and asset tracking, to name a
communication technology that empowers remote transmission of data using LED light. Light Fidelity depends
few examples. LPWAN provides a good example of how multiple unlicensed and licensed spectrum technologies
on novel ability of solid-state lighting systems to create 1s and 0s binary code with human-imperceptible LED
will coexist. HaLOW, the brand name for the 802.11ah standard, allows WiFi to be deployed in the sub-GHz
H
H
illumination.
unlicensed spectrum to support LPWAN Applications. Other unlicensed spectrum options include LoRa and
Information may be obtained within vicinity of visible light by means of electronic gadgets with photo-diode.
ES
ES
Sigfox, while there are two LTE-based choices for licensed bands, LTE Cat-M and LTE Cat-IoT. Each of these
This means that light bulbs can bring not only light but wireless connection at same time anywhere where LED’s
technologies supports a different balance between power consumption and data rates, making them optimal
are used. Generally speaking, Wi-Fi plays an efficient role in wireless data coverage within buildings, while using
for different applications.
GN
GN
Li-Fi we will provide excellent density data coverage in particular location without any radio interference issues.
Li-Fi provides better latency, performance, accessibility and security than Wi-Fi, and under laboratory conditions
Many service providers are already deploying two or more of these technologies in tandem to support the wide
has even reached extreme speeds greater than 1 Gbps.
VI
VI
diversity of services that will make up IoT. For instance, in a complex environment like a smart city, being able to
use a combination of connectivity technologies to support Applications with different requirements and History :
integrate them all under a common management platform will be key to an economically viable and richly Professor Harald Haas, of University of Edinburgh, UK, is regarded as founding father of Li-Fi. The term Visible
functional solution. Radiation Communication (VLC) embodies any use of visible radiation portion of electromagnetic spectrum for
data transmission.
While it is important to have a diversity of technologies to support the widely varying requirements of IoT, it is
D-Light project was sponsored at Center for Digital Communications in Edinburgh from January 2010 until
also essential that these technologies can interoperate seamlessly to avoid creating islands of communication,
January 2012. Haas introduced this breakthrough in his 2011 TED Global talk, and helped advertise it. Li-Fi
as these would severely restrict the ability to create a broad platform in which different applications can
consortium, formed by Fraunhofer IPMS, Germany, IBSEN Telecom, Norway, Supreme Architecture, Israel / US,
exchange data easily.
and TriLumina, USA, is planning to upgrade and advance different Optical Wireless Communication (OWC)
technologies. Li-Fi technology was demonstrated at the 2012 Consumer Electronics Show in Las Vegas,
employing pair of Casio smartphones to trade the data utilizing light of varying intensities emitted from their High cost of installing the VLC systems.
displays, noticeable up to 10 meters away. Applications :
In Aircrafts –
Working of Li-Fi :
In air crafts, passengers get high-charges on low-speed internet, but using Li-Fi provides affordable
Light Fidelity technology is wireless communication device focused mainly on use of visible light between violet
fees for high-speed internet.
(800 THz) and red (four hundred THz). Li-Fi is based solely on propagation of information in defined and uniform
Health technologies –
fashion via amplitude modulation of light supply. There is LED transmitter (light emitting) on one end and photo
WI-Fi has been replaced by Li-Fi in many hospitals because use of Wi-Fi in hospitals interferes with
detector (light sensor) on other. Li-Fi operates very simple and fast. The data input to LED transmitter is
mobile devices and computers that block the monitoring equipment signals.
encoded into light by varying the flickering rate at which binary code (1s and 0s) is generated by LEDs flicker ‘on’
Traffic Application –
and ‘off’. LED transmitter’s on / off operation which seems to be invisible to human eye as speed of LEDs is less
Li-Fi can be used in traffic management, which interact with LED lights of vehicles such as buses,
than microsecond. By switching ON LED is logical ‘1’ it makes data transfer according to incoming binary codes,
S
which can help in viably dealing with traffic and can regulate accidents by warning other drivers
switching OFF is logical ‘0’. Data can be encoded in light by varying rate at which LEDs flicker on and off to
when vehicles are excessively close.
TE
TE
different combinations of 1s and 0s.
Disaster management –
Advantages :
Li-Fi can be used as groundbreaking methods of correspondence in the midst of disaster, e.g.
Proficiency –
NO
NO
seismic tremor or, on other hand, hurricanes as subway stations and passages; common dead
Energy utility can be minimised with use of LED illumination which are now accessible in home,
zones do not impede Li-Fi.
workplaces and Mall and so on for lighting reasons. Consequently transmission of information
Power Plant application –
requiring negligible additional power, which makes it efficient in terms of costs as well as energy.
Li-Fi is progressively safe, bottomless availability in all regions of power plant as utilization of Wi-Fi
K
K
Cost –
and other radiation source isn’t acceptable.
Not only does Li-Fi need fewer components for its service, but it also requires only small additional
capacity for data transmission.
H
H
Availability –
BLE:
ES
ES
Disponibility is not issue as light sources are available all over place. Along these lines, lights are
can be utilized as model for information transmission.
Security –
GN
GN
One principal advantage of Li-Fi is security. Since light can’t go through opaque structures, Li-Fi
web is accessible just to clients inside limited zone and can’t be intercepted and misused, outside
VI
VI
area under operation.
High speed –
Combination of low interference, high bandwidths and high-intensity output, aids Li-Fi provides
high data rates i.e., 1 Gbps or even beyond.
Disadvantages :
The availability of light source is necessary for internet access. This could restrict areas and
situations where Li-Fi might be used.
To trade data it requires close or immaculate line of sight. BLE, or Bluetooth Low Energy, is a popular wireless communications standard that is increasingly being used for
Light waves can not penetrate walls and therefore Li-Fi has much shorter range than Wi-Fi. IoT solutions. There are many applications for BLE in Operations, Facilities and IT, including asset tracking,
Opaque impediments affect data transmission on pathways. environmental monitoring and security. BLE provides reliable and secure bi-directional communication between
Normal light, sunlight, and ordinary electric light can influence information transmission speed. devices, enabling areas such as healthcare, manufacturing, retail, and workspaces to be connected wirelessly.
The recent surge in BLE-enabled devices has enabled companies to implement real-time tracking, automated viability as a reliable platform for communication between connected devices. With this forward momentum
alerts, location awareness and energy consumption monitoring. With its low power consumption, it can keep driving BLE-based IoT solutions into the future, we can rest assured that low energy connections will remain a
connected devices running for extended amounts of time on batteries or other mobile power sources. critical component of our digital ecosystems.
According to industry experts, BLE will continue making a significant impact in the IoT (Internet of Things) world
moving forward.
A Case Study with MQTT/CoAP usage-IoT privacy, security and vulnerability solutions.
In healthcare
Machine-to-machine (M2M) communication protocols, which enable machines to “talk” with one another so that
BLE has been making waves in the medical industry. Using BLE sensors, healthcare providers can track and
commands are communicated and data is transmitted, are indispensable to applications and systems that make
ensure the safety of high value assets. Asset tracking can also ensure that crucial assets like wheelchairs are
use of the internet of things (IoT) and the industrial internet of things (IIoT).
S
readily available when they are needed. BLE tech can also be used to monitor environmental conditions, which
is crucial to prevent the loss of vaccines and other temperature sensitive medication. By decreasing both
TE
TE
Message Queuing Telemetry Transport (MQTT) is a communication protocol widely used in both IoT and IIoT
physical and financial expenditures for healthcare providers, BLE makes possible a variety of innovative
deployments. MQTT is a publish-subscribe protocol that facilitates one-to-many communication mediated by
opportunities for digitizing health care services.
brokers. Clients can publish messages to a broker and/or subscribe to a broker to receive certain messages.
NO
NO
Messages are organized by topics, which essentially are “labels” that act as a system for dispatching messages to
In location-based marketing
subscribers.
Location-based marketing is a method of connecting with consumers based on their physical location. This can
Constrained Application Protocol (CoAP), on the other hand, is a client-server protocol that, unlike MQTT, is not
K
K
include targeted messaging and exclusive offers for customers who are physically in specific areas. By allowing
yet standardized. With CoAP, a client node can command another node by sending a CoAP packet. The CoAP
retailers to know exactly when customers enter their space and deliver relevant messages tailored to each
server will interpret it, extract the payload, and decide what to do depending on its logic. The server does not
individual, BLE provides an engaging shopping experience for consumers. As such, companies across all
H
H
necessarily have to acknowledge the request.
industries are building BLE based notifications into their marketing plans in order to get the most out of this
ES
ES
powerful technology.
GN
GN
In environmental & occupancy monitoring
Many companies are now embracing BLE sensors to aid with environmental and occupancy monitoring. By
VI
VI
leveraging BLE IoT devices, organizations are able to collect data from their premises in real-time and make
informed decisions about the whereabouts of workers, employees’ comfort levels, the security of company
assets and more. As well as providing an accurate reading of essential parameters like temperature, noise level
and humidity, air quality, etc. As a result, BLE is becoming a valuable asset for effective facility management and
should be considered by businesses looking to increase efficiency and safety within their operations.
The future of BLE in IoT A high-level view of the interaction models of MQTT (left) and CoAP (right)
With improvements to energy efficiency, range and connection speed, BLE is well-positioned for continued
MQTT is preferred over CoAP for mission-critical communications because it can enforce quality of service and
adoption in a variety of applications across numerous industries from agriculture to telecommunications to
ensure message delivery. CoAP, for its part, is preferred for gathering telemetry data transmitted from transient,
home automation. Furthermore, the development of advanced security protocols further strengthen BLE’s
low-power nodes like tiny field sensors. Despite fulfilling different needs, both protocols are fundamental in IoT Shodan’s geolocation metadata inhibited us from deter mining more precise country or territory
and IIoT deployments, where fast and flexible data exchange is a basic operational requirement. locations for the counts.
Unsecure protocols and exposed records We also outlined design issues and implementation vulnerabilities, which can contribute to the number of
unsecure deployments that we found. A design issue that we discovered (designated as CVE-2017-7653 for
An internet-wide scan on exposed MQTT endpoints conducted by IOActive’s Lucas Lundgren between 2016 and Mosquitto, the most popular broker), for instance, can allow a malicious client to supply invalid data. By using the
2017 presented a clear deployment problem among tens of thousands of unsecure MQTT hosts. A smart-home- message-retain option and modifying the quality of service (QoS), an attacker can lead clients to be flooded with
centric MQTT research was also released by Avast this year, highlighting the lack of secure configurations and the the same (retained) message over and over.
likelihood of misconfigurations in home devices that use MQTT. We decided to look into the same problem —
and include CoAP in the picture — and to see if there has been more awareness surrounding it. Unsecure endpoints, moreover, can expose records and leak information, some of which we found to be related
to critical sectors, for any casual attacker to see. Vulnerable endpoints can also run the risk of denial-of-service
S
What we found was striking: Hundreds of thousands of MQTT and CoAP hosts combined are reachable via public- (DoS) attacks or even be taken advantage of to gain full control.
TE
TE
facing IP addresses. Overall, this provides attackers with millions of exposed records. Finding exposed endpoints
in virtually every country is feasible due to the inherent openness of the protocols and publicly searchable The Fragility of Industrial IoT’s Data Backbone: Security and Privacy Issues in MQTT and CoAP Protocols
deployments.
NO
NO
We found that MQTT and CoAP are affected by design and implementation vulnerabilities that
can allow attackers to subvert systems and applications that use these protocols. We also
discovered numerous hosts and records that expose personal and industry -related process
information.
K
K
Impact to large-scale implementations: Smart factories and smart cities
H
H
Here we discuss how unsecure deployments and the lack of well-defined security in M2M technology can be
ES
ES
abused to turn into unforeseen problems in critical and large-scale environments like smart factories and cities.
M2M technology forms the core of IIoT systems for maintaining smart factories and building smart cities. As more
GN
GN
of these connected environments crop up, the more it becomes difficult to manage and protect large volumes of
data exchanged by the IoT-enabled devices.
VI
VI
While looking for leaked data related to smart cities, we noticed a group of records that contained email addresses
and location names of certain businesses. When we dug a bit more, we found that these records were all taxi or
car-sharing rides booked by employees traveling to and from their offices. The records furthermore contained
precise timing information that could allow an attacker to learn who was going where.
Geographical distribution
of MQTT brokers (top) and CoAP servers (bottom)
Note: We recorded 17,226 MQTT brokers in the Asia -Pacific (AP) region. However, limitations in
*Hover cursor over the graphic to see categories and their respective keywords.
TOTAL
28,944,998
TRANSPORTATION
Records that contain names of vehicles such as trucks, trains, and airplanes, and other transportation-related
content.
Environment
S
Positioning
TE
TE
Energy
Manufacturing
NO
NO
Emergency
Transportation
Consumer
K
K
Others
Taxi or car-sharing data containing business names and business email addresses
H
H
Note on misclassified records: We acknowledge the presence of a minority of misclassified
records, due to the non-exhaustive keyword list that we used, and due to generic content (e.g.,
ES
ES
We also found instances of data exposure related to the manufacturing sector. Records were leaked by a
news) circulating over MQTT or CoAP, which could likely match any of the keywords. To minimize
programmable logic controller (PLC), which was sending out telemetry data via an open MQTT broker. Exposed
the ratio of false matches, we manually vetted each of our searches and removed outliers.
records could indicate names assigned to particular control systems, details of the manufacturing processes, and
GN
GN
even urgent maintenance requests like the one below. Securing IoT protocols for reliable M2M communications
VI
VI
The number of connected devices and machines has nowhere to go but up, and more and more critical services
are relying on communication protocols to provide immediate and essential response. This gives further
responsibility to manufacturers and service providers to ensure both the reliability and the security of protocols
and applications.
Urgent alert or maintenance request for a company specializing in the manufacturing of the automotive body
assembly system and body parts
Considering the emergence of these protocols, it’s reasonable to expect that attackers will catch up and abuse
M2M technology for their malicious activities. We even expect poisoning of telemetry data to be a feasible and
Such information can be used for target reconnaissance so that connected machines or employees of potentially
indirect attack method in the future.
high-profile companies can be tracked. These are just two examples of how exposed data in smart cities, factories,
and even certain sectors could allow an attacker to prepare for an attack with the help of leaked sensitive data.
Certain considerations like not having security built in and protocols having concepts such as wild-card topics and
linked resources can be turned against users by exposing their resources and collecting data about them.
Breakdown of exposed data by coarse-grained categorization
Moreover, MQTT and CoAP do not check the data or payload that they transport, which means that the
information can be really anything, posing data validation issues on the connected systems.
Organizations and manufacturers should then pay adequate attention to IoT and IIoT security. Organizations’
security teams should ensure that proper security mechanisms are in place when using protocols. Solutions do
exist to secure M2M communications — they are just not employed by all.
It is very important for organizations to conduct risk assessments. Our research aims to raise awareness on
potential risks in IoT and IIoT devices that use MQTT or CoAP, help organizations to identify weak points in their
deployments, and follow the best practices we outlined in the paper. For in-depth analyses and insights, read our
research, “The Fragility of Industrial IoT’s Data Backbone: Security and Privacy Issues in MQTT and CoAP
S
Protocols.” In our research, we discuss how attackers can subvert MQTT- and CoAP-enabled implementations and
TE
TE
even take advantage of exposed data that includes personal and company-sensitive information for attacks.
NO
NO
Data Link Layer Protocols
Data Link Layer protocols are generally responsible to simply ensure and confirm that the bits and bytes that are
received are identical to the bits and bytes being transferred. It is basically a set of specifications that are used for
K
K
implementation of data link layer just above the physical layer of the Open System Interconnections (OSI) Model.
Some Common Data Link Protocols :
H
H
There are various data link protocols that are required for Wide Area Network (WAN) and modem connections.
ES
ES
Logical Link Control (LLC) is a data link protocol of Local Area Network (LAN). Some of data link protocols are given
below :
1. Synchronous Data Link Protocol (SDLC) –
GN
GN
SDLC is basically a communication protocol of computer. It usually supports multipoint links even
error recovery or error correction also. It is usually used to carry SNA (Systems Network
VI
VI
Architecture) traffic and is present precursor to HDLC. It is also designed and developed by IBM in
1975. It is also used to connect all of the remote devices to mainframe computers at central
locations may be in point-to-point (one-to-one) or point-to-multipoint (one-to-many) connections.
It is also used to make sure that the data units should arrive correctly and with right flow from one
network point to next network point.
and also reliable service. HDLC is a bit-oriented protocol that is applicable for point-to-point and always available for each and every higher-layer protocol that is supported by PPP. NCP was replaced
multipoint communications both. by TCP/IP in the 1980s.
S
4. Point to Point Protocol (PPP) –
TE
TE
PPP is a protocol that is basically used to provide same functionality as SLIP. It is most robust protocol Why? Nowadays each manufacturer uses their own management software, their “ecosystem”. Only trough this
that is used to transport other types of packets also along with IP Packets. It can also be required for software is possible to maintain and monitor all the devices: software/firmware updates, remote configuration,
dial-up and leased router-router lines. It basically provides framing method to describe frames. It is etc. The key is to use device which implement standard protocols or tools like Muutech platform providing the
NO
NO
a character-oriented protocol that is also used for error detection. It is also used to provides two ability to interact with the management platform of other providers, being able to keep using the same non-
protocols i.e. NCP and LCP. LCP is used for bringing lines up, negotiation of options, bringing them standard IoT devices of different brands in combination with devices using standard protocols, avoiding vendor-
down whereas NCP is used for negotiating network-layer protocols. It is required for same serial locking.
interfaces like that of HDLC.
K
K
The standard protocol with the most impact in IoT is MQTT (and its variant MQTT-SN) since is light, robust and
overhead-less. It works with in a subscription-publish model, very similar in concept as a lot of chat tools. This
5. Link Control Protocol (LCP) –
H
H
protocol is oriented to communication, but it lacks of a native IoT Device Management feature, although in
It was originally developed and created by IEEE 802.2. It is also used to provide HDLC style services
ES
some platforms we can see a management protocol build on top of MQTT, like in IBM Watson IoT
ES
on LAN (Local Area Network). LCP is basically a PPP protocol that is used for establishing, configuring,
Platform: https://console.bluemix.net/
testing, maintenance, and ending or terminating links for transmission of data frames.
GN
GN
To cover this standardization necessity we can find some protocols:
6. Link Access Procedure (LAP) –
LAP protocols are basically a data link layer protocols that are required for framing and transferring
VI
VI
OMA Lightweight M2M (LwM2M), built by the Open Mobile Alliance, is a light, fast and
data across point-to-point links. It also includes some reliability service features. There are basically
structured protocol, ideal for low-capacity devices.
three types of LAP i.e. LAPB (Link Access Procedure Balanced), LAPD (Link Access Procedure D-
Channel), and LAPF (Link Access Procedure Frame-Mode Bearer Services). It is actually originated OMA-DM, also built by the Open Mobile Alliance, but more oriented to mobile applications. Ideal
from IBM SDLC, which is being submitted by IBM to the ISP simply for standardization. for things in movement (changing IP address for instance). More complex and structured tan
LwM2M.
7. Network Control Protocol (NCP) – • TR-069, created by the Broadband Form (its first version is from 2004) and used in hundreds of
NCP was also an older protocol that was implemented by ARPANET. It basically allows users to have thousand of devices all over the world, being a protocol widely used by telecommunication
access to use computers and some of the devices at remote locations and also to transfer files operators to provision their routers, etc. For this, is very complex, heavy and structured, but it
among two or more computers. It is generally a set of protocols that is forming a part of PPP. NCP is works very well for gateways and telecommunications devices. As a curiosity, only a few TR069
products are certified: http://www.broadband-forum.org/implementation/certified-products/tr-
069-certified-products After some years of works, a new version, more IoT oriented has come to
light: User Service Platform: https://usp.technology/ too recent and with few implementations.
S
TE
TE
NO
NO
K
K
H
H
ES
ES
As you may note, depending on the concrete application it will be more convenient to use on protocol or another,
so we will need a central platform, from where multiple IoT architecture devices (sensors, gateways, etc.) from
GN
GN
multiple manufacturers can be managed, always trying to reduce the setup time of each of these “things”.
In Muutech we are always working in adding new standard protocols to our product, not only focused on
VI
VI
monitoring and control of your machines, sensors and IT infrastructure but also the provision and management
of it from a unique platform.
Managed devices are defined as devices that contain a device management agent. A device management agent
is a set of logic that allows the device to interact with the Platform Service Device Management service by using
the Device Management Protocol. Managed devices can perform device management operations that include In a Manage Device request, the d field and all of its subfields are optional. The metadata and deviceInfo field
location updates, firmware downloads and updates, restarts, and factory resets. values replace the corresponding attributes for the sending device if they are sent.
The Device Management Protocol is built on the MQTT messaging protocol, it defines a set of supported The optional lifetime field specifies the length of time in seconds in which the device must send another Manage
operations. Device request to avoid being classified as dormant and becoming an unmanaged device. If the lifetime field is
omitted or set to 0, the managed device does not become dormant. The minimum value that is supported for
A device management agent can support a subset of the operations, but it must support the lifetime field is 3600 seconds, which is 1 hour.
the Manage operation at a minimum.
A device that supports firmware action operations must also support observation. The optional fields supports.deviceActions and supports.firmwareActions indicate the capabilities of the device
management agent. If supports.deviceActions is set, then the agent supports both restart and factory reset
The device management lifecycle actions. For a device that does not distinguish between a restart and a factory reset, it is acceptable to use the
S
same behavior for both actions. If supports.firmwareActions is set, the agent supports both firmware download
1. A device and its associated device type are created in the Platform Service by using either the user
TE
TE
and firmware update actions.
interface or the REST API.
2. A device connects to the Platform Service and makes a Manage Device request to become a managed The following sample shows the request format:
NO
NO
device.
3. You can view and manipulate the metadata for a device by using the Platform Service REST API. These Outgoing message from the device:
API operations - for example firmware update and device restart - are outlined in the Device
management requests topic. Topic: iotdevice-1/mgmt/manage
K
K
4. A device can communicate updates about its location, diagnostic information, and error codes by using {
the Device Management Protocol. "d": {
5. When a device is decommissioned, you can remove it from the Platform Service by using the user "metadata":{},
H
H
interface or the REST API. "lifetime": number,
ES
ES
"supports": {
Manage Device requests "deviceActions": boolean,
GN
GN
"firmwareActions": boolean
A device uses the Manage Device request to become a managed device. A device management agent must send
},
a Manage Device request before it can receive requests from the server. A device management agent typically
"deviceInfo": {
VI
VI
sends this type of request whenever it starts or restarts.
"serialNumber": "string",
"manufacturer": "string",
Topic for a Manage Device request
"model": "string",
A device publishes a Manage Device request to the following topic: "deviceClass": "string",
"description" :"string",
iotdevice-1/mgmt/manage "fwVersion": "string",
"hwVersion": "string",
The server responds to a Manage Device request on the following topic:
"descriptiveLocation": "string"
}
iotdm-1/response
},
Message format for a Manage Device request
"reqId": "string"
} Request format:
The following sample shows the response format: Outgoing message from the device:
S
Response codes for a Manage Device request Incoming message from the server:
TE
TE
Response Topic: iotdm-1/response
Message
code {
NO
NO
"rc": number,
200 The operation was successful.
"reqId": "string"
400 The input message does not match the expected format, or one of the values is out of the valid range. }
Response codes for an Unmanage Device request
K
K
403 Forbidden (if a device tries to publish a manage request claiming support for an invalid set of actions)
404 The device has not been registered with Platform Service. Response
Message
code
H
H
409 Resource could not be updated due to a conflict (for example, the resource is being updated by two simultaneous requests
ES
ES
200 The operation was successful.
Unmanage Device requests
400 The input message does not match the expected format, or one of the values is out of the valid range.
A device uses an Unmanage Device request when it no longer needs to be managed. When a device becomes
GN
GN
404 The device has not been registered with Platform Service.
unmanaged, Platform Service no longer sends new device management requests to the device. Unmanaged
devices can continue to publish error codes, log messages, and location messages. 409 Resource could not be updated due to a conflict (for example, the resource is being updated by two simultaneous requests
VI
VI
Topic for an Unmanage Device request Update Location requests
A device publishes an Unmanage Device request to the following topic: The location metadata for a device can be updated in Platform Service in the following ways:
The server responds to an Unmanage Device request on the following topic: Devices that can determine their location can choose to notify the Platform Service device management
server about location changes. The device notifies Platform Service about the location update. The
iotdm-1/response device retrieves its location, from a GPS receiver, for example, and sends a device management message
Message format for an Unmanage Device request to the Platform Service instance to update its location. The time stamp captures the time at which the
location was retrieved from the GPS receiver. The time stamp is valid even if there is a delay in sending
the location update message. The server records the date and time of the message receipt and uses that Outgoing message from the device:
information to update the location metadata if a time stamp was not used.
Topic: iotdevice-1/device/update/location
Manual device location updates by using the REST API {
"d": {
You can manually set the location metadata for a static device by using the Platform Service REST API
"longitude": number,
when the device is registered. You can also modify the location later. The time stamp setting is optional,
"latitude": number,
but when omitted, the current date and time is set in the location metadata for the device.
"elevation": number,
Topic for an Update Location request that is triggered by a device:
"measuredDateTime": "string in ISO8601 format",
S
A device publishes an Update Location request to the following topic: "updatedDateTime": "string in ISO8601 format",
"accuracy": number
TE
TE
iotdevice-1/device/update/location },
"reqId": "string"
The server responds to an Update Location request on the following topic:
NO
NO
}
iotdm-1/response
Response format:
Location update that is triggered by users or apps
K
When a user or application updates the location of an active managed device, the device receives an update
message.
Topic: iotdm-1/response
H
H
{
Topic for an Update Location request that is triggered by users or apps
ES
ES
"rc": number,
The server publishes an Update Location request to the following topic: "reqId": "string"
}
GN
GN
iotdm-1/device/update Response codes for an Update Location request
Message format for an Update location request
Response
VI
VI
Message
The measuredDateTime field is the date and time of location measurement. code
Whenever location is updated, the values that are provided for latitude, longitude, elevation, and accuracy are 200 The operation was successful.
considered a single multi-value update. The latitude and longitude are mandatory and must both be provided
400 The input message does not match the expected format, or one of the values is out of the valid range.
with each update. The latitude and longitude must be specified in decimal degrees by using World Geodetic
System 1984 (WGS84). Elevation and accuracy are measured in meters and are optional. 404 The device has not been registered with Platform Service.
409 Resource could not be updated due to a conflict (for example, the resource is being updated by two simultaneous requests
If an optional value is provided on an update and then omitted on a later update, the earlier value is deleted by
the later update. Each update is considered a complete multi-value set. Location updates that are triggered by users or apps
"d": {
Incoming message from the server:
"fields": [
{
Topic: iotdm-1/device/update
"field": "location",
{
"value": {
"d": {
"latitude": number,
"fields": [
S
"longitude": number,
{
"elevation": number,
TE
TE
"field": "location",
"accuracy": number,
"value": ""
"measuredDateTime": "string in ISO8601 format"
}
NO
NO
"updatedDateTime": "string in ISO8601 format",
]
}
}
}
}
Add Error Codes requests
K
K
]
}
Devices can choose to notify the Platform Service device management server about changes to their error status
}
H
H
by using the Add Error Codes request type.
ES
ES
Note: The reqID parameter is not used because the device is not required to respond.
Topic for an Add Error Codes request
GN
By using the REST API, Platform Service can send a request to a device to update the value of one or more of the
iotdevice-1/add/diag/errorCodes
following device attributes:
VI
VI
Message format for an Add Error Codes request
deviceInfo Optional
Outgoing message from the device:
mgmt.firmwareSee Firmware update process
Topic: iotdevice-1/add/diag/errorCodes
Topic for an Update Device Attributes request
{
"d": {
The server publishes the device update request to the following topic:
Incoming message from the server: Incoming message from the server:
S
"rc": number, "rc": 200,
TE
TE
"reqId": "string" "reqId": "string"
} }
Response codes for an Add Error Codes request Response codes for a Clear Error Codes request
NO
NO
Response Response
Message Message
code code
K
K
200 The operation was successful. 200 The operation was successful.
400 The input message does not match the expected format, or one of the values is out of the valid range. 400 The input message does not match the expected format, or one of the values is out of the valid range.
H
H
404 The device has not been registered with Platform Service. 404 The device has not been registered with Platform Service.
ES
ES
409 Resource could not be updated due to a conflict (for example, the resource is being updated by two simultaneous requests 409 Resource could not be updated due to a conflict (for example, the resource is being updated by two simultaneous requests
GN
Devices can request that Platform Service clears all error codes for the device by using the Clear Error Codes Devices can choose whether to notify Platform Service device management support about changes by adding a
request type. new log entry. Log entries include a log message, time stamp, severity, and optional base64-encoded binary
VI
VI
diagnostic data.
Topic for a Clear Error Codes request
Topic for an Add Log request
A device publishes this request to the following topic:
A device publishes this request to the following topic:
iotdevice-1/clear/diag/errorCodes
Message format for a Clear Error Codes request iotdevice-1/add/diag/log
Message format for an Add Log request
Request format:
The following table describes the format of the outgoing message attributes:
Outgoing message from the device:
Request format:
Devices can request that Platform Service clear all of the log entries for the device by using the Clear Logs request
S
TE
TE
Topic for a Clear Logs request
Topic: iotdevice-1/add/diag/log
{
A device publishes a Clear Logs request to the following topic:
NO
NO
"d": {
"message": "string", iotdevice-1/clear/diag/log
"timestamp": "string", Message format for a Clear Logs request
"data": "string",
K
K
"severity": number Request format:
},
Outgoing message from the device:
"reqId": "string"
H
H
}
ES
ES
Topic: iotdevice-1/clear/diag/log
Response format: {
"reqId": "string"
GN
GN
Incoming message from the server: }
VI
{
Incoming message from the device:
"rc": number,
"reqId": "string"
Topic: iotdm-1/response
}
{
Response codes for an Add Log request
"rc": number,
Response
Message
code Topic: iotdm-1/observe
{
200 The operation was successful.
"d": {
400 The input message does not match the expected format, or one of the values is out of the valid range. "fields": [
{
404 The device has not been registered with Platform Service.
"field": "field_name"
Resource could not be updated due to a conflict (for example, the resource is being updated by two }
409
simultaneous requests). The update can be retried later. ]
},
Observe Attribute Changes requests
S
"reqId": "string"
Platform Service can send an Observe Attribute Change request to a device to observe changes of one or more }
TE
TE
device attributes by using the Observe Attribute Changes request type. When the device receives the request, it
Response format:
must send a notification request to Platform Service whenever the values of the observed attributes change.
NO
NO
Outgoing message from the device:
Important: Devices must implement, observe, notify, and cancel operations in order to support Firmware Actions-
Update request types.
Topic: iotdevice-1/response
{
K
K
Topic for an Observe Attribute Changes request
"rc": number,
The server publishes an Observe Attribute Changes request to the following topic: "message": "string",
H
H
"d": {
iotdm-1/observe
ES
ES
"fields": [
Message format for an Observe Attribute Changes request
{
"field": "field_name",
The fields array is an array of the device attributes from the device model. If a complex field, such
GN
GN
"value": "field_value"
as mgmt.firmware is specified, it is expected that its underlying fields are updated at the same time so that only
}
a single notification message is generated.
]
VI
VI
The message parameter that is used in the response can be specified if the value of the rc parameter is not 200. },
If any specified parameter value cannot be retrieved, the value of the rc parameter must be set to either 404 if "reqId": "string"
the attribute is not found, or to 500 for any other reason. When values for parameters cannot be found, }
the fields array should contain elements that have field set to the name of each parameter that could not be read. Cancel Attribute Observation requests
The value parameter should be omitted. For the response code parameter to be set to 200,
Platform Service can send a request to a device to cancel the current observation of one or more device attributes
both field and value must be specified, where value is the current value of an attribute that is identified by the
by using the Cancel Attribute Observation request type. The fields part of the request is an array of the device
value of the field parameter.
attribute names from the device model, for example, location, mgmt.firmware,
Incoming message from the server: The message parameter can be specified if the value of the rc parameter is not 200.
Important: Devices must implement, observe, notify, and cancel operations in order to support Firmware Actions- Notify Attribute Changes requests
Update request types.
Platform Service can make an observation request for a specific attribute or a set of values by using the Notify
Topic for a Cancel Attribute Observation request Attribute Changes request type. When the value of the attribute or attributes changes, the device must send a
notification that contains the latest value.
The server publishes a Cancel Attribute Observation request to the following topic:
The value of the field parameter is the name of the attribute that changed, and the value is the current value of
iotdm-1/cancel the attribute. The attribute can be a complex field. If multiple values in a complex field are updated as a result of
Message format for a Cancel Attribute Observation request a single operation, only a single notification message is sent.
Request format: Important: Devices must implement observe, notify, and cancel operations in order to support Firmware Actions-
S
Update request types.
Incoming message from the server:
TE
TE
Topic for a Notify Attribute Change request
Topic: iotdm-1/cancel
NO
NO
{ A device publishes a Notify Attribute Change request to the following topic:
"d": {
"fields": [ iotdevice-1/notify
K
"field": "field_name"
Request format:
}
]
Outgoing message from the device:
H
H
},
ES
ES
"reqId": "string"
Topic: iotdevice-1/notify
}
{
GN
GN
"d": {
Response format:
"fields": [
VI
"field": "field_name",
{ }
"rc": number, ]
"message": "string", }
} }
Response format:
Topic: iotdm-1/response
{
"rc": number, UNIT III CASE STUDIES/INDUSTRIAL APPLICATIONS
"reqId": "string" Case studies with architectural analysis: IoT applications – Smart City – Smart Water – Smart
} Agriculture – Smart Energy – Smart Healthcare – Smart Transportation – Smart Retail – Smart
Response codes for a Notify Attribute Change request
waste management
Response
Message
code
Smart City and Industrial IoT Applications
S
200 The operation was successful. If you think cities are crowded now, just wait. Within just 15 years, more than 5 billion people will live in urban
environments. Urban growth boundaries are increasingly limiting sprawl, forcing even more growth to go vertical,
TE
TE
400 The input message does not match the expected format, or one of the values is out of the valid range.
increasing urban density. Smart cities backed by Industrial IoT Applications will become a normal thing..
404 The device has not been registered with Platform Service.
By 2020, the Philippines and Thailand could each have middle classes as large as in the United Kingdom, France
NO
NO
Resource could not be updated due to a conflict (for example, the resource is being updated by two or Italy. Today, some 3 billion people comprise the global middle class, accounting for two thirds of the world’s
409
simultaneous requests). The update can be retried later. consumer spending. The middle class demands public services, and live lifestyles – urban lifestyle – that consume
more water, energy and other resources than those who live in poverty.
500 An internal error occurred.
K
K
To manage this broad population growth, increased population density and growing middle class, we will need to
evolve and optimize our cities, becoming more efficient at service delivery and better managing our resources.
We need, of course, to make our cities smarter and integrate Industrial IoT Applications.
H
H
ES
ES
Internet of Things Technology as a Key Enabler
One thing is certain. Technology is going to be the enabler of this massive transition. Singapore’s electronic road
pricing program – the descendent of a traffic congestion management program first introduced in 1975 – has
GN
GN
significantly reduced traffic volumes, collisions, and automobile sourced pollution emissions. In California, the
state department of transportation launched in 2016 a technology heavy SMART corridor project for the
oversubscribed eight-mile stretch of Interstate 80 leading into San Francisco, anticipating a reduction in collisions
VI
VI
and commuter travel time.
Tech giants such as Google, IBM, Cisco and Intel have all launched smart city initiatives or platforms, designed to
aggregate, process and make sense of the data that municipal devices and physical plant generate. Grand View
Research has predicted a global smart cities market of $1.4 trillion by 2020. McKinsey estimates that just 600
cities account for 60 percent of global GDP.
How IoT and smart city applications work
The smart city industry is projected to be a $400 billion market by 2020, with 600 cities worldwide. These cities are
expected to generate 60 percent of the world’s GDP by 2025, according to McKinsey research.
Critics have suggested that the proliferation of electronic Internet of Things devices will increase energy demands,
further stressing the environment. But the overwhelming evidence is that smart cities will more than pay for
themselves environmentally through better management of resources such as energy and water and reduced wall in FPL’s system control center, including from water monitors, to protect against flooding, in over 600
pollutants emissions. substations.
Singapore has realized significant reductions in CO2 and particulate matter emissions through congestion And, just recently, AT&T announced the launch of its first Smart Cities Operations Center in Miami-Dade County,
management (Reduced traffic congestion translates directly to lower emissions.) providing local leadership with a single big board display surfacing key metrics of community conditions in near-
real time.
Gartner, Inc. research vice president Bettina Tratz-Ryan has gone on record estimating that, particularly for large
sites such as airports, seaports and shopping malls, IoT technology can reduce the cost of energy, spatial Examples of Smart City Applications & Technologies
management and building maintenance by up to 30 percent (lower energy costs the product of lower energy
In Miami-Dade County, officials are using smart city technology for remote monitoring and more efficient public
consumption). Further, Gartner has predicted that smart city and IoT technologies will halve urban environmental
safety operations, traffic congestion mitigation and for surfacing reliable data to inform urban transportation
footprints by 2030.
planning decisions.
S
Smart City Activation is Multidimensional
The national Ministry of Urban Development in India is sponsoring the 100-city Smart Cities Mission, aimed at
TE
TE
Smart city deployment is multidimensional. In any major urban center, there are several use cases, and they can promoting “cities that provide core infrastructure and give a decent quality of life to its citizens, a clean and
vary depending on the size of the city and local jurisdictional control. For example, roughly 8 percent of U.S. sustainable environment and application of “smart” solutions.”
electricity providers are municipally owned (nonetheless, “smart city” benefits accrue to regional service
NO
NO
The city of Jaipur, in Rajasthan province, is the most recent to deploy, consolidating parking systems, streetlight
providers as well). Here’s a rundown on some of the most interesting industrial applications of smart city
management and public safety surveillance to a single big board presentation. The operations center integrates
technology and thinking that are being deployed now, or close on the horizon.
data from different municipal departments and better facilitates cross-departmental collaboration.
The Industrial Smart City
Applications of IoT in Smart Cities
K
K
Electronic traffic congestion management as in Singapore or like the Bay area SMART corridor
Public transit operations management, as seen with the Seoul Metropolitan Subway, which manages IoT has many applications in the smart city sector such as traffic management, public safety, environmental
rolling stock, tracks and public safety through an IoT deployment. When trains and buses run on time, monitoring etc. IoT is a network of physical objects that are embedded with electronics, software, sensors and
H
H
providing safe, reliable, transit, public transit is a more viable alternative connectivity. These objects can collect and exchange data with other objects and systems. IoT in Smart Cities can
ES
ES
be used to monitor traffic congestion, air quality or noise pollution levels in the city. It can also be used to monitor
Improved operations management for water treatment plants for efficiencies, and transparency to
residents with regards to their water supply and constraints the water levels in reservoirs or detect when a tree falls down on the street.
GN
GN
Infrastructure and operational monitoring for the electrical grid, including computing resources, to 1. Smart Lighting
protect against cyber attacks, for safety and security
Smart Lighting systems use sensors and automation to adjust the brightness of lights based on ambient light and
Adaptive timing for traffic lights to minimize congestion and optimize flow situationally, e.g. morning v.
VI
VI
traffic levels. This results in energy savings and improved safety for pedestrians and motorists.
evening commutes, holidays v. normal workdays
Highly localized air quality monitoring and data collection, allowing correlation to traffic congestion and 2. Intelligent Traffic Management
Initiatives such as these enjoy government support and backing from the federal to municipal level. For example, congestion and improving safety for drivers and pedestrians.
in 2006, the U.S. Department of Energy announced the multi-year, $220 million Grid Modernization Initiative
3. Smart Waste Management
intended to improve the resiliency, reliability and security of the United States electric system.
Smart Waste Management systems use sensors and real-time monitoring to schedule waste collection, reducing
The energy secretary made the announcement at the end of a tour of Florida Power & Light (FPL) facilities. The
costs and improving the efficiency of waste management operations.
utility has been steadily investing some $2 billion over the past 10 years in smart technology for its grid, hardening
4. Environmental Monitoring
it in defense of severe weather, such as hurricanes. Data from the grid flows to the 188-foot wide big board video
Environmental Monitoring systems use sensors to continuously monitor air quality, temperature, and other
IoT in Water Management
environmental parameters, providing information to help maintain a healthy environment.
6. Intelligent Parking Management But does IoT play any role in water management too? Can we check water levels and determine how to prevent
Intelligent Parking Management systems use real-time monitoring and dynamic pricing to manage parking water wastage through IoT? The answer is: Yes, IoT can help you do that too. How? Let us find it below.
demand, reducing congestion and improving accessibility. Applications of IoT in Water Management
Wastewater Management
S
7. Public Safety and Emergency Response
It is one of the most challenging tasks amongst the management applications of IoT. The IoT helps manage water
TE
TE
Public Safety and Emergency Response systems integrate surveillance cameras, smart sensors, and emergency
levels, leakage, water quality, and water flow in various places through different water routes. The working of
communication to improve response time and efficiency during emergencies.
loT in water level management is done when the sensors are installed at additional water resources. It helps to
NO
NO
8. Smart Buildings and Home Automation detect the water temperature at different places, the quality of water, and the level of leakage at other sites and
indicates the methods to be applied to stop water leakage.
Smart Buildings and Home Automation systems provide automated control of lighting, heating, cooling, and other
building systems to improve comfort, security, and energy efficiency. The sensors are installed to collect data on water wasted and leaked and monitor water levels. Wastewater can
also be measured through sensors, as it helps to know the number of chemicals used in the water. The data
K
K
9. Health Monitoring and Care Services
received can be used to improve the quality of water too. Sensors may also help to see water distribution in
Health Monitoring and Care Services use continuous monitoring of vital signs, fall detection, and medication different patterns and areas.
management to provide timely and effective care for elderly or disabled individuals.
H
H
Maintenance of Water Quality
ES
ES
10. Smart Retail and Marketing
The quality of water used is a matter of concern. Water might contain polluted materials. Due to advanced
Smart Retail and Marketing systems use customer behavior and preferences to offer personalized marketing and machinery, factories, and other factors supporting pollution, water quality has degraded severely.
recommendations, as well as real-time inventory management to improve efficiency and customer satisfaction.
GN
GN
IoT sensors help to maintain the quality of water. Though it might be costly, it has reduced manual labor. Manual
Conclusion about Smart Cities and Industrial IoT Applications labor involves collecting and checking the water quality. This method is both time-consuming and costly. IoT has
installed sensors which measure the temperature, quality and turbidity. The sensors provide regular water status
VI
VI
The United Nations has estimated that world population will reach 9.7 billion by 2050, and 11.2 billion in 2100.
so that water quality can be improved.
India’s population is expected to exceed that of China, currently the largest country, around 2022; Nigeria’s
population could exceed that of the United States by 2050. There is no question that this growth will demand Smart Irrigation
more efficient management of resources, and improved operations of urban services. We waste a considerable amount of water when irrigating crops. As manual labour has been reduced in the last
few years, irrigation has been done automatically through timings set in the automated machinery. Before,
Smart city and Internet of Things technologies and applications are much-needed facilitators enabling
irrigation was done without the knowledge of the condition of the soil and weather conditions. But, with the help
government officials and operational staff to respond to the societal changes commensurate with this growth.
of loT devices, there will be no water wastage. It is possible as sensors are attached and can determine the type
Government leaders no longer have excuses for the smart city imperative.
of soil and weather conditions.
IoT has managed this problem as the sensors can distribute water accordingly to places where the water is
needed. Sensors also help control the flow of water effectively and help determine the force of water.
S
Agriculture almost depends on the level of water. Therefore, the level of water management is necessary to
increase productivity. The demand for growing population can be successfully met with IoT.
TE
TE
Improving the Water Efficiency Despite a growing population, now predicted to reach 9.6 billion by 2050, the agriculture industry must rise to
We can improve water efficiency by using several means of IoT, like water collectors, treatment of water, water meet demand, regardless of environmental challenges like unfavorable weather conditions and climate change.
NO
NO
pressure systems and wastewater recycling. Vital measurements have been made to maintain water efficiency, To meet the needs of that growing population, the agriculture industry will have to adopt new technologies to
and data has been collected. gain a much-needed edge. New agricultural applications in smart farming and precision farming through IoT will
enable the industry to increase operational efficiency, lower costs, reduce waste, and improve the quality of their
Depending on the data collected by the sensor, measures are taken accordingly, and therefore, there are no
yield.
K
K
issues related to breakage or leakage of water pipes. They function well after adopting IoT devices.
Monitoring the Consumption of Water So, what is smart farming? Smart farming is a capital-intensive and hi-tech system of growing food cleanly and
H
H
IoT helps to collect data from different sources and water consumed at other places at different levels. Water sustainable for the masses. It is the application of modern ICT (Information and Communication Technologies)
data is collected from households, countries, communities, and the globe. This way, we can monitor the
ES
ES
into agriculture.
consumption of water everywhere.
Water Conservation In IoT-based smart farming, a system is built for monitoring the crop field with the help of sensors (light, humidity,
GN
GN
temperature, soil moisture, etc.) and automating the irrigation system. The farmers can monitor the field
Sensors have been attached to the water tanks and reservoirs. The sensors are attached to monitor the level of
conditions from anywhere. IoT-based smart farming is highly efficient when compared with the conventional
water management continuously. They calculate this data every day.
VI
VI
approach.
It should have enough water conserved, so people do not suffer during the drought session. Analyzing daily
water usage and sending a signal to the main river sensor helps conserve the water and maintain the water levels.
The applications of IoT-based smart farming not only target conventional, large farming operations, but could also
Maintaining the water levels of the increasing population also helps to satisfy the needs and requirements of the
be new levers to uplift other growing or common trends in agricultural like organic farming, family farming
people.
(complex or small spaces, particular cattle and/or cultures, preservation of particular or high-quality varieties,
Smart Water System Integration and Water Monitoring System etc.), and enhance highly transparent farming.
IoT has introduced certain strips which help measure water leakage from pipes, households, outdoors, and other
resources. These show the exact location of the leakage of water and the exact location where the pipes need to In terms of environmental issues, IoT-based smart farming can provide great benefits including more efficient
be amended. This way, the engineers know the location and start working there. water usage, or optimization of inputs and treatments. Now, let’s discuss the major applications of IoT-based
smart farming that are revolutionizing agriculture.
Applications of IoT in Agriculture PrecisionHawk is an organization that uses drones for gathering valuable data via a series of sensors that are used
for imaging, mapping, and surveying of agricultural land. These drones perform in-flight monitoring and
Precision Farming observations. The farmers enter the details of what field to survey and select an altitude or ground resolution.
Also known as precision agriculture, precision farming can be thought of as anything that makes farming practice From the drone data, we can draw insights regarding plant health indices, plant counting and yield prediction,
more controlled and accurate when it comes to raising livestock and growing crops. In this approach of farm plant height measurement, canopy cover mapping, field water ponding mapping, scouting reports, stockpile
management, a key component is the use of IT and various items like sensors, control systems, robotics, measuring, chlorophyll measurement, nitrogen content in wheat, drainage mapping, weed pressure mapping,
autonomous vehicles, automated hardware, variable rate technology, and so on. and so on.
The adoption of access to high-speed internet, mobile devices, and reliable, low-cost satellites (for imagery and The drone collects multispectral, thermal, and visual imagery during the flight and then lands in the same location
positioning) by the manufacturer are a few key technologies characterizing the precision agriculture trend.
S
it took off.
TE
TE
Precision agriculture is one of the most famous applications of IoT in the agricultural sector and numerous
Livestock Monitoring
organizations are leveraging this technique around the world. CropMetrics is a precision agriculture organization
NO
NO
focused on ultra-modern agronomic solutions while specializing in the management of precision irrigation. Large farm owners can utilize wireless IoT applications to collect data regarding the location, well-being, and
health of their cattle. This information helps them in identifying animals that are sick so they can be separated
The products and services of CropMetrics include VRI optimization, soil moisture probes, virtual optimizer PRO, from the herd, thereby preventing the spread of disease. It also lowers labor costs as ranchers can locate their
and so on. VRI (Variable Rate Irrigation) optimization maximizes profitability on irrigated crop fields with cattle with the help of IoT based sensors.
K
K
topography or soil variability, improve yields, and increases water use efficiency.
JMB North America is an organization that offers cow monitoring solutions to cattle producers. One of the
The soil moisture probe technology provides complete in-season local agronomy support, and recommendations solutions helps the cattle owners observe cows that are pregnant and about to give birth. From the heifer, a
H
H
to optimize water use efficiency. The virtual optimizer PRO combines various technologies for water management sensor powered by a battery is expelled when its water breaks. This sends information to the herd manager or
ES
ES
into one central, cloud-based, and powerful location designed for consultants and growers to take advantage of the rancher. In the time that is spent with heifers that are giving birth, the sensor enables farmers to be more
the benefits in precision irrigation via a simplified interface. focused.
GN
GN
Agricultural Drones Smart Greenhouses
VI
VI
Technology has changed over time and agricultural drones are a very good example of this. Today, agriculture is Greenhouse farming is a methodology that helps in enhancing the yield of vegetables, fruits, crops, etc.
one of the major industries to incorporate drones. Drones are being used in agriculture in order to enhance Greenhouses control the environmental parameters through manual intervention or a proportional control
various agricultural practices. The ways ground-based and aerial-based drones are being used in agriculture are mechanism. As manual intervention results in production loss, energy loss, and labor costs, these methods are
crop health assessment, irrigation, crop monitoring, crop spraying, planting, and soil and field analysis. less effective. A smart greenhouse can be designed with the help of IoT; this design intelligently monitors as well
as controls the climate, eliminating the need for manual intervention.
The major benefits of using drones include crop health imaging, integrated GIS mapping, ease of use, saves time,
and the potential to increase yields. With strategy and planning based on real-time data collection and processing, For controlling the environment in a smart greenhouse, different sensors that measure the environmental
drone technology will give a high-tech makeover to the agriculture industry. parameters according to the plant requirement are used. We can create a cloud server for remotely accessing the
system when it is connected using IoT.
This eliminates the need for constant manual monitoring. Inside the greenhouse, the cloud server also enables Introduction
data processing and applies a control action. This design provides cost-effective and optimal solutions for farmers
The expected number of massive internet of thing (mIoT) devices in the near future are estimated to be in billions
with minimal manual intervention.
and are continuously increasing in number [1]. These devices will remain connected to the extremely reliable and
low latency networks while continuously transmitting the data during the whole life of their operation [43]. Since
Illuminum Greenhouses is a drip installation and Agri-Tech greenhouse organization and uses new modern
the capacity to accommodate the IoT devices within the network is being increased with the introduction of 5G
technologies for providing services. It builds modern and affordable greenhouses by using solar-powered IoT
and similar technologies, the complexity of data management and energy optimization for IoT devices is becoming
sensors. With these sensors, the greenhouse state and water consumption can be monitored via SMS alerts to
a challenging task for the researchers [2]. The collaborated working of IoT devices in the form of the swarm is
the farmer with an online portal. Automatic Irrigation is carried out in these greenhouses.
necessary for successful implementation of IoT services as well as for developing energy management protocols
[44]. The implementation of IoT in the real-world environments with smart, ubiquitous and live interconnections
The IoT sensors in the greenhouse provide information on the light levels, pressure, humidity, and temperature.
are still restricted by constraints like device battery life, network capacity and the cost of maintaining both.
S
These sensors can control the actuators automatically to open a window, turn on lights, control a heater, turn on
Powering billions of such interconnected devices is still one of the biggest challenges that IoT faces today [3,4].
a mister or turn on a fan, all controlled through a WiFi signal.
TE
TE
The core functionality of IoT devices is to reliably collect and share the perceived data with the physical world.
Conclusion The hardware element of the IoT device consists of a battery-powered sensor, an actuator and a communication
NO
NO
system [5]. The function of a sensor is to collect the data from its designated environment. The data can be flow
Thus, the IoT agricultural applications are making it possible for ranchers and farmers to collect meaningful data. rates, temperatures, pressures, physical movements, distance, mass etc. The collected data is then processed on
Large landowners and small farmers must understand the potential of IoT market for agriculture by installing the device so that it can be sent to remote servers through the communication network. The major elements of
smart technologies to increase competitiveness and sustainability in their productions. With the population the IoT system are shown in Fig. 1.
K
K
growing rapidly, the demand can be successfully met if the ranchers, as well as small farmers, implement
agricultural IoT solutions in a prosperous manner. Sensors are the IoT devices that are acquiring the data, processing and communicating it to its destination. Thus,
sensors are the power hogs of an IoT system. The limited battery lives of these devices are a major obstacle in full
H
H
fledge implementation of IoT. Large amount of data collection and data processing are only possible at the
ES
ES
expense of higher energy consumption [45]. Considering the limited battery lives, data amount and accuracy are
Smart energy optimization for massive IoT using artificial intelligence simply a tradeoff [6]. The batteries of IoT devices may need to recharge intermittently and frequently for reliability
The concept of a connected world using Internet of Things (IoT) has already taken pace during this decade. The and a smooth operation, which is a major obstacle task for billions of interconnected devices [7].
GN
GN
efficient hardware and high throughput networks have made it possible to connect billions of devices, collecting
and transmitting useable information. The benefit of IoT devices is that they enable automation however, a Traditionally, optimization of the hardware is considered a preferred solution to save energy by increasing
VI
VI
significant amount of energy is required for billions of connected devices communicating with each other. This efficiency. A similar approach has been adopted for IoT devices and new ultra-low energy consuming devices have
requirement of energy, unless managed, can be one of the barriers in the complete implementation of IoT been designed. Using the existing technologies, the more efficient and customized versions have been developed
systems. This paper presents the energy management system for IoT devices. Both hardware and software such as Bluetooth low energy (BLE) [8]. However, with billions of devices connected and communicating
aspects are considered. Energy transparency has been achieved by modelling energy consumed during sensing, uninterruptedly, the role of software governing the devices also becomes just as significant. The studies show
processing, and communication. A multi-agent system has been introduced to model the IoT devices and their that about 80% of the total energy consumed by an embedded system relies on the governing software that is
energy consumptions. Genetic algorithm is used to optimize the parameters of the multi-agent system. Finally, controlling the IoT devices [9,10]. It has been observed that an un-optimized software can poorly drive energy-
simulation tools such as MATLAB Simulink and OpenModelica are used to test the system. The optimization efficient hardware thus resulting in higher energy consumptions. Moreover, the devices have no feedback system
results have revealed substantial energy consumption with the implementation of decentralized intelligence of that can tell about the energy consumption of a specific algorithm. With the booming growth of the number of
the multi-agent system. new IoT devices being installed and operated, systems to measure and reform energy usage are increasingly
needed. There are three major constraints in gauging and optimizing the energy consumption of IoT devices
[11,12]:
1 Energy transparency helps in determining and gauging the energy consumed by IoT device while measuring the
The device selection is based mainly on hardware specifications and not on the energy consumption. data, processing and communicating it. In order to
Thus, when the devices are interconnected with other devices in the system, the overall energy
AI-based IoT energy management
consumption may increase.
With millions of devices in place, it will become impossible to track, monitor and manage their operation manually
2
or using general methods of controlling unless a significant amount of energy and processing power is consumed.
The application developers have no feedback of energy consumption for each device and algorithm,
Artificial intelligence (AI) based techniques learn from the events and improves the output, productivity and
which makes it challenging to perform causal-effect analysis and minimize the energy usage.
energy efficiency without human intervention. This study utilizes the reinforcement learning-based real-time
3 adaptive fuzzy logic systems coupled with genetic
When many devices are working in a swarm, their overall energy consumption is dependent on several
Simulation results
S
factors including the signal interferences and mitigation. So far, the protocols defining energy
TE
TE
management for IoT systems have not been fully implemented. A feedback mechanism discussed in section B for IoT energy consumption is also implemented in the simulation.
Due to the above-mentioned reasons, the process of developing energy-efficient hardware and governing All the agents incorporate the feedback mechanism coming from IoT devices. The agents optimize energy
software is still a challenging process for the developers. consumption by observing the necessity versus frequency of transmitted data over the communication network.
NO
NO
When similar data is being received and processed over a period, the reinforced learning algorithms reduce
There are two objectives of this research: first, devising a protocol enabling energy transparency for the new IoT
communication to the point where it is very necessary. The intervals
devices and second, optimizing the software aspect of the current devises using AI. We believe that the energy
transparency protocol for IoT systems should enable hardware manufacturers to produce energy efficient IoT Conclusions
K
K
devises and software programmers to develop energy efficient systems. Moreover, implementing feedback
mechanisms with optimization algorithms in software should minimize the energy consumption in current IoT This study encompasses the imminent problem i.e. energy consumption of IoT devices. With billions of such
systems. devices operating constantly and transmitting and receiving data, there was a need to develop a model that can
H
H
organize and control the energy consumption by these devices. The paper focused on both the hardware aspect
ES
ES
and software aspect of energy conservation. The hardware aspects of energy consumption have been divided
Section snippets
into four major parts.
GN
GN
Previous works in the field of IoT energy optimization
A Study on Smart Healthcare Monitoring Using IoT Based on Blockchain
Not much work has been done in the field of optimizing the energy consumption of IoT devices, although a lot of
VI
VI
work has been done in optimizing the energy consumption of systems (smart grids, industry 4.0, smart cities etc.)
Abstract
which use IoT devices as a tool [13,14]. Considering billions of interconnected devices, their energy consumption
cannot be ignored and optimization using different hardware and software alterations is necessary. This section Background/Motivation. Recently, a lot of interest in health is increasing due to the technology of the 4th
will first cover the studies made relevant to industrial revolution. In particular, personal medical information through intelligent self-diagnosis is emerging as
very important. However, such personal medical information causes many problems in security and
Energy transparency in IoT devices
reliability. Problem/Issues. Personal medical information accidents may occur on the server, but most of all, they
occur more often in information sharing and data transmission. Therefore, in this paper, blockchain technology is
This section of the paper focuses on devising the protocols for energy transparency in IoT devices. We also
applied to improve the reliability of such personal information management. Research Objective/Methodology.
propose a novel approach for minimizing energy consumption for IoT systems using energy transparency
For intelligent healthcare incorporating blockchain technology, this study utilized the blockchain-based Internet
protocols and software optimization. We will also evaluate our approach to compare its performance with other
of Things. In addition, information was accumulated using a number of measurement sensors to analyze individual
known approaches.
ECG information. The measured biosignals were monitored for personalized diagnosis by analyzing the fused
threshold. Result. In this paper, we implemented a monitoring system using measurement sensors to analyze 2.1. oneM2M
individual biometric information. The implemented system information has improved reliability and security by
incorporating blockchain technology. In this section, we explore the entire architecture of oneM2M. oneM2M defines a common platform on the IoT
that can satisfy the requirements of various services and standardized interworking with other platforms [6]. By
defining interfaces for compatibility between various applications, horizontal platforms can be constructed away
1. Introduction
from the traditional vertical forms of the IoT platforms to prevent fragmentation, reduction development, and
Advances in information and communication technology led to Internet-connected devices such as smartphones, operational costs [7]. The requirements are derived by reflecting the use cases of 7 industries such as smart home,
home appliances, wearable devices, and the IoT (Internet of Things) [1]. It is a network environment for analyzing smart car, energy, healthcare, enterprise, and public service, and core functions (data collection and reporting
data collected by these devices on a platform, processing them into meaningful data, and creating various function, the remote control of devices, the maintenance of connectivity, security and privacy functions, etc.) and
services. The IoT consists of four layers: application service, platform, network, and device [2]. In particular, the interface were defined [8]. The entity of oneM2M consists of the user/end-user, application service provider,
M2M service provider, and network operator. The user/end-user refers to individuals or companies using M2M
S
IoT platform serves as a formalizing interface for processing data generated and collected from devices and
providing it to application services. However, in this structure, IoT application services have no choice but to rely solutions, and the application service provider refers to providers that provide M2M services [9]. The M2M service
TE
TE
on the availability of the IoT platform. In other words, the IoT platform is a factor that causes a single point of provider is the principal provider of M2M common services to the application service provider. The network
failure [3]. Therefore, to solve the issues of such a centralized platform, a lot of research has been conducted on operator is the main provider of the network to the M2M service provider. oneM2M is connected by multiple
NO
NO
the structure of the distributed IoT. The devices also collect sensitive data associated with the users. Therefore, nodes to form an infrastructure, with one node consisting of AE (Application Entity), CSE (Common Service Entity),
the privacy issue arises in the IoT, and research is being conducted to solve it. In this paper, we consider how to and NSE (Network Service Entity) [10]. AE is responsible for application function logic for providing M2M service,
apply blockchain to IoT to solve the two problems mentioned above [4]. To this end, it derives requirements for and CSE provides 12 common service functions for AE from a functional perspective. NSE provides CSE with
constructing a distributed IoT and suggests a direction to be studied in the future to build a blockchain-based IoT network device management and services, and each entity interacts through a reference point. The reference
K
K
platform that satisfies the derived requirements. Based on smart health, we plan to implement a monitoring point refers to the connections between CSE, AE, and NSE, which are mapped to the binding protocol for real-
system that predicts users’ current state by detecting movements such as falls by acceleration sensors and world communication. Figure 1 shows the overall structure of oneM2M [11].
measuring health conditions with an individual’s vital signs such as blood pressure, heart rate, and body
H
H
temperature [5]. The goal is to measure biosignals through sensor units, transmit them to the control unit via
ES
ES
Bluetooth, store them in the database, analyze the stored biosignals, and derive the user’s current state.
Therefore, personal medical information is top secret. However, the existing system has poor reliability and
GN
GN
security. The method proposed in this paper reinforces reliability and security by incorporating blockchain
technology. The structure of this paper is as follows. We discuss the blockchain-based related research and
configuration in Section 2 and the implementation of a smart healthcare monitoring system using biosignals
VI
VI
utilizing blockchain-based technology in Section 3. We discuss the performance evaluation in Section 4 and
present the conclusion and future research tasks in Section 5.
2. Related Work
In the past decade, the IIoT has attracted enormous research attention from both academia and industries and is
becoming one of the key technologies to enhance manufacturing and industrial processes. The IIoT presents great
promises in accurate and consistent real-time data processing, sustainable and green practices, predictive
maintenance (PdM), etc. The IIoT will add £10.69bn to the global economy by 2030. In this section, we explore
the structure of oneM2M (Machine to Machine), IoTivity, AllJoyn, and LWM2M (Lightweight Machine to Machine)
as platforms that are mainly used in the IoT and study what role blockchain could play in the IoT field.
exchanging data between devices on a network such as the Internet, and the L2 connectivity layer provides a
connection between the physical layer and the data link layer [14].
Figure 1
In Figure 1, Mca represents communication between CSE and AE, Mcc represents communication between CSE
Figure 3 shows the overall structure diagram of the LWM2M.
and CSE, Mcn represents communication between CSE and NSE, and Mcc represents communication with other
infrastructure domain CSE [12]. CSE provides various common service functions, including
Lookup/Discovery/Resolution and CRUDN (Create, Retrieve, Update, Delete, Notify) operations to 12 common
service functions based on ROA (Resource-Oriented Architecture).
S
2.2. IoTivity
TE
TE
Figure 2 shows the overall structure of IoTivity.
NO
NO
K
K
H
H
ES
ES
GN
GN
Figure 3
VI
The LWM2M consists of an LWM2M bootstrap server, a smart card, and an LWM2M server/client. The LWM2M
Figure 2 enabler describes the LWM2M server and LWM2M client elements. To use the LWM2M, the bootstrap step can
be initially optionally performed [15]. The bootstrap phase of LWM2M is the process of predescribing parameters
Overall structure diagram of IoTivity.
to LWM2M clients to simplify some information or mutual authentication of the LWM2M server. The LWM2M
IoTivity is composed of the application profiles, OCF framework, transport, networking, and L2 connectivity layers. bootstrap server and the smart card are used to perform the LWM2M bootstrap [16]. The LWM2M client
The application profiles layer executes various application applications such as smart home, connected health, performs client registration on the LWM2M server, which provides device management and service enablement
retail, and automotive [13]. As a layer for providing the functions required by an application executed in the functions to manage the LWM2M client. The LWM2M client provides an information reporting function to help
application profiles layer, the OCF framework provides ID and addressing, resource model, CRUDN, messaging, resource management of the LWM2M server. In the LWM2M, the M2M user receives services from the M2M
discovery, device management, and security functions. The transport layer provides an end-to-end transmission service provider, and the M2M service provider provides the LWM2M server and the M2M application service
function with specific QoS (Quality of Service) constraints. The networking layer provides the function of [17]. The LWM2M server can access the LWM2M clients through the network. The LWM2M server is operated
by a network service provider, not the M2M service provider, provides the LWM2M server interface to the M2M after analyzing and processing it for application services. However, the IoT-based application service receives data
application service, and performs LWM2M server/client communication. from one platform. In other words, all application services are bound to depend on the availability of one platform,
which can provide a single point of failure. The IoT platform fundamentally provides a data hub’s role, and this
2.4. Blockchain-Based IoT Utilization paper presents a blockchain-based data hub IoT platform to solve the abovementioned problems [22]. The
blockchain-based data hub constructs a blockchain that turns data into blocks by becoming the main body of IoT
The IoT has received a lot of attention as a technology that will change the future due to the development of small brokers and application services. While the existing IoT environment had a vertical four-layer structure, the
hardware and wireless network technology, but its lack of scalability and security vulnerability due to limited blockchain-based IoT environment horizontally constructs a blockchain layer that can replace the IoT platform. In
platforms have been pointed out as disadvantages so far [18]. However, it is not an exaggeration to say that the the blockchain-based IoT architecture, such as Figure 4, data collected from IoT devices is added to the blockchain
IoT is still the foundation of the 4th industrial revolution, and the IoT is located at the center of the convergence network either directly or through the IoT network layer [23].
of various ICTs. Blockchain is pointed out as a technology that can highlight the IoT’s importance and compensate
for its shortcomings. When blockchain is applied to the IoT, various changes occur as, first of all, the centralized
S
structure becomes a distributed structure. First, the IoT devices’ connection becomes a P2P structure, making all
TE
TE
members of equal status and easing the hierarchy. This will reduce the cost of system construction and
maintenance. In addition, new IoT devices will be able to participate in the system without additional equipment
NO
NO
such as gateways [19]. Individual IoT devices are vulnerable to security, and there have been attacks on the
devices and even the system. In 2016 DEFCON, the demonstration of ransomware demanding bitcoin by hacking
Nest’s thermostat is a famous example. However, it is meaningless to attack only one IoT device in an environment
with the requirements of distributed data blockchain-based decentralized IoT due to blockchain. In other words,
K
K
even if some of the systems have problems, the entire system is generally safe without being seriously impacted.
Therefore, there are various attempts to apply the IoT by converging blockchain [20]. Horizon is an open-source
project that attempts to collect and analyze all data by connecting the IoT with blockchain. The nodes participating
H
H
in Horizon discover each other using Horizon, share their transaction information according to smart contracts,
ES
ES
and record them in the ledger. Therefore, all Horizon participants can know one another’s transaction details, and
the content updated through consensus cannot be forged. Horizon participants are basically divided into
Figure 4
producers and consumers, in which the consumers receive the producer’s data. For example, if a consumer wants
GN
GN
a certain type of data and posts the information on Horizon, it matches with the producer and their transactions IoT structure diagram based on blockchain.
are registered in the blockchain to complete the contract. Currently, eight functions are provided, including radio
In the IoT application service, data can be imported from blockchain networks instead of the IoT platform. In this
VI
VI
content analysis, aircraft location tracking, and current GPS location tracking by devices. IOTA is a type of
structure, the problem with single points of failure disappears, and blockchain technology can be used to ensure
cryptocurrency that supports the sharing of resources on the IoT. IOTA implements blockchain without blocks but
reliability and consistency of data.
is aimed at exchanging resources with one another only through a distributed and shared ledger called Tangle
[21].
3. System Configuration and Implementation
2.5. Blockchain-Based IoT Platform
The smart healthcare monitoring system we want to implement in this paper consists of a sensor unit that can
sense the user’s condition, a control unit that can control it, and a monitoring system that can be checked on
This section presents a plan to solve the existing IoT environment, which cannot solve the single point of failure
smartphones. Figure 5 shows the proposed system scheme [24].
problem in the IoT, through blockchain technology. The IoT environment is divided into four layers: application
service, platform, network, and device. IoT big data collected from devices is delivered to the IoT platform through
an IoT gateway or broker in this typical IoT platform. The IoT platform mainly plays the role of formalizing data
Sensor unit.
The sensor unit was attached to the wrist to measure the biosignals, and the biosignals were measured with
reference to the measurement information in Table 1.
Table 1
Benchmark measurement.
The data used for analysis were data in the same environment, so they were grouped and transmitted in one
packet. It is configured to be processed as a single packet and transmitted in a single packet. Figure 7 shows the
sensor value received by the sensor unit [26].
S
Figure 5
TE
TE
Structure diagram of the system.
In Figure 5, the integrated sensor module collects sensor chip information and stores it in the database through
NO
NO
the control device. The stored data provides information to the user in real time through the smartphone.
K
For the smart healthcare monitoring system, we built and used a sensor module that incorporates each
measurement sensor to acquire stream data (systolic blood pressure, diastolic blood pressure, heart rate, and
body temperature) [25]. Figure 6 shows the sensor unit.
H
H
ES
ES
GN
GN
VI
VI
Figure 7
We constructed and used a measurement module that can analyze biosignals received via a Bluetooth module
from a sensor unit and output them to a smartphone. We classified biosignals received from sensor units by the
biosignal-specific condition of users in Table 2 to determine the degree of risk. We made it determine the degree
of risk if two or more biosignals were included in the range [27].
Figure 6
Table 2 The proposed algorithm detects abnormal movements such as falls with the sensor values received from the
acceleration sensor and analyzes the biosignals after abnormal movements are detected to determine the user’s
The status of each user’s biosignals.
current state according to the user’s biological condition as in Table 2. If a three-stage or higher serious condition
is detected, an alarm is sent to the user, requesting a response, and alarms and the current condition are also
3.3. Algorithm
sent to the guardian and medical staff. The value of the three axes measured by the sensor unit’s acceleration
The algorithm of smart healthcare monitoring systems implemented in this paper is shown in Figure 8. sensor is converted to an angle to determine the target’s posture. The angle measurement using acceleration
uses the angle between gravity and the -axis. The angle between gravity and the axis is shown in Figure 9.
S
TE
TE
NO
NO
K
K
H
H
ES
ES
Figure 9
GN
GN
Angle between gravity and the -axis.
VI
VI
When the user is lying down, the angle between gravity and the -axis approaches 90°. Therefore, when an
abnormal movement occurs, a movement such as a fall of the user can be detected through the angle of the
target.
In this paper, a monitoring system that allows users, guardians, and experts to check the user’s measured
biometric information anytime and anywhere using a smartphone was implemented using a JAVA-based Android
Figure 8 service environment. Figure 10 shows the implemented monitoring system [28].
Table 3
5. Conclusion
As the recent population is expected to experience an extremely aging society, the demand for smart medical
devices and telemedicine services for constant disease management is increasing, and the importance and
necessity of the smart healthcare industry is inevitable to form an active welfare society. Interest in mobile health
is also growing in Korea. In this paper, we proposed a smart health-based monitoring system that detects
abnormal movements such as falls with sensor values received from acceleration sensors and analyzes basic
S
biosignals of an individual’s blood pressure, heart rate, and body temperature after detecting abnormal
TE
TE
movements. A monitoring system was implemented using a JAVA-based Android service environment so that
users, guardians, and experts can check the user’s measured biometric information anytime and anywhere using
a smartphone, and the performance evaluation was conducted with biological signals such as 500 systolic blood
NO
NO
pressure, diastolic blood pressure, heart rate, and body temperature datasets of 50 individuals. As a result of the
experiment, the SVM algorithm for analyzing biosignals showed an average error rate of 2%. When the window
size was divided by 5000, it was shown to be effective by reducing the maximum by 19.2% of the storage space.
The classification accuracy was the highest at 97.2% when the window size was divided by 5000. Of the total 5000
K
K
Figure 10
evaluation data, 84 results came out differently, but there were no significant problems; i.e., the results from the
Result interface of system implementation based on a smartphone. system were lower than the expert’s judgment with approximately 98% accuracy. In the future, we believe that a
H
H
more improved system will be achieved with the addition of ultrasmall biometric sensors and patient positioning
In the interface, the current condition of users can be identified by classification of the result of the data, items
ES
ES
functions, the implementation of a home network system using wireless sensors, and a study on the development
for monitoring numerical data by an hour and date, and biological signal conditions. In addition, a graph item to
of an algorithm that can predict fall accidents before they happen. This paper has applied blockchain technology
view the change of each biosignal was added.
to improve reliability and maintain confidentiality to protect personal medical information. The accumulation of
GN
GN
personal medical information is stored in data and monitored in real time using a sensor chip, an Internet of
4. Performance Evaluation Things technology. Personal medical information is provided through a smartphone in real time.
VI
VI
To evaluate the system’s performance in this paper, we utilized four biometric signals (20,000 systolic blood
pressure, diastolic blood pressure, heart rate, and body temperature datasets) of each of the 50 individuals when
an abnormal movement from the sensor unit was detected. In addition, each data was classified into the four
conditions of good, abnormal, severe, and emergency, according to an expert’s diagnosis. Since the biosignal data
used in the experiment used irregular data rather than a linear relationship, the error rate had to be measured.
In this experiment, the error rate according to the size change of the sliding window was measured.
Table 3 uses 20,000 datasets and divides the window size from 1000 to 2000 according to the number of tuples
and reduces data through SVM algorithm classification. As a result of the experiment, when the size of the window
was divided by 5000, the maximum storage space could be reduced by 19.2%, which was more efficient than the
size of other windows. The classification accuracy was the highest at 97.2% when the window size was divided by
5000.
S
TE
TE
NO
NO
The benefits of smart technology and the advantages they bring to transportation within a smart city are
According to the US Department of Transportation, “Intelligent Transportation Systems (ITS) apply a variety of
numerous.
technologies to monitor, evaluate, and manage transportation systems to enhance efficiency and safety.” Putting
K
K
visions of science fiction style transportation aside for the moment, this definition can be simplified into the Smart Transportation is safer: By combining machine learning with IoT and 5G, autonomous
following concepts for what makes up smart transportation: management, efficiency, and safety. In other words, transportation systems (both in vehicles and in stationary infrastructure such as intersections) have
H
H
smart transportation uses new and emerging technologies to make moving around a city more convenient, more proven to reduce the “human factor” in accidents. Computers don’t get distracted or fatigued or
cost effective (for both the city and the individual), and safer. emotional.
ES
ES
Smart Transportation is better managed: Data collection is an important key to responsible public
What emerging technologies are facilitating these new opportunities? Primarily the proliferation of IoT devices management of infrastructure. Smart transportation not only provides detailed data points for every
GN
GN
and 5G communication technology. The former provides for inexpensive sensors and controllers that can be aspect of the transportation system, but allows administrators to better monitor operations, track
imbedded into nearly any physical machine to be controlled and managed remotely. The latter provides the high maintenance needs, and identify key sources of problems that need to be fixed.
speed communications needed for managing and controlling transportation systems in real time with minimal Smart Transportation is more efficient: With better management comes more efficient use. Quality data
VI
VI
latency. can help to pinpoint areas where efficiency can be improved. Maybe a slight adjustment in train
schedules would provide for better fill rates, Or, perhaps bus routes would better serve the community
Smart transportation is not just a theory for the future; it is being implemented today in several cities with their
if stops were allocated differently.
successes and failures being used to improve systems in new locations. Some of the cities that are implementing
Smart Transportation is cost effective: Because smart transportation makes better use of the resources
new transportation technologies may surprise you at first. Of course, global hubs like New York City have
available, it can cut down costs thanks to preventative maintenance, lower energy consumption, and
embraced smart transportation for their ever increasingly intelligent city. However, the rural state of Wyoming is
fewer resources used towards accidents. Cost savings can also be gained by riders when inexpensive
also a leading testbed for connected vehicles. This is because the cowboy state is a major freight corridor —
public transit is efficient enough to compete with private vehicle ownership.
autonomous transportation of goods across the country can drastically improve supply chain efficiency and
Smart Transportation provides rapid insights: City traffic management centers (TMCs) can get rapid
reduce the need for long-haul drivers forced to balance tight timelines with their human need for rest.
visibility and notifications for trouble spots or city-wide issues affecting congestion on city streets, public
safety and emergency response systems, in order to take action or communicate more effectively with
other agencies and emergency responders.
Beyond the better management, safety, and efficiency already discussed, there are several additional benefits However, the attacks themselves are nothing new—only the tools are novel. Banks, power grids, and other critical
that the general public, local governments, and the world at large can enjoy. These are: infrastructure to include transportation have been vulnerable to physical attacks long before computers have
been around. Physical threats such as criminals stealing cars, terrorists using vehicles as weapons (as in the 2016
1. Security Lorry attack in France), and bad actors holding public transportation hostage can all be mitigated when vehicles
2. Environmental Considerations and infrastructure are integrated, networked, and autonomous.
3. Supply Chain Resiliency
As for the risk of cyber attacks, they are much easier to defend against than the physical threats listed above.
Security Proper software updates, encrypted communications through virtual private network (VPN) tunnels and other
multilayered security practices can mitigate the risk of cyber attacks. This means that smart transportation for
intelligent cities can make modern public transport safer overall by reducing the opportunities for both physical
and cyber attacks.
S
TE
TE
Environmental Considerations
NO
NO
K
K
H
H
ES
ES
The history of transportation is inexorably tied to the
GN
GN
environment. From steam vehicles that burned coal and wood to today’s gasoline hungry combustion engines,
transportation takes a toll on the planet’s resources and atmosphere.
VI
VI
While scientific advances are made every day to find alternative sources of energy to power transportation,
another benefit of smart transportation technology is that it allows cities to use their current resources more
responsibly.
Mass transit is better for the environment than private vehicles but is not widely used across the US and other
One major fear among smart city skeptics is its vulnerability to cyber attacks. After all, as the world grows more countries because it is often impractical in some regions. With the efficiency boosts that come from smart
connected, cyber attacks have become nearly commonplace among criminals and even nation states as they transport solutions, however, modern public transport can be made lucrative for more portions of the population.
target critical infrastructure such as Internet connected power grids and banking systems. As urban transportation technology improves in large cities, the proven methods can be replicated and spread to
regions that want the benefits of a smart city.
Global crises such as the Coronavirus pandemic have proven that the world’s
supply chains are vulnerable to disruption. When workers and drivers are ill and traveling from one region to
another becomes a public health hazard, autonomous transportation of goods can become a literal lifesaver.
S
Projects such as Wyoming’s connected vehicle project might be the key to forming an autonomous supply chain
Smart transportation can generally be divided into two broad categories, public infrastructure and the automotive
TE
TE
powered by smart, city-to-city transport and logistics systems to move critical goods such as food and emergency
industry. These two sectors become “smart” when networked sensors are integrated into infrastructure and
supplies without the need to risk human drivers. Minimally, the human supply chain workforce can be augmented
vehicles in an effort to accomplish the goals of remote management and control, safety, and efficiency.
wherever safety and efficiency can be improved using automation, artificial intelligence and robotics. The good
NO
NO
news is that experts believe these innovations will support creation of more jobs — and safer ones — as Picture a busy city intersection. Pedestrians are trying to cross. The streetlights are regulating flow of traffic.
developers, technicians, analyists and administrators help to bring the advancements to market and maintain Drivers in vehicles are busily trying to get to their destination. In traditional transportation systems, the
them. streetlights are triggered either through timers, pressure plates underneath the road, or pedestrian buttons on
K
K
the curb.
Are There Disadvantages of Smart Cities?
For all their benefits, some disadvantages may come to the surface as smart city transportation systems are Both the drivers and the pedestrians are responsible for paying attention to (and following) the traffic signals. If
H
H
implemented. These problems center mainly around power consumption and responsible data management. any of these nodes fail, however, both efficiency and safety drop. A distracted driver runs a red light. A pedestrian
ES
ES
fails to push the crosswalk button, thus missing their turn and having to wait longer. The streetlight refuses to
Smart cities require sensors — a lot of sensors — and those sensors all require power. For sensors attached to change despite the fact that there is only one car waiting and no traffic.
moving objects, this will require batteries. Stationary sensors may be able to use solar power, but more often
GN
GN
than not will need to be wired into the city’s electrical grid. The sheer number of sensors required for the world In a smart intersection, however, this all changes. A vehicle may use a combination of bluetooth and LIDAR (Light
to transition to smart cities (estimated in the trillions) makes powering so many devices a daunting problem. Even Detection and Ranging) to detect pedestrians and can automatically begin breaking to avoid an accident.
for sensors wired into the power grid, the amount of raw material necessary (such as copper) is significantly high Streetlights can pick up the individual signals sent from vehicles to determine how many cars are waiting and in
VI
VI
compared to what the world population is accustomed to producing. which direction far more accurately and efficiently than pressure plates and timers. Cars and streetlights can even
communicate to the level that, when the light turns green (or sends the “go” signal to the car’s computer), the
Beyond power, there is significant debate in the world today regarding personal data online. Data is the lifeblood car automatically begins moving, and when turning red (or sending a “stop” signal), the car slows down and stops.
that smart cities need in order to operate. While much of the information needed is anonymous compared to This is all made possible thanks to the application of technology in transportation such as IoT and 5G
online data, this will require a mental and behavioral shift among populations. Cars will need to collect positional communication speeds for real time actions and remote sensing.
information and sensors around a city will need to passively collect the signals that a smart phone emits
throughout the day. Responsible laws and policies for managing data, no matter how anonymous, will need to be
enacted in order for smart cities to thrive into the future.
Examples of Urban Transportation Technology movement data while receiving information regarding closures and other factors that would necessitate a change
in plan. This keeps trains from chugging forward into a dangerous situation.
Public transport in smart cities is a key area for advancement in connected technologies. In
Detroit, SMART (Suburban Mobility Authority for Rapid Transit Authority) manages and dispatches over 300 buses
across the city. As an integral part of how the population gets around, it is important for these buses to be on
time, safe, and breakdown free. To manage the dispatch and location tracking of buses, the city used an analog
radio network with three radio towers scattered around the city.
When it was time for an upgrade, they utilized the Digi WR44 R mobile cellular router. This switch from analog to
S
digital allowed for significantly better management and tracking. The new technology allowed SMART to not only
TE
TE
Regardless of the advantages and disadvantages of smart cities, the technology is here and being used today. see each vehicle’s location, but also view their speed and monitor maintenance data for each bus. This allowed
Across the US and the world, smart sensors and controllers are being implemented in train networks, passenger for better dispatching if a bus started to run behind schedule as well as preventative maintenance to mitigate
information systems, and public transport dispatch. Here are some smart city transportation examples:
NO
NO
breakdowns and major repairs, saving them an estimated $70,000 per year.
1. Miami Dade smart traffic management Explore Digi’s Smart Transport Solutions
2. Southern Pennsylvania Transportation Authority (SEPTA) Positive Train Control (PTC)
3. Suburban Mobility Authority for Rapid Transit (SMART) Dispatch System
K
K
Miami Dade Advanced Traffic Management System
H
H
The county of Miami Dade is the most populated county in Florida, with a population of over 2.5 million residents.
ES
ES
Managing the flow of traffic across urban area that makes up the city of Miami and its surrounding areas, including
the operation of over 2,700 signalized intersections, is the responsibility of the County of Miami Dade. In fact, the
number of signalized intersections and mid-block crossings, is increasing by dozens every year, according to
GN
GN
their Traffic Management website.
Digi is supporting the rollout of intelligent transportation and connected vehicle systems across the U.S. and the
VI
VI
The Miami Dade Advanced Traffic Management System (ATMS), which includes Digi 4G LTE cellular routers as
part of the communications infrastructure in county-wide traffic cabinets, is designed to reduce congestion and globe, with high-performance, industrial-grade cellular routers - including FirstNet®
delays and improve mobility, county-wide. Ready systems for priority and pre-emptive communications.
SEPTA PTC The smart transportation market is highly promising for society. As intelligent transportation systems for smart
SEPTA (Southeastern Pennsylvania Transportation Authority) manages the light rail, subway, and bus services for cities grow in use around the world, populations can begin to reap the many safety, efficiency, and cost benefits
Philadelphia. With over one million riders daily, these services need to be reliable and safe each and every time a that come with modern public transport. It is exciting to think about how society might interact with their cities
vehicle departs. This is why SEPTA built a positive train control system (PTC) to signal trains, prevent derailments with the latest technologies that are becoming available today.
SEPTA accomplishes this with the Digi WR44-RR mobile access router. When integrated onto a train, this device
allows for remote communications with wayside sensors over a radio link. The device sends signals with train
S
TE
TE
Rigado Retail Case Studies Leveraging AWS IoT
NO
NO
K
K
About Onset
H
H
Onset is a global leader in environmental asset monitoring solutions such as cold-chain and vaccine monitoring
ES
ES
for healthcare supply chains. Onset has been designing and manufacturing its data loggers and monitoring
solutions on site since the company’s founding in 1981.
GN
GN
Our Work Together
Rigado partnered with the Onset team to configure a gateway solution that gathers, processes and sends sensor
VI
VI
data from InTemp vaccine monitors to InTemp Servers via Ethernet or Wi-Fi – where data excursions trigger
Smart Retail Solutions automatic email and SMS notifications. Onset InTemp loggers paired with whitelabel Onset CX gateways arrive to
healthcare sites as simple plug-and-play kits – easily extended as deployment size increases.
Powered by AWS IoT
AWS IoT enables easy, secure connectivity and management of IoT devices. Gather real-time physical and
environmental data, run analytics on the edge, and take action remotely. AWS customers and partners leverage
secure and scalable Rigado device-to-cloud data pipelines to enable IoT applications, including for Retail use cases.
Smart Retail solutions for in-store and warehouse operations can be integrated with existing systems and
applications, and include:
Connected shopper/guest experience
Physical environment monitoring
Asset tracking for inventory management and loss prevention
Rigado gateways installed in Prologis warehouses communicate with Wirepas anchor node end devices to
deliver asset location data to the Prologis Cloud. This has allowed Prologis to offer large-scale secure and
configurable edge networking capabilities as a service to their multi-tenant warehouses.
S
TE
TE
NO
NO
Why Rigado and AWS?
Rigado’s support for AWS Greengrass and tight integration with AWS IoT services for device deployment and data
delivery were key in developing the Prologis solution.
Why Rigado and AWS?
Flexible and Open Device-to-Cloud Wirepas Mesh Networking
Rigado and Onset delivered a real-time cold chain monitoring solution for retail pharmacies to manage vaccine
K
K
Edge Data Processing Capability
storage and guarantee quality of delivery. AWS was instrumental to the solution:
Simple Integration with AWS Greengrass
AWS Cognito provided user management for Onset users
H
H
Data from warehouse mesh-based sensor networks is collected and processed on Cascade gateways using AWS
AWS S3 was used to store the cold chain monitoring data
Greengrass and delivered to AWS IoT services. Rigado worked closely with AWS Professional Services on the
ES
ES
The AWS API Gateway was used to provide access to the monitoring data
project.
Rigado retail experience and AWS cloud expertise were key when partnering with Onset. Together we developed
a solution that integrated with Onset’s existing AWS IoT services and is easily deployed and managed across
GN
GN
thousands of retail locations.
Read the detailed case study ⟶ Smart Waste Management System
VI
VI
⤓ Download the case study PDF Brief presentation of the project (MUST SEE before reading further)
The Internet of Things (IoT) is a concept in which surrounding objects are connected through wired and wireless
networks without user intervention. In the field of IoT, the objects communicate and exchange information to
provide advanced intelligent services for users.
This project deals with the problem of waste management in smart cities, where the garbage collection system
is not optimized. This project enables the organizations to meet their needs of smart garbage management
AboutPrologis
systems. This system allows the user to know the fill level of each garbage bin in a locality or city at all times, to
Prologis provides efficient logistics real estate solutions to the world. Operating in over 700 million sq. ft. of real
give a cost-effective and time-saving route to the truck drivers.
estate globally, Prologis partners with manufacturers and distributors to ensure timely delivery of the products
OBJECTIVES
that make modern life possible.
The key research objectives are as follows:
Our Work Together
• The proposed system would be able to automate the solid waste monitoring process and management of the
overall collection process using IOT (Internet of Things). amount of waste for storing or recycling.
• The Proposed system consists of main subsystems namely Smart Trash System(STS) and Smart Monitoring and • Staff that is responsible for trash bins in the current yards needs communications with waste management
Controlling Hut(SMCH). companies and truck drivers.
• In the proposed system, whenever the waste bin gets filled this is acknowledged by placing the circuit at the • Road police can get reports about inaccurate car parking that leads to the impossibility of waste collection. •
waste bin, which transmits it to the receiver at the desired place in the area or spot. Citizens want to have better service, lower cost and having easily accessible reports on what has been done and
• In the proposed system, the received signal indicates the waste bin status at the monitoring and controlling how much it cost
system.
Design Implementation and DFD
HARDWARE INTERFACE:
Arduino Uno
PRODUCT FEATURES Arduino Uno is a microcontroller board. It has 14 digital input/ output pins (of which 6 can be used as PWM
S
With the web application, the administrator will be able to search for dustbins. The result will be based on the outputs), 6 analogue inputs, a 16 MHz quartz crystal, a USB connection, a power jack, an ICSP header and a
TE
TE
criteria the user inputs. There are several search criteria, and it will be possible for the administrator of the reset button. It contains everything needed to support the microcontroller; simply connect it to a computer
system to manage the options for those criteria that have that. with a USB cable or power it with an AC-to-DC adapter or battery to get started.. You can tinker with your UNO
The result of the search will be viewed either in a list view or in a map view, depending on what criteria are without worrying too much about doing something wrong, in the worst case scenario you can replace the chip
NO
NO
included in the search. The list view will have one list item for each dustbin matching the search criteria and for a few dollars and start over again.
show a small part of the dustbin information, so the user can identify the dustbin. The administrator will be able Ultrasonic Sensor:
to either select a dustbin as a target destination or get information on how to get there or view the information The Ultrasonic Sensor sends out a high-frequency sound pulse and then times how long it takes for the echo of
of a specific dustbin. the sound to reflect back. The sensor has 2 openings on its front. One opening transmits ultrasonic waves, (like a
K
K
The web portal will provide the functionality to manage the system and the dustbin information. It will also tiny speaker), the other receives them, (like a tiny microphone). The speed of sound is approximately 341
provide information about the system, for example, showing when there is a new update. meters (1100 feet) per second in air. The ultrasonic sensor uses this information along with the time difference
H
H
between sending and receiving the sound pulse to determine the distance to an object.
A list of possible stakeholders of the system and a brief description of their needs, business rules, possibilities and
Wi-Fi Module – ESP8266:
ES
ES
connections with others is presented below:
The ESP8266 WiFi Module is a self-contained SOC with an integrated TCP/IP protocol stack that can give any
• City administration needs an understanding of the big picture, generating reports, control over pricing etc.
microcontroller access to your WiFi network. The ESP8266 is capable of either hosting an application or
• District administrations are interested in controlling the process of waste collection, checking the quality of
GN
GN
offloading all Wi-Fi networking functions from another application processor. Each ESP8266 module comes pre-
service (all waste collected, all in time, waste collected cleanly, waste transported to special places), quick and
programmed with an AT command set firmware, meaning, you can simply hook this up to your Arduino device
legal ways for solving disputes and problems.
and get about as much WiFi-ability as a WiFi Shield offers. ? Breadboard: A breadboard is a construction base
VI
VI
• Municipalities can also deploy and maintain smart city infrastructure like capacity sensors in waste bins and
for prototyping of electronics. In the 1970s the solderless breadboard (AKA plugboard, a terminal array board)
wireless networks for data transferring.
became available and nowadays the term “breadboard” is commonly used to refer to these. “Breadboard” is
• Waste trucks owning companies need a platform for organizing and optimization of their business process in
also a synonym for “prototype”. Because the solderless breadboard does not require soldering, it is reusable.
general without serious investments in developing, deploying and supporting their own system. Such a system
This makes it easy to use for creating temporary prototypes and experimenting with circuit design. ? JUMPER
must include effective dynamic routing based on IOT data for the truck fleet. Besides, controlling drivers and
WIRES: A jump wire is an electrical wire or group of them in a cable with a connector or pins at each end (or
tracking the fleet is also an important issue.
sometimes without them – simply “tinned”), which is normally used to interconnect the components of a
• Waste truck drivers need a navigation system for fulfilling their tasks. Another issue is reporting problems and
breadboard or other prototype or test circuit, internally or with other equipment or components, without
passing them to the operators in the office instead of thinking about how to solve the problem, this can
soldering.
sufficiently save the time of a driver and vehicle. Drivers also need evidence that their work was done correctly
and cleanly.
• Managers of dumps and recycling factories can publish their possibilities or needs in acquiring a certain
SOFTWARE INTERFACE: project has been divided into various phases. Starting from the metropolitan cities and moving towards the
Arduino IDE: concept of smart cities, it will also cover small towns and tier III cities in later phases. At present, we are here to
The open-source Arduino Software (IDE) makes it easy to write code and upload it to the board. It runs on display the live working of the model and give an idea about the actual implications. For any society to flourish,
Windows, Mac OS X, and Linux. The environment is written in Java and based on Processing and other open- it is manifestly important that they remain fair and orderly. Deciding how best to ensure this, in light of the huge
source software. This software can be used with any Arduino board. It contains a text editor for writing code, a growth in both the uptake and complexity of technology that has occurred in the last decade, and which can be
message area, a text console, a toolbar with buttons for common functions and a series of menus. expected to continue in the next, this here is one of the products that can be used to contribute to the better
Web Server: management of waste and increase the efficiency of resources.
A Web server is a program that uses Hypertext Transfer Protocol to serve the files that form Web pages to
users, in response to their requests, which are forwarded by their computers’ HTTP clients. Dedicated
computers and appliances may be referred to as Web servers as well.
S
Front end Technologies:
HTML5:
TE
TE
HTML5 is a markup language used for structuring and presenting content on the World Wide Web. It is the
latest and most enhanced version of HTML.
NO
NO
CSS3:
Cascading Style Sheets (CSS) is a style sheet language used for describing the look and formatting of a document
written in a markup language.CSS3 is the latest standard of CSS.
Javascript:
K
K
JavaScript is a full-fledged dynamic programming language that, when applied to an HTML document, can
provide dynamic interactivity on websites.
JQuery:
H
H
JQuery is a cross-platform JavaScript library designed to simplify the client-side scripting of HTML. JQuery is the
ES
ES
most popular JavaScript library in use today.
Back end Technologies:
GN
GN
PHP:
PHP is a server scripting language and a powerful tool for making dynamic and interactive Web pages.
MySql:
VI
VI
MySQL is an open-source relational database management system (RDBMS). It is very fast, reliable, and easy to
use.
Application
The project design is a part of the implication that can be used to improve the waste management of a locality.
All the technical aspects have been thoroughly designed keeping all the constraints in mind. The project
resolves around whether the project will be able to meet the future needs of the users. This project-based on
IoT gives users the freedom of changing hardware as well as software specifications as per the arising need. IoT
based projects are already designed while keeping future demands in mind and in a rising economy like India
where the concept of smart cities is new the demand for our project will keep on increasing. This project here is
a model of the large scale application which spans pan India in different smart cities. The implementation of this
Cloud Computing is the delivery of computing services such as servers, storage, databases, networking, software,
analytics, intelligence, and more, over the Cloud (Internet).
S
TE
TE
NO
NO
The cloud environment provides an easily accessible online portal that makes handy for the user to manage the
compute, storage, network, and application resources. Some cloud service providers are in the following figure.
K
K
H
H
ES
ES
Cloud Computing provides an alternative to the on-premises datacentre. With an on-premises datacentre, we
have to manage everything, such as purchasing and installing hardware, virtualization, installing the operating
GN
GN
system, and any other required applications, setting up the network, configuring the firewall, and setting up
storage for data. After doing all the set-up, we become responsible for maintaining it through its entire lifecycle.
VI
VI
But if we choose Cloud Computing, a cloud vendor is responsible for the hardware purchase and maintenance.
They also provide a wide variety of software and platform as a service. We can take any required services on rent.
The cloud computing services will be charged based on usage.
o Cost: It reduces the huge capital costs of buying hardware and software.
o Scalability: We can increase or decrease the requirement of resources according to the business
requirements.
o Productivity: While using cloud computing, we put less operational effort. We do not need to apply Types of Cloud Services
patching, as well as no need to maintain hardware and software. So, in this way, the IT team can be more
productive and focus on achieving business goals.
o Reliability: Backup and recovery of data are less expensive and very fast for business continuity.
o Security: Many cloud vendors offer a broad set of policies, technologies, and controls that strengthen
our data security.
S
1. Infrastructure as a Service (IaaS): In IaaS, we can rent IT infrastructures like servers and virtual machines
TE
TE
(VMs), storage, networks, operating systems from a cloud service vendor. We can create VM running
Windows or Linux and install anything we want on it. Using IaaS, we don’t need to care about the
hardware or virtualization software, but other than that, we do have to manage everything else. Using
NO
NO
IaaS, we get maximum flexibility, but still, we need to put more effort into maintenance.
2. Platform as a Service (PaaS): This service provides an on-demand environment for developing, testing,
delivering, and managing software applications. The developer is responsible for the application, and the
K
K
PaaS vendor provides the ability to deploy and run it. Using PaaS, the flexibility gets reduce, but the
management of the environment is taken care of by the cloud vendors.
3. Software as a Service (SaaS): It provides a centrally hosted and managed software services to the end-
H
H
users. It delivers software over the internet, on-demand, and typically on a subscription basis. E.g.,
ES
ES
Microsoft One Drive, Dropbox, WordPress, Office 365, and Amazon Kindle. SaaS is used to minimize the
operational cost to the maximum extent.
GN
GN
o Public Cloud: The cloud resources that are owned and operated by a third-party cloud service provider
are termed as public clouds. It delivers computing resources such as servers, software, and storage over
VI
VI
the internet
o Private Cloud: The cloud computing resources that are exclusively used inside a single business or
organization are termed as a private cloud. A private cloud may physically be located on the company’s
on-site datacentre or hosted by a third-party service provider.
o Hybrid Cloud: It is the combination of public and private clouds, which is bounded together by technology
that allows data applications to be shared between them. Hybrid cloud provides flexibility and more
deployment options to the business.
Example: DigitalOcean, Linode, Amazon Web Services (AWS), Microsoft Azure, Google Compute Engine (GCE),
1. Infrastructure as a Service (IaaS)
Rackspace, and Cisco Metacloud.
2. Platform as a Service (PaaS)
PaaS cloud computing platform is created for the programmer to develop, test, run, and manage the applications.
Characteristics of PaaS
S
There are the following characteristics of PaaS -
TE
TE
o Accessible to various users via the same development application.
NO
NO
o Integrates with web services and databases.
o Builds on virtualization technology, so resources can easily be scaled up or down as per the organization's
need.
K
o Provides an ability to "Auto-scale".
H
H
Example: AWS Elastic Beanstalk, Windows Azure, Heroku, Force.com, Google App Engine, Apache Stratos,
Magento Commerce Cloud, and OpenShift.
ES
ES
Software as a Service (SaaS)
GN
GN
Infrastructure as a Service (IaaS) SaaS is also known as "on-demand software". It is a software in which the applications are hosted by a cloud
VI
VI
service provider. Users can access these applications with the help of internet connection and web browser.
IaaS is also known as Hardware as a Service (HaaS). It is a computing infrastructure managed over the internet.
The main advantage of using IaaS is that it helps users to avoid the cost and complexity of purchasing and Characteristics of SaaS
managing the physical servers.
There are the following characteristics of SaaS -
Characteristics of IaaS
o Managed from a central location
There are the following characteristics of IaaS - o Hosted on a remote server
Example: BigCommerce, Google Apps, Salesforce, Dropbox, ZenDesk, Cisco WebEx, ZenDesk, Slack, and IaaS cloud computing platform layer eliminates the need for every organization to maintain the IT infrastructure.
GoToMeeting.
IaaS is offered in three models: public, private, and hybrid cloud. The private cloud implies that the infrastructure
resides at the customer-premise. In the case of public cloud, it is located at the cloud computing platform vendor's
data center, and the hybrid cloud is a combination of the two in which the customer selects the best of both
Difference between IaaS, PaaS, and SaaS
public cloud or private cloud.
The below table shows the difference between IaaS, PaaS, and SaaS -
IaaS provider provides the following services -
IaaS Paas SaaS 1. Compute: Computing as a Service includes virtual central processing units and virtual main memory for
the Vms that is provisioned to the end- users.
S
It provides a virtual data center to It provides virtual platforms and It provides web software and 2. Storage: IaaS provider provides back-end storage for storing files.
TE
TE
store information and create tools to create, test, and deploy apps to complete business 3. Network: Network as a Service (NaaS) provides networking components such as routers, switches, and
platforms for app development, apps. tasks. bridges for the Vms.
testing, and deployment. 4. Load balancers: It provides load balancing capability at the infrastructure layer.
NO
NO
It provides access to resources such It provides runtime environments It provides software as a service
as virtual machines, virtual storage, and deployment tools for to the end-users.
K
K
etc. applications.
H
ES
ES
IaaS provides only Infrastructure. PaaS provides SaaS provides
Infrastructure+Platform. Infrastructure+Platform
+Software.
GN
GN
VI
VI
Infrastructure as a Service | IaaS
Advantages of IaaS cloud computing layer
Iaas is also known as Hardware as a Service (HaaS). It is one of the layers of the cloud computing platform. It allows
customers to outsource their IT infrastructures such as servers, networking, processing, storage, virtual machines, There are the following advantages of IaaS computing layer -
and other resources. Customers access these resources on the Internet using a pay-as-per use model.
1. Shared infrastructure
In traditional hosting services, IT infrastructure was rented out for a specific period of time, with pre-determined
hardware configuration. The client paid for the configuration and time, regardless of the actual use. With the help IaaS allows multiple users to share the same physical infrastructure.
of the IaaS cloud computing platform layer, clients can dynamically scale the configuration to meet changing
2. Web access to the resources
requirements and are billed only for the services actually used.
Iaas allows IT users to access resources over the internet. Breakdowns at the IaaS cloud computing platform vendor's can bring your business to the halt stage. Assess the
IaaS cloud computing platform vendor's stability and finances. Make sure that SLAs (i.e., Service Level Agreement)
3. Pay-as-per-use model provide backups for data, hardware, network, and application failures. Image portability and third-party support
is a plus point.
IaaS providers provide services based on the pay-as-per-use basis. The users are required to pay for what they
have used. The IaaS cloud computing platform vendor can get access to your sensitive data. So, engage with credible
companies or organizations. Study their security policies and precautions.
4. Focus on the core business
Top Iaas Providers who are providing IaaS cloud computing platform
IaaS providers focus on the organization's core business rather than on IT infrastructure.
5. On-demand scalability
S
TE
TE
On-demand scalability is one of the biggest advantages of IaaS. Using IaaS, users do not worry about to upgrade
software and troubleshoot the issues related to hardware components.
NO
NO
Disadvantages of IaaS cloud computing layer
1. Security
K
K
Security is one of the biggest issues in IaaS. Most of the IaaS providers are not able to provide 100% security.
H
Although IaaS service providers maintain the software, but they do not upgrade the software for some
ES
ES
organizations.
GN
GN
3. Interoperability issues
VI
vendor lock-in.
Amazon Web Elastic, Elastic Compute Cloud The cloud computing platform pioneer, Amazon offers
Some important point about IaaS cloud computing layer Services (EC2) MapReduce, Route 53, auto scaling, cloud monitoring, and load balancing
Virtual Private Cloud, etc. features as part of its portfolio.
IaaS cloud computing platform cannot replace the traditional hosting method, but it provides more than that, and
each resource which are used are predictable as per the usage.
Netmagic Netmagic IaaS Cloud Netmagic runs from data centers in Mumbai, Chennai,
IaaS cloud computing platform may not eliminate the need for an in-house IT department. It will be needed to Solutions and Bangalore, and a virtual data center in the United
monitor or control the IaaS setup. IT salary expenditure might not reduce significantly, but other IT expenses can States. Plans are underway to extend services to West
be reduced. Asia.
Rackspace Cloud servers, cloud files, The cloud computing platform vendor focuses
cloud sites, etc. primarily on enterprise-level hosting services.
Reliance Reliance Internet Data Center RIDC supports both traditional hosting and cloud
Communications services, with data centers in Mumbai, Bangalore,
Hyderabad, and Chennai. The cloud services offered by
RIDC include IaaS and SaaS.
Sify Technologies Sify IaaS Sify's cloud computing platform is powered by HP's
converged infrastructure. The vendor offers all three
S
types of cloud services: IaaS, PaaS, and SaaS.
TE
TE
Tata InstaCompute InstaCompute is Tata Communications' IaaS offering.
Communications InstaCompute data centers are located in Hyderabad
NO
NO
1. Programming languages
and Singapore, with operations in both countries.
PaaS providers provide various programming languages for the developers to develop the applications. Some
popular programming languages provided by PaaS providers are Java, PHP, Ruby, Perl, and Go.
K
K
Platform as a Service | PaaS 2. Application frameworks
H
H
Platform as a Service (PaaS) provides a runtime environment. It allows programmers to easily create, test, run, PaaS providers provide application frameworks to easily understand the application development. Some popular
application frameworks provided by PaaS providers are Node.js, Drupal, Joomla, WordPress, Spring, Play, Rack,
ES
ES
and deploy web applications. You can purchase these applications from a cloud service provider on a pay-as-per
use basis and access them using the Internet connection. In PaaS, back end scalability is managed by the cloud and Zend.
service provider, so end- users do not need to worry about managing the infrastructure.
GN
GN
3. Databases
PaaS includes infrastructure (servers, storage, and networking) and platform (middleware, development tools,
PaaS providers provide various databases such as ClearDB, PostgreSQL, MongoDB, and Redis to communicate
database management systems, business intelligence, and more) to support the web application life cycle.
VI
VI
with the applications.
PaaS providers provide the Programming languages, Application frameworks, Databases, and Other tools:
PaaS providers provide various other tools that are required to develop, test, and deploy the applications.
Advantages of PaaS
1) Simplified Development
PaaS allows developers to focus on development and innovation without worrying about infrastructure Popular PaaS Providers
management.
2) Lower risk
No need for up-front investment in hardware and software. Developers only need a PC and an internet connection
to start building applications.
Some PaaS vendors also provide already defined business functionality so that users can avoid building everything
S
from very scratch and hence can directly start the projects only.
TE
TE
4) Instant community
PaaS vendors frequently provide online communities where the developer can get the ideas to share experiences
NO
NO
and seek advice from others.
5) Scalability
K
K
Applications deployed can scale from one to thousands of users without any changes to the applications. The below table shows some popular PaaS providers and services that are provided by them -
H
Providers Services
ES
ES
1) Vendor lock-in
Google App Engine (GAE) App Identity, URL Fetch, Cloud storage client library, Logservice
One has to write the applications according to the platform provided by the PaaS vendor, so the migration of an
GN
GN
application to another PaaS vendor would be a problem.
Salesforce.com Faster implementation, Rapid scalability, CRM Services, Sales cloud, Mobile
connectivity, Chatter.
2) Data Privacy
VI
VI
Corporate data, whether it can be critical or not, will be private, so if it is not located within the walls of the Windows Azure Compute, security, IoT, Data Storage.
company, there can be a risk in terms of privacy of data.
AppFog Justcloud.com, SkyDrive, GoogleDocs
3) Integration with the rest of the systems applications
SaaS is also known as "On-Demand Software". It is a software distribution model in which services are hosted by
SaaS pricing is based on a monthly fee or annual fee subscription, so it allows organizations to access business
a cloud service provider. These services are available to end-users over the internet so, the end-users do not need
functionality at a low cost, which is less than licensed applications.
to install any software on their devices to access these services.
Unlike traditional software, which is sold as a licensed based with an up-front cost (and often an optional ongoing
There are the following services provided by SaaS providers -
support fee), SaaS providers are generally pricing the applications using a subscription fee, most commonly a
Business Services - SaaS Provider provides various business services to start-up the business. The SaaS business monthly or annually fee.
services include ERP (Enterprise Resource Planning), CRM (Customer Relationship Management), billing,
S
2. One to Many
and sales.
TE
TE
SaaS services are offered as a one-to-many model means a single instance of the application is shared by multiple
Document Management - SaaS document management is a software application offered by a third party (SaaS
users.
providers) to create, manage, and track electronic documents.
NO
NO
3. Less hardware required for SaaS
Example: Slack, Samepage, Box, and Zoho Forms.
The software is hosted remotely, so organizations do not need to invest in additional hardware.
Social Networks - As we all know, social networking sites are used by the general public, so social networking
K
K
service providers use SaaS for their convenience and handle the general public's information.
4. Low maintenance required for SaaS
Mail Services - To handle the unpredictable number of users and load on e-mail services, many e-mail providers
Software as a service removes the need for installation, set-up, and daily maintenance for the organizations. The
H
H
offering their services using SaaS.
initial set-up cost for SaaS is typically less than the enterprise software. SaaS vendors are pricing their applications
ES
ES
based on some usage parameters, such as a number of users using the application. So SaaS does easy to monitor
and automatic updates.
GN
GN
5. No special software or hardware versions required
All users will have the same version of the software and typically access it through the web browser. SaaS reduces
VI
VI
IT support costs by outsourcing hardware and software maintenance and support to the IaaS provider.
6. Multidevice support
SaaS services can be accessed from any device such as desktops, laptops, tablets, phones, and thin clients.
7. API Integration
SaaS services easily integrate with other software or services through standard APIs.
8. No client-side installation
SaaS services are accessed directly from the service provider using the internet connection, so do not need to
Provider Services
require any software installation.
1) Security
Microsoft Office Online office suite
365
Actually, data is stored in the cloud, so security may be an issue for some users. However, cloud computing is not
more secure than in-house deployment.
Google Apps Gmail, Google Calendar, Docs, and sites
2) Latency issue
S
NetSuite ERP, accounting, order management, CRM, Professionals Services Automation (PSA),
Since data and applications are stored in the cloud at a variable distance from the end-user, there is a possibility
and e-commerce applications.
TE
TE
that there may be greater latency when interacting with the application compared to local deployment.
Therefore, the SaaS model is not suitable for applications whose demand response time is in milliseconds.
GoToMeeting Online meeting and video-conferencing software
NO
NO
3) Total Dependency on Internet
Constant Contact E-mail marketing, online survey, and event marketing
Without an internet connection, most SaaS applications are not usable.
K
K
Oracle CRM CRM applications
4) Switching between SaaS vendors is difficult
Switching SaaS vendors involves the difficult and slow task of transferring the very large data files over the internet Workday, Inc Human capital management, payroll, and financial management.
H
H
and then converting and importing them into another SaaS also.
ES
ES
Popular SaaS Providers
Cloud Deployment Models
GN
GN
Difficulty Level : Easy
Last Updated : 29 Nov, 2022
VI
VI
Read
Discuss
Courses
Practice
Video
In cloud computing, we have access to a shared pool of computer resources (servers, storage, programs, and so
on) in the cloud. You simply need to request additional resources when you require them. Getting resources up
and running quickly is a breeze thanks to the clouds. It is possible to release resources that are no longer
The below table shows some popular SaaS providers and services that are provided by them -
necessary. This method allows you to just pay for what you use. Your cloud provider is in charge of all upkeep. It
functions as a virtual computing environment with a deployment architecture that varies depending on the Low customization: It is accessed by many public so it can’t be customized according to personal
amount of data you want to store and who has access to the infrastructure. requirements.
Private Cloud
Deployment Models
The private cloud deployment model is the exact opposite of the public cloud deployment model. It’s a one-on-
The cloud deployment model identifies the specific type of cloud environment based on ownership, scale, and
one environment for a single user (customer). There is no need to share your hardware with anyone else. The
access, as well as the cloud’s nature and purpose. The location of the servers you’re utilizing and who controls
distinction between private and public clouds is in how you handle all of the hardware. It is also called the
them are defined by a cloud deployment model. It specifies how your cloud infrastructure will look, what you
“internal cloud” & it refers to the ability to access systems and services within a given border or organization.
can change, and whether you will be given services or will have to create everything yourself. Relationships
The cloud platform is implemented in a cloud-based secure environment that is protected by powerful firewalls
between the infrastructure and your users are also defined by cloud deployment types.
and under the supervision of an organization’s IT department. The private cloud gives greater flexibility of
Different types of cloud computing deployment models are: control over cloud resources.
S
1. Public cloud Advantages of Private Cloud Model:
2. Private cloud
TE
TE
Better Control: You are the sole owner of the property. You gain complete command over service
3. Hybrid cloud integration, IT operations, policies, and user behavior.
4. Community cloud
Data Security and Privacy: It’s suitable for storing corporate information to which only authorized
NO
NO
5. Multi-cloud staff have access. By segmenting resources within the same infrastructure, improved access and
Let us discuss them one by one: security can be achieved.
Public Cloud Supports Legacy Systems: This approach is designed to work with legacy systems that are unable to
access the public cloud.
K
K
The public cloud makes it possible for anybody to access systems and services. The public cloud may be less
secure as it is open to everyone. The public cloud is one in which cloud infrastructure services are provided over Customization: Unlike a public cloud deployment, a private cloud allows a company to tailor its
the internet to the general people or major industry groups. The infrastructure in this cloud model is owned by solution to meet its specific needs.
H
H
the entity that delivers the cloud services, not by the consumer. It is a type of cloud hosting that allows Disadvantages of Private Cloud Model:
ES
ES
customers and users to easily access systems and services. This form of cloud computing is an excellent example Less scalable: Private clouds are scaled within a certain range as there is less number of clients.
of cloud hosting, in which service providers supply services to a variety of customers. In this arrangement, Costly: Private clouds are more costly as they provide personalized facilities.
storage backup and retrieval services are given for free, as a subscription, or on a per-user basis. Example: Hybrid Cloud
GN
GN
Google App Engine etc. By bridging the public and private worlds with a layer of proprietary software, hybrid cloud computing gives the
best of both worlds. With a hybrid solution, you may host the app in a safe environment while taking advantage
Advantages of Public Cloud Model:
of the public cloud’s cost savings. Organizations can move data and applications between different clouds using
VI
VI
Minimal Investment: Because it is a pay-per-use service, there is no substantial upfront fee, making
a combination of two or more cloud deployment methods, depending on their needs.
it excellent for enterprises that require immediate access to resources.
No setup cost: The entire infrastructure is fully subsidized by the cloud service providers, thus Advantages of Hybrid Cloud Model:
there is no need to set up any hardware. Flexibility and control: Businesses with more flexibility can design personalized solutions that meet
Infrastructure Management is not required: Using the public cloud does not necessitate their particular needs.
infrastructure management. Cost: Because public clouds provide scalability, you’ll only be responsible for paying for the extra
No maintenance: The maintenance work is done by the service provider (Not users). capacity if you require it.
Dynamic Scalability: To fulfill your company’s needs, on-demand resources are accessible. Security: Because data is properly separated, the chances of data theft by attackers are
Disadvantages of Public Cloud Model: considerably reduced.
Less secure: Public cloud is less secure as resources are public so there is no guarantee of high- Disadvantages of Hybrid Cloud Model:
level security.
Difficult to manage: Hybrid clouds are difficult to manage as it is a combination of both public and Complex: The combination of many clouds makes the system complex and bottlenecks may occur.
private cloud. So, it is complex. Security issue: Due to the complex structure, there may be loopholes to which a hacker can take
Slow data transmission: Data transmission in the hybrid cloud takes place through the public cloud advantage hence, makes the data insecure.
so latency occurs. Sample Questions
Community Cloud Question 1: List the disadvantages of the public cloud model.
It allows systems and services to be accessible by a group of organizations. It is a distributed system that is Answer:
created by integrating the services of different clouds to address the specific needs of a community, industry, or The disadvantages of the public cloud model are:
business. The infrastructure of the community could be shared between the organization which has shared
Data Security and Privacy Concerns: Because it is open to the public, it does not provide complete
concerns or tasks. It is generally managed by a third party or by the combination of one or more organizations in
protection against cyber-attacks and may expose weaknesses.
the community.
Issues with Reliability: Because the same server network is accessible to a wide range of users, it is
S
Advantages of Community Cloud Model: susceptible to failure and outages.
TE
TE
Cost Effective: It is cost-effective because the cloud is shared by multiple organizations or Limitation on Service/License: While there are numerous resources that you may share with
communities. renters, there is a limit on how much you can use.
Security: Community cloud provides better security. Question 2: List the disadvantages of the hybrid cloud model.
NO
NO
Shared resources: It allows you to share resources, infrastructure, etc. with multiple organizations. Answer:
Collaboration and data sharing: It is suitable for both collaboration and data sharing. The disadvantages of the hybrid cloud model are:
Disadvantages of Community Cloud Model:
Maintenance: A hybrid cloud computing strategy may necessitate additional maintenance,
K
K
Limited Scalability: Community cloud is relatively less scalable as many organizations share the
resulting in a greater operational expense for your company.
same resources according to their collaborative interests.
Difficult Integration: When constructing a hybrid cloud, data and application integration might be
Rigid in customization: As the data and resources are shared among different organizations
difficult. It’s also true that combining two or more infrastructures will offset a significant upfront
H
H
according to their mutual interests if an organization wants some changes according to their needs
cost.
ES
ES
they cannot do so because it will have an impact on other organizations.
Question 3: List the disadvantages of the private cloud model.
Multi-cloud
Answer:
We’re talking about employing multiple cloud providers at the same time under this paradigm, as the name
GN
GN
The disadvantages of the private cloud model are :
implies. It’s similar to the hybrid cloud deployment approach, which combines public and private cloud
resources. Instead of merging private and public clouds, multi-cloud uses many public clouds. Although public Restricted Scalability: Private clouds have restricted scalability because they are scaled within the
cloud providers provide numerous tools to improve the reliability of their services, mishaps still occur. It’s quite confines of internal hosted resources.The choice of underlying hardware has an impact on
VI
VI
rare that two distinct clouds would have an incident at the same moment. As a result, multi-cloud deployment scalability.
improves the high availability of your services even more. Higher Cost: Due to the benefits you would receive, your investment will be higher than the public
cloud(pay for software, hardware, and staffing etc).
Advantages of a Multi-Cloud Model:
Question 4: Write the examples of the following:
You can mix and match the best features of each cloud provider’s services to suit the demands of
(a) Government-provided cloud computing platform
your apps, workloads, and business by choosing different cloud providers.
(b) Large-scale private cloud service providers and the services they provide
Reduced Latency: To reduce latency and improve user experience, you can choose cloud regions
Answer:
and zones that are close to your clients.
(a) The ‘GI Cloud,’ also known as ‘MeghRaj’ (https://cloud.gov.in).
High availability of service: It’s quite rare that two distinct clouds would have an incident at the
same moment. So, the multi-cloud deployment improves the high availability of your services. (b) Google Drive, Amazon Web Services (AWS), Microsoft Azure, media fire, and other cloud-based services.
Answer:
Utility computing is a service-providing paradigm in which a service provider makes computer resources and
infrastructure management available to customers as needed, charging them on a per-use basis rather than a
set fee.
The user can only pay for what they use using utility computing.It is a plug-in that is administered by an
organization that determines what kind of cloud services must be deployed. The majority of businesses prefer a
hybrid strategy.
S
with the data you’re transferring isn’t leaking.
TE
TE
Virtualization
Virtualization in Cloud Computing and Types
NO
NO
Host Machine: The machine on which the virtual machine is going to be built is known as Host
Virtualization is a technique how to separate a service from the underlying physical delivery of that service. It is Machine.
the process of creating a virtual version of something like computer hardware. It was initially developed during Guest Machine: The virtual machine is referred to as a Guest Machine.
the mainframe era. It involves using specialized software to create a virtual or software-created version of a Work of Virtualization in Cloud Computing
K
K
computing resource rather than the actual version of the same resource. With the help of Virtualization, multiple Virtualization has a prominent impact on Cloud Computing. In the case of cloud computing, users store data in
operating systems and applications can run on the same machine and its same hardware at the same time, the cloud, but with the help of Virtualization, users have the extra benefit of sharing the infrastructure. Cloud
increasing the utilization and flexibility of hardware. Vendors take care of the required physical resources, but these cloud providers charge a huge amount for these
H
H
In other words, one of the main cost-effective, hardware-reducing, and energy-saving techniques used by cloud services which impacts every user or organization. Virtualization helps Users or Organisations in maintaining those
ES
ES
providers is Virtualization. Virtualization allows sharing of a single physical instance of a resource or an application services which are required by a company through external (third-party) people, which helps in reducing costs to
among multiple customers and organizations at one time. It does this by assigning a logical name to physical the company. This is the way through which Virtualization works in Cloud Computing.
GN
GN
storage and providing a pointer to that physical resource on demand. The term virtualization is often synonymous
Benefits of Virtualization
with hardware virtualization, which plays a fundamental role in efficiently delivering Infrastructure-as-a-Service
More flexible and efficient allocation of resources.
(IaaS) solutions for cloud computing. Moreover, virtualization technologies provide a virtual environment for not
VI
VI
Enhance development productivity.
only executing applications but also for storage, memory, and networking.
It lowers the cost of IT infrastructure.
Remote access and rapid scalability.
High availability and disaster recovery.
Pay peruse of the IT infrastructure on demand.
Enables running multiple operating systems.
Drawback of Virtualization
High Initial Investment: Clouds have a very high initial investment, but it is also true that it will help
in reducing the cost of companies.
Learning New Infrastructure: As the companies shifted from Servers to Cloud, it requires highly versions of the same software. Technologies that use application virtualization are hosted applications and
skilled staff who have skills to work with the cloud easily, and for this, you have to hire new staff or packaged applications.
provide training to current staff. 2. Network Virtualization: The ability to run multiple virtual networks with each having a separate control and data
Risk of Data: Hosting data on third-party resources can lead to putting the data at risk, it has the plan. It co-exists together on top of one physical network. It can be managed by individual parties that are
chance of getting attacked by any hacker or cracker very easily. potentially confidential to each other. Network virtualization provides a facility to create and provision virtual
For more benefits and drawbacks, you can refer to the Pros and Cons of Virtualization. networks, logical switches, routers, firewalls, load balancers, Virtual Private Networks (VPN), and workload
Characteristics of Virtualization security within days or even weeks.
Increased Security: The ability to control the execution of a guest program in a completely
transparent manner opens new possibilities for delivering a secure, controlled execution
environment. All the operations of the guest programs are generally performed against the virtual
S
machine, which then translates and applies them to the host programs.
Managed Execution: In particular, sharing, aggregation, emulation, and isolation are the most
TE
TE
relevant features.
Sharing: Virtualization allows the creation of a separate computing environment within the same
NO
NO
host.
Aggregation: It is possible to share physical resources among several guests, but virtualization also
allows aggregation, which is the opposite process.
For more characteristics, you can refer to Characteristics of Virtualization.
K
K
Types of Virtualization
1. Application Virtualization
Network Virtualization
H
H
2. Network Virtualization
3. Desktop Virtualization: Desktop virtualization allows the users’ OS to be remotely stored on a server in the data
3. Desktop Virtualization
ES
ES
center. It allows the user to access their desktop virtually, from any location by a different machine. Users who
4. Storage Virtualization
5. Server Virtualization want specific operating systems other than Windows Server will need to have a virtual desktop. The main benefits
of desktop virtualization are user mobility, portability, and easy management of software installation, updates,
GN
GN
6. Data virtualization
and patches.
4. Storage Virtualization: Storage virtualization is an array of servers that are managed by a virtual storage system.
VI
VI
The servers aren’t aware of exactly where their data is stored and instead function more like worker bees in a
hive. It makes managing storage from multiple sources be managed and utilized as a single repository. storage
virtualization software maintains smooth operations, consistent performance, and a continuous suite of advanced
functions despite changes, breaks down, and differences in the underlying equipment.
5. Server Virtualization: This is a kind of virtualization in which the masking of server resources takes place. Here,
the central server (physical server) is divided into multiple different virtual servers by changing the identity
number, and processors. So, each system can operate its operating systems in an isolated manner. Where each
Types of Virtualization sub-server knows the identity of the central server. It causes an increase in performance and reduces the
operating cost by the deployment of main server resources into a sub-server resource. It’s beneficial in virtual
1. Application Virtualization: Application virtualization helps a user to have remote access to an application from
migration, reducing energy consumption, reducing infrastructural costs, etc.
a server. The server stores all personal information and other characteristics of the application but can still run
on a local workstation through the internet. An example of this would be a user who needs to run two different
S
TE
TE
Server Virtualization
6. Data Virtualization: This is the kind of virtualization in which the data is collected from various sources and
NO
NO
managed at a single place without knowing more about the technical information like how data is collected, stored
& formatted then arranged that data logically so that its virtual view can be accessed by its interested people and
stakeholders, and users through the various cloud services remotely. Many big giant companies are providing
K
K
their services like Oracle, IBM, At scale, Cdata, etc.
Uses of Virtualization
Cloud computing is one of the trends which is going in IT industry these days. The traditional way of building IT
Data-integration environment is now shifting towards the cloud computing. This is the reason number of cloud service provider is
H
H
increasing day by day and it becomes a tough task to select good one among-st them. So, In this article I am going
Business-integration to tell you about the top 10 cloud platforms for cloud services.
ES
ES
Service-oriented architecture data-services
But, before that let’s have a quick overview on Cloud platforms?
Searching organizational data
Cloud platforms are platforms that allow developers to write applications that runs in the cloud and allows users
to access data, services and applications, storage over the internet and allow them to work from anywhere on it.
GN
GN
Cloud Platforms If we look on to the benefits of cloud platforms than these are the following benefits
1. Reducing Costs – Cloud platforms eliminating the needs of own hardware, software, licenses, servers and other
VI
VI
infrastructures which you needs to build IT working environment which ultimately reduce your costs.
2. Productivity – As you don’t need your hardware, software and on-premises servers which means you don’t
need to hire experts to maintain them which helps you in both ways first on cost savings and second the
professionals can focus on other things.
3. Availability – Cloud platforms allows you to access from anywhere, on any device 24/7
4. Scalability – The best thing about cloud platforms is that you don’t need to worry about high traffic or sudden
growth on traffic because cloud platforms automatically provide as many servers as required in such situations.
5. Affordability – As we mentioned above about scalability of cloud platforms where service providers allow
server as per situations but it’s not cost you much because it;s not compelling you to pay for unnecessary usage
of servers by automatically reduces the numbers of servers when traffic go down. You need to pay only for that
sort of time when service provider allocates extra servers.
6. Migration – Cloud platforms also allow users to migrate completely from one service provider to another
without losing your data.
Now, let’s check on to the service models of cloud platforms Deploy servers
DNS management
There are three models of cloud platforms
2. Microsoft Azure Cloud
1. SaaS – Software as a service (Saas) applications runs completely in the cloud. It enables delivery of applications
over the cloud, it means you don’t need to buy, install and maintain own software. Software is managed from a
central location and Just pay for what you used.
2. PaaS – Platform as a service (PaaS) This kind of cloud platforms provides you set of tools and services
designed to make coding and deploying those applications quick and efficient. Means to say you can develop,
runs and manage applications on the cloud.
3. IaaS – Infrastructure as a Service (IaaS) It is a kind of service where you get access to virtualized computer
resources over the internet. You can get complete infrastructure solutions like hardware, software, servers, storage
and other things from third party.
S
Now, lets move on to the next section.
TE
TE
Here is the list of top 10 cloud platforms.
NO
NO
Service Model – PaaS
K
Auto Scaling
Block Storage
Cloud Storage
H
H
Content Delivery Network
ES
ES
Deploy Servers
Disaster Recovery
GN
GN
VPN Access
DNS Management
Database as a Service
VI
VI
3. Google
Auto Scaling
Block Storage
Cloud Storage
Content Delivery Network (CDN)
Database as a Service
Deploy Servers
DNS Management
5. VMware
S
Service Model – IaaS
TE
TE
Deployment Model – Public Cloud
Server operating system – Linux & windows
NO
NO
Cloud Storage
Docker Support
Load Balancing
K
K
Firewalls
Snapshots
API (Application Programming Interface) Service Model – IaaS
H
H
Web Based Application/Control Panel Deployment Model – Hybrid Cloud
ES
ES
Server operating system – Linux & windows
4. Rackspace
Auto Scaling
GN
GN
Cloud Storage
Load Balancing
System Monitoring
VI
VI
Web Based Application/Control Panel
API (Application Programming Interface)
6. Salesforce
Database as a Service
Object Storage
8. IBM
S
Service Model – PaaS
TE
TE
Deployment Model – Public Cloud
Server operating system – Linux & windows
NO
NO
Auto Scaling
File Storage Service Model – IaaS
Firewalls Deployment Model – Hybrid Cloud and Private Cloud
K
K
Flexible Storage Services Server operating system – Linux & windows
System Monitoring Web Based Application/Control Panel
API (Application Programming Interface)
H
H
7. Oracle
Messaging Services
ES
ES
9. Red Hat
GN
GN
VI
VI
Service Model – PaaS
Deployment Model – Private Cloud and Public Cloud
Server operating system – windows Service Model – PaaS
Block Storage Deployment Model – Hybrid cloud and Private Cloud
Cloud Storage Server operating system – windows
Auto Scaling AWS tutorial provides basic and advanced concepts. Our AWS tutorial is designed for beginners and professionals.
Horizontal Scaling
AWS stands for Amazon Web Services which uses distributed IT infrastructure to provide different IT resources
Snapshots
on demand.
Vertical Scaling
API (Application Programming Interface) Our AWS tutorial includes all the topics such as introduction, history of aws, global infrastructure, features of aws,
Command Line IAM, Storage services, Database services, etc.
Graphical User Interface
What is AWS?
S
resources available on demand. It provides different services such as infrastructure as a service (IaaS),
TE
TE
platform as a service (PaaS) and packaged software as a service (SaaS).
o Amazon launched AWS, a cloud computing platform to allow the different organizations to take
NO
NO
advantage of reliable IT infrastructure.
Uses of AWS
o A small manufacturing organization uses their expertise to expand their business by leaving their IT
K
K
management to the AWS.
o A large enterprise spread across the globe can utilize the AWS to deliver the training to the distributed
H
Deployment Model – Public Cloud o An architecture consulting company can use AWS to get the high-compute rendering of construction
ES
ES
Server operating system – Linux & windows prototype.
Auto Scaling o A media company can use the AWS to provide different types of content such as ebox or audio files to
GN
GN
Horizontal Scaling the worldwide files.
VI
Based on the concept of Pay-As-You-Go, AWS provides the services to the customers.
Amazon AWS
AWS provides services to customers when required without any prior commitment or upfront investment. Pay-
As-You-Go enables the customers to procure services from AWS.
AWS Tutorial
o Computing
o Programming models
o Database storage
o Networking
4) Security
o AWS has a virtual infrastructure that offers optimum availability while managing full privacy and isolation
of their operations.
o Customers can expect high-level of physical security because of Amazon's several years of experience in
designing, developing and maintaining large-scale IT operation centers.
o AWS ensures the three aspects of security, i.e., Confidentiality, integrity, and availability of user's data.
S
Microsoft Azure Tutorial
TE
TE
NO
NO
Advantages of AWS
K
K
1) Flexibility
H
H
o We can get more time for core business tasks due to the instant availability of new features and services Microsoft Azure is a cloud computing platform that provides a wide variety of services that we can use without
ES
ES
in AWS. purchasing and arranging our hardware. It enables the fast development of solutions and provides the resources
o It provides effortless hosting of legacy applications. AWS does not require learning new technologies and to complete tasks that may not be achievable in an on-premises environment. Azure Services like compute,
storage, network, and application services allow us to put our effort into building great solutions without worrying
GN
GN
migration of applications to the AWS provides the advanced computing and efficient storage.
o AWS also offers a choice that whether we want to run the applications and services together or not. We about the assembly of physical infrastructure.
can also choose to run a part of the IT infrastructure in AWS and the remaining part in data centres.
VI
VI
This tutorial covers the fundamentals of Azure, which will provide us the idea about all the Azure key services that
we are most likely required to know to start developing solutions. After completing this tutorial, we can crack job
2) Cost-effectiveness
interviews or able to get different Microsoft Azure certifications.
AWS requires no upfront investment, long-term commitment, and minimum expense when compared to
What is Azure
traditional IT infrastructure that requires a huge investment.
Microsoft Azure is a growing set of cloud computing services created by Microsoft that hosts your existing
3) Scalability/Elasticity
applications, streamline the development of a new application, and also enhances our on-premises applications.
Through AWS, autoscaling and elastic load balancing techniques are automatically scaled up or down, when It helps the organizations in building, testing, deploying, and managing applications and services through
demand increases or decreases respectively. AWS techniques are ideal for handling unpredictable or very high Microsoft-managed data centers.
loads. Due to this reason, organizations enjoy the benefits of reduced cost and increased user satisfaction.
Azure Services When a request is made by the user either using PowerShell or Azure portal. First, it will go to the Orchestrator,
o Compute services: It includes the Microsoft Azure Cloud Services, Azure Virtual Machines, Azure Website, where it will fundamentally do three things:
and Azure Mobile Services, which processes the data on the cloud with the help of powerful processors.
1. Authenticate the User
o Data services: This service is used to store data over the cloud that can be scaled according to the
2. It will Authorize the user, i.e., it will check whether the user is allowed to do the requested task.
requirements. It includes Microsoft Azure Storage (Blob, Queue Table, and Azure File services), Azure
SQL Database, and the Redis Cache. 3. It will look into the database for the availability of space based on the resources and pass the request to
an appropriate Azure Fabric controller to execute the request.
o Application services: It includes services, which help us to build and operate our application, like the
Azure Active Directory, Service Bus for connecting distributed systems, HDInsight for processing big data,
Combinations of racks form a cluster. We have multiple clusters within a data center, and we can have multiple
the Azure Scheduler, and the Azure Media Services.
Data Centers within an Availability zone, multiple Availability zones within a Region, and multiple Regions within
o Network services: It helps you to connect with the cloud and on-premises infrastructure, which includes a Geography.
S
Virtual Networks, Azure Content Delivery Network, and the Azure Traffic Manager.
TE
TE
o Geographies: It is a discrete market, typically contains two or more regions, that preserves data residency
How Azure works and compliance boundaries.
Azure regions: A region is a collection of data centers deployed within a defined perimeter and
NO
NO
o
It is essential to understand the internal workings of Azure so that we can design our applications on Azure
interconnected through a dedicated regional low-latency network.
effectively with high availability, data residency, resilience, etc.
Azure covers more global regions than any other cloud provider, which offers the scalability needed to bring
applications and users closer around the world. It is globally available in 50 regions around the world. Due to its
K
K
availability over many regions, it helps in preserving data residency and offers comprehensive compliance and
flexible options to the customers.
H
H
ES
ES
GN
GN
VI
VI
Microsoft Azure is completely based on the concept of virtualization. So, similar to other virtualized data center,
it also contains racks. Each rack has a separate power unit and network switch, and also each rack is integrated
with a software called Fabric-Controller. This Fabric-controller is a distributed application, which is responsible for
managing and monitoring servers within the rack. In case of any server failure, the Fabric-controller recognizes it
and recovers it. And Each of these Fabric-Controller is, in turn, connected to a piece of software
called Orchestrator. This Orchestrator includes web-services, Rest API to create, update, and delete resources.
o Availability Zones: These are the physically separated location within an Azure region. Each one of them
is made up of one or more data centers, independent configuration.
Azure Pricing
It is one of the main reasons to learn Microsoft Azure. Because Microsoft is providing free Credits in the Azure
account to access Azure services for free for a short duration. This credit is sufficient for people who are new at
Microsoft Azure and want to use the services.
Microsoft offers the pay-as-you-go approach that helps organizations to serve their needs. Typically the cloud
services will be charged based on the usage. The flexible pricing option helps in up-scaling and down-scaling the
S
architecture as per our requirements.
TE
TE
Azure Certification
o Azure Solution Architect: Those who have expertise in compute, network, storage, and security so that
NO
NO
Microsoft Azure helps to fill the gap between the industry requirement and the resource available. Microsoft they can design the solutions that run on Azure.
provides Azure Certification into three major categories, which are:
o Azure Administrator: Those who implement, monitor, and maintain Microsoft Azure solutions, including
major services.
K
K
H
H
ES
ES
GN
GN
VI
VI
All these certifications are divided into different levels. If anyone is planning to get certified, then he/she first has
to get an associate-level certification and then go for the advanced level.
o Azure Developer: Those who design, build, test, and maintain cloud solutions, such as applications and
services, partnering with cloud solution architects, cloud DBAs, cloud administrators, and clients to
implement these solutions.
Google Apps Script is a cloud-based JavaScript platform which allows developers to write scripts only owner can
manipulate API services such as Calendar, Docs, Drive, Gmail, and Sheets and easily create Add-Ons for these
services with chromium based applications. [7]
User registration is commonly done via Google, which allows users to securely log into third-party services with
their Google account through the Google Sign-in system. This is currently available from
within Android (operating system) or by using JavaScript.[8] It is popular to include a "Sign in with Google" button
in Android apps, as typing login credentials manually is time-consuming due to the limited screen size. As the
S
user is usually signed into their Google account on their mobile device, signing-in/signing-up for a new service
TE
TE
using a Google account is usually a matter of a few button clicks. Drive apps are various web applications which
work within Google Drive using the Drive API. Users can integrate these apps into their Drive from the Chrome
Web Store, allowing them to work entirely in the cloud.[9] There are many apps available for collaborative
NO
NO
document editing (Google Docs, Sheets), picture/video editing, work management, or sketching diagrams and
Google APIs are application programming interfaces (APIs) developed by Google which allow communication
workflows. Custom Search allows web developers to provide a search of their own website by embedding a
with Google Services and their integration to other services. Examples of these include Search, Gmail, Translate
custom search box and using the Custom Search API. They can not customize the search results or make money
or Google Maps. Third-party apps can use these APIs to take advantage of or extend the functionality of the
off of the ads shown by AdSense in Custom Search. App Engine are web apps that run on the Google App
K
K
existing services.
Engine, a platform-as-a-service (PaaS) cloud computing platform which allows web developers to run their
The APIs provide functionality like analytics, machine learning as a service (the Prediction API) or access to user
websites in Google datacenters.[10] These web apps cannot take advantage of APIs to manipulate services such
data (when permission to read the data is given). Another important example is an embedded Google map on a
H
H
as TaskQueue (a distributed queue), BigQuery (a scalable database based on Dremel) or DataStore. Gadgets are
website, which can be achieved using the Static Maps API,[1] Places API[2] or Google Earth API.[3]
mini-applications built in HTML, JavaScript, Adobe Flash and Silverlight that cannot be embedded in webpages
ES
ES
and other apps. They can not run on multiple sites and products (even writing them once allow users can not
Authentication and authorization[edit]
run them in multiple places).[11]
GN
GN
Usage of all of the APIs requires authentication and authorization using the Oauth 2.0 protocol. Oauth 2.0 is a
simple protocol. To start, it is necessary to obtain credentials from the Developers Console. Then the client app
can request an access Token from the Google Authorization Server, and uses that Token for authorization when
VI
VI
accessing a Google API service.[4]
Client libraries[edit]
There are client libraries in various languages which allow developers to use Google APIs from within their code,
including Java, JavaScript, Ruby, .NET, Objective-C, PHP and Python. [5]
The Google Loader is a JavaScript library which allows web developers to easily load
other JavaScript API provided by Google and other developers of popular libraries. Google Loader provides a
JavaScript method for loading a specific API (also called module), in which additional settings can be specified
such as API version, language, location, selected packages, load callback (computer programming) and other
parameters specific to a particular API. Dynamic loading or auto-loading is also supported to enhance the
performance of the application using the loaded APIs.[6]
UNIT V IoT AND CLOUD It is important to note that cloud architecture must be well-designed since reliability, security, economy, and
IoT and the Cloud - Role of Cloud Computing in IoT - AWS Components - S3 – Lambda - AWS IoT performance optimization depends upon it. Using well-designed CI/CD pipelines, structured services, and
Core -Connecting a web application to AWS IoT using MQTT- AWS IoT Examples. Security sandboxed environments results in a secure environment and agile development.
Concerns, Risk Issues, and Legal Aspects of Cloud Computing- Cloud Data Security Comparison of Internet of Things and Cloud Computing:
Cloud is a centralized system helping to transfer and deliver data and files to data centers over the Internet. A
variety of data and programs are easy to access from a centralized cloud system.
IoT and the Cloud The Internet of Things refers to devices connected to the Internet. In the IoT, data is stored in real-time, as well
One component that improves the success of the Internet of Things is Cloud Computing. Cloud computing as historical data. The IoT can analyze and instruct devices to make effective decisions, as well as track how
enables users to perform computing tasks using services provided over the Internet. The use of the Internet of certain actions function.
Things in conjunction with cloud technologies has become a kind of catalyst: the Internet of Things and cloud Cloud computing encompasses the delivery of data to data centers over the Internet. IBM divides cloud
S
computing are now related to each other. These are true technologies of the future that will bring many computing into six different categories:
TE
TE
benefits. 1. Platform as a Service (PaaS) –
Due to the rapid growth of technology, the problem of storing, processing, and accessing large amounts of data The cloud contains everything you need to build and deliver cloud applications so there is no need
has arisen. Great innovation relates to the mutual use of the Internet of Things and cloud technologies. In
NO
NO
to maintain and buy equipment, software, etc.
combination, it will be possible to use powerful processing of sensory data streams and new monitoring 2. Software as a Service (SaaS) –
services. As an example, sensor data can be uploaded and saved using cloud computing for later use as In this case, applications run in the cloud and other companies operate devices that connect to
intelligent monitoring and activation using other devices. The goal is to transform data into insights and thus users’ computers through a web browser.
drive cost-effective and productive action.
K
K
3. Infrastructure as a Service (IaaS) –
Benefits And Functions of IoT Cloud: IaaS is an option providing companies with storage, servers, networks and hubs processing data
There are many benefits of combining these services – for each use.
H
H
1. IoT Cloud Computing provides many connectivity options, implying large network access. People 4. Public cloud –
ES
ES
use a wide range of devices to gain access to cloud computing resources: mobile devices, tablets, Companies manage spaces and provide users with quick access through the public network.
laptops. This is convenient for users but creates the problem of the need for network access 5. Private cloud –
The same as a public cloud, but only one person has access here, which can be an organization, an
GN
GN
points.
2. Developers can use IoT cloud computing on-demand. In other words, it is a web service accessed individual company, or a user.
without special permission or any help. The only requirement is Internet access. 6. Hybrid cloud –
VI
VI
3. Based on the request, users can scale the service according to their needs. Fast and flexible means Based on a private cloud, but provides access to a public cloud.
you can expand storage space, edit software settings, and work with the number of users. Due to Now, the Internet of Things refers to connecting devices to the Internet. Everyday devices such as cars and
this characteristic, it is possible to provide deep computing power and storage. household appliances may have an Internet connection, and with the advancement of the Internet of Things,
4. Cloud Computing implies the pooling of resources. It influences increased collaboration and builds more and more devices will join this list.
only controls each unit individually. Also, it has no way of imagining how these units work in relation to each for scalability in the delivery of applications and software as a service by enabling businesses to manage and
other. This is why only the combination of the edge and the cloud will enable businesses to benefit from IoT store data across cloud platforms.
developments.
What is IoT?
The Role of Cloud Computing on the Internet of Things: In, IoT we do not need interaction between human or between human and computer. We can communicate
Cloud computing works to improve the efficiency of daily tasks in conjunction with the Internet of Things. Cloud data over a network of linked devices like objects, computers, or digital devices.
computing is about providing a path for data to reach its destination while the Internet of Things generates a
A heart monitor implant is an example of IoT usage. An in-built sensor that gives alert to driver on path danger
huge amount of data.
in car is also example of IoT. IoT device is an object which can transfer or receive the data across network and
According to Amazon Web Services, there are four benefits of cloud computing:
can have IP address. IoT object should be capable of having IP address.
1. No need to pre-guess infrastructure capacity needs
Increased data output has led to the growth of IoT. Due to the Internet of Things Cloud Service's excessive
2. Saves money, because you only need to pay for those resources that you use, the larger the scale,
S
communication between cheap sensors in the IoT, there will soon be billions of connected machines and
the more savings
TE
TE
devices joining human users.
3. In a few minutes, platforms can be deployed around the world
4. Flexibility and speed in providing resources to developers Why Cloud Computing Is Essential For IoT?
NO
NO
Thus, the role of cloud computing in IoT is to work together to store IoT data, providing easy access when As a result of cloud computing, storage options for personal and professional use have undergone tremendous
needed. It’s important to note that cloud computing is an easy way to move large data packets across the change. Data is also available from a distance, thanks to cloud solutions' scalability and data dynamics. It has
Internet generated by the IoT. thus shown to be a successful solution for data transfer across internet channels and via specialized direct links,
depending on the organization's needs.
Conclusion:
K
K
In conclusion, cloud computing in combination with the Internet of Things will make fundamental changes to The cloud is an excellent IoT enabler that satisfies the data-driven requirements of the company. Cloud also
the life of mankind, particularly in how information is managed. The cloud is the only technology that can offers technology framework. Using that framework, we can develop better IoT devices.
H
H
analyze, store, and access the IoT depending on the deployment model. Because of the nature of on-demand
Speed and scale are two essential aspects of cloud computing, and they work in unmatched harmony with IoT
information, cloud computing with an Internet connection is available on any device at any time. As hybrid cloud
ES
ES
networking and mobility. So, user can benefit more by combine use of cloud computing and IoT.
adoption grows, many companies are realizing its benefits and the need to implement it. Cloud computing will
Unquestionably, some factors show that the cloud is necessary for the success of IoT, and here are some of
continue to open up new opportunities for the IoT for a long time to come.
them.
GN
GN
The three main components of the cloud listed below will revolutionize the Internet of Things:-
1. Computing power Cloud Functions as a Distant Computing Power
2. Reliability On-premises infrastructure reliance is no longer a viable option. As usage of cloud and IoT devices are
VI
VI
3. Connectivity increasing day by day, we generated large amount of data. We need to process that data quickly using big data.
The advantage of having a tonne of storage capacity in this situation comes from the cloud. As we are heading
towards 5G from 4G, cloud computing also enables developer more speed in getting access to data.
Role of Cloud Computing in IoT IoT Data is More Secure And Private as a Result of Cloud Computing.
IoT involves significant data generation. And when you work with data, the data security and data privacy
Innovations lead to a continuing expansion of technologies. IoT and cloud computing are now two upcoming
become issue. IoT also makes use of mobility. Cloud uses advance encryption algorithms and authentication.
internet technologies that are closely linked, with one providing the groundwork for the success of the other.
Which enable cloud to provide its user high security.
Cloud computing is helping the IoT in getting success. Cloud is a big factor in the success of IoT. As cloud enable
No Requirement For Hosting on-premises
user to carry and access all thing over internet without any storage, IoT is related with cloud computing. Future
users of these technologies will gain a number of benefits. As was already mentioned, cloud computing allows For IoT devices, plug-and-play hosting services are necessary. This will become quite expensive due to plug-
and-play hosting services. This will cost more to organizations. This type of hosting services needs hardware
system. Due to the combined power of cloud computing and IoT, you do not need to depend on substantial
machinery. As cloud computing infrastructure make it ready to use without having hardware storage device
AWS Components
set-up offline. This makes it easy for IoT hosting organizations.
Less Cost of Ownership will manage the power plants to ensure a reliable supply of electricity at very low prices for these factories in
general. Electricity could be generated more efficiently and the price in this model is low. The AWS cloud follows
While preventing enterprises from putting up the infrastructure, cloud technology also provides many
a similar model in which companies can opt for cloud services instead of building large infrastructures, where
resources. As a result, it saves lot of money on infrastructure construction. Additionally, because there is no
they can get all the infrastructure they may need.
S
idea of local systems, hardware, and software in the cloud, the IT teams are abler to concentrate on their
AWS components
regular tasks.
TE
TE
To assess AWS cloud computing capabilities, we must first examine the basic components of the cloud. There
Program For Business Continuity
are different components of AWS, but only for key components.
Business continuity is guaranteed by cloud computing, even if unexpected disasters occur while it is being used. Amazon Cluster
NO
NO
There is no danger of data loss because data is maintained on additional distinct servers, which is considerably Also known as the Amazon account, AWS has the main computer service EC2 (Elastic cloud computer) and ELB
more crucial in the case of IoT-based architecture. (Elastic Load Balancing). Due to these cases, companies can increase or decrease according to needs.
IoT innovations with low entry barriers require hassle-free hosting options. As a result, cloud computing in IoT Administrators and system developers use the EC2 instances to maintain and run the cloud computing. The
K
K
is a suitable solution. IoT players can use the power of distant data centers due to cloud computing without evaluation is based on the use. The first AWS timers receive approximately 750 EC2 hours per month during the
requiring on-premises gear and software. IoT cloud computing is the best option financially because users need first year. But they also have three pricing models, such as on-demand, on-site samples, and a backup case.
to adhere to the pay-as-you-go concept. It also saves a tonne of money upfront. Depending on the location, the size, complexity and on-demand storage requirements vary from $ 0.13 to $
H
H
4.60.
This helps businesses can launch massive IoT projects with ease. This removes many obstacles to entry for the
ES
ES
The prices of backup copies are if users are expected to pre-order an advance in the range of one to three years.
majority of IoT-based organizations.
AWS offers up to 75% discount on-demand prices when users reserve cloud computing.
Communication Between Devices The comparison of sample prices allows users to make offers for the calculation of instances that are not used.
GN
GN
By using cloud computing in proper way, IoT devices can communicate with each other seamlessly. As a result, Prices vary according to consumption, time of day, week or month.
connected devices and smart devices can communicate with various reliable APIs. In this way, networked For smaller human interventions and fault tolerance, AWS ELB distributes applications in all cases of EC2. The
VI
VI
technologies are made possible by cloud computing. ELB service is free of charge in 15 GB of data processing and 750 hours of monthly service for one year. The
highest charges are charged every hour and each GB is transferred.
Conclusion
Storage
Every firm works individually to keep up with this evolving technology's pace. IoT technology is predicted to
The simple storage service (S3) from Amazon, Elastic Block Storage (EBS) and CloudFront are three Amazon
connect billions of devices, and the information that these devices produce will be challenging to handle and
storage options. Storage in AWS is guaranteed by the pay-per-use model. Amazon S3 is an AWS storage offering,
process using the current methods.
which can store any amount of storage required. It is used for several reasons, such as storing content, backing
up, archiving and recovering an accident, as well as storing data.
Along with the first free copy of EC2 of the free year, AWS also offers 5 GB of cloud storage and 20,000 GET
requests, as well as 5,000 free S3 requests from S3 the first year. After the first year, the price is from $ 0,300
per 1 GB to 1 TB per month. EBS is very useful for measuring EC2 samples. Prices are based on geographic
regions, such as the disk technology used and the required GB of reserved memory. CloudFront is an excellent Mobile services
storage option for developers and business organizations that facilitate low-latency, high-speed data transfer. Amazon Cognito and Mobile Analytics are two popular mobile AWS services. Cognito ID users synchronize the
Databases data on their mobile devices. Here is a synchronization of 10GB cloud storage and 10 synchronization
Along with caching and data storage in the AWS petabyte area, the relational ladder, and the NoSQL database operations per month. In addition, for every 10,000 transactions, it is obligated to pay around $ 0.15.
are also included. DynamoDB is a NoSQL database that offers large and economical storage. By using EC2 and The use of data for 60 minutes comes with Mobile Analytics, which tracks the applications on the scale. While
EBS, users can manage their own databases in AWS. The Relational Database Service (RDS) and Amazon Redshift the use of one million events is free and on top of that, the price is $ 1 per million.
are two AWS databases.
Amazon RDS is used to manage and expand MySQL, Oracle, SQLServer or PostgreSQL in AWS. Based on
examples of hours and amount of storage, RDS is used. Redshift is a data storage service through which users S3-101
can store data in columns instead of rows. Prices are based on case hours, such as $ 0.25 per hour.
o S3 is one of the first services that has been produced by aws.
S
Become an AWS Certified Expert in 25Hours
o S3 stands for Simple Storage Service.
Management and security
TE
TE
o S3 provides developers and IT teams with secure, durable, highly scalable object storage.
The AWS directory service directly connects AWS clouds to local locations. CloudWatch controls the cloud
resources for AWS. The AWS AWS CloudTrail API records require AWS user accounts. CloudTrial does it for free. o It is easy to use with a simple web services interface to store and retrieve any amount of data from
NO
NO
Networks anywhere on the web.
Amazon VPC (Virtual Private Cloud) provides versatile network performance in AWS, which means it provides
What is S3?
integrated security and a private cloud. VPC is free with EC2. AWS Direct Connect allows users to connect
directly to a cloud that goes through the Internet. The price is per hour. o S3 is a safe place to store the files.
K
K
Analytics o It is Object-based storage, i.e., you can store the images, word files, pdf files, etc.
AWS provides data analysis services in all areas, such as Hadoop, orchestration and data transmission and real- o The files which are stored in S3 can be from 0 Bytes to 5 TB.
time storage. EMR (Elastic MapReduce) is an analytical facilitator used by companies, data analysts, researchers
H
H
o It has unlimited storage means that you can store the data as much you want.
and developers to process parts of data. The evaluation is carried out by the hour. Redshift also offers some
ES
ES
o Files are stored in Bucket. A bucket is like a folder available in S3 that stores the files.
analytical capabilities.
o S3 is a universal namespace, i.e., the names must be unique globally. Bucket contains a DNS address.
Become an AWS Expert with Certification in 25Hours
Therefore, the bucket must contain a unique name to generate a unique DNS address.
GN
GN
Application services
Amazon SQS (simple queue service) is used to automate the workflow between different services. There is a
If you create a bucket, URL look like:
special queue used to store messages. The service is free up to 1 million messages per month, and then for
VI
VI
every million messages, 0.50 USD is charged.
SWS (Simple Workflow Service) is a task management and coordination service for AWS. 10,000 active tasks,
30,000 working days and 1,000 executions executed for one year are free for users. In addition, users pay
approximately $ 0.0001 per workflow.
o If you upload a file to S3 bucket, then you will receive an HTTP 200 code means that the uploading of a
Implementation and management
file is successful.
Elastic Beanstalk uses Java, .NET, PHP, Node.js, Python and Ruby to implement and measure web applications.
Health and registration files can be easily monitored. CloudFormation helps companies and developers gather Advantages of Amazon S3
and provide important AWS resources.
Get AWS online Training
o Key: It is simply the name of the object. For example, hello.txt, spreadsheet.xlsx, etc. You can use the key
to retrieve the object.
o Value: It is simply the data which is made up of a sequence of bytes. It is actually a data inside the file.
o Version ID: Version ID uniquely identifies the object. It is a string generated by S3 when you add an object
to the S3 bucket.
o Metadata: It is the data about data that you are storing. A set of a name-value pair with which you can
store the information regarding an object. Metadata can be assigned to the objects in Amazon S3 bucket.
o Access control information: You can put the permissions individually on your files.
S
TE
TE
What is AWS Lambda?
NO
NO
AWS Lambda is a compute service that lets you run code without provisioning or managing servers. Lambda
runs your code on a high-availability compute infrastructure and performs all of the administration of the
compute resources, including server and operating system maintenance, capacity provisioning and automatic
K
K
scaling, and logging. With Lambda, you can run code for virtually any type of application or backend service. All
you need to do is supply your code in one of the languages that Lambda supports.
o Create Buckets: Firstly, we create a bucket and provide a name to the bucket. Buckets are the containers
H
H
in S3 that stores the data. Buckets must have a unique name to generate a unique DNS address. You organize your code into Lambda functions. Lambda runs your function only when needed and scales
Storing data in buckets: Bucket can be used to store an infinite amount of data. You can upload the files
ES
ES
o automatically, from a few requests per day to thousands per second. You pay only for the compute time that
as much you want into an Amazon S3 bucket, i.e., there is no maximum limit to store the files. Each you consume—there is no charge when your code is not running. For more information, see AWS Lambda
object can contain upto 5 TB of data. Each object can be stored and retrieved by using a unique developer Pricing.
GN
GN
assigned-key.
Lambda is a highly available service. For more information, see the AWS Lambda Service Level Agreement.
o Download data: You can also download your data from a bucket and can also give permission to others
VI
VI
to download the same data. You can download the data at any time whenever you want. Note
o Permissions: You can also grant or deny access to others who want to download or upload the data from
In the AWS Lambda Developer Guide, we assume that you have experience with coding, compiling, and
your Amazon S3 bucket. Authentication mechanism keeps the data secure from unauthorized access.
deploying programs using one of the languages that Lambda supports.
o Standard interfaces: S3 is used with the standard interfaces REST and SOAP interfaces which are designed
in such a way that they can work with any development toolkit.
When to use Lambda
o Security: Amazon S3 offers security features by protecting unauthorized users from accessing your data.
Lambda is an ideal compute service for many application scenarios, as long as you can run your application code
S3 is a simple key-value store
using the Lambda standard runtime environment and within the resources that Lambda provides. For example,
you can use Lambda for:
S3 is object-based. Objects consist of the following:
File processing: Use Amazon Simple Storage Service (Amazon S3) to trigger Lambda data processing in Use your preferred container image tooling, workflows, and dependencies to build, test, and deploy
real time after an upload. your Lambda functions.
Stream processing: Use Lambda and Amazon Kinesis to process real-time streaming data for application Code signing
activity tracking, transaction order processing, clickstream analysis, data cleansing, log filtering, Code signing for Lambda provides trust and integrity controls that let you verify that only unaltered
indexing, social media analysis, Internet of Things (IoT) device data telemetry, and metering. code that approved developers have published is deployed in your Lambda functions.
Web applications: Combine Lambda with other AWS services to build powerful web applications that Lambda extensions
automatically scale up and down and run in a highly available configuration across multiple data You can use Lambda extensions to augment your Lambda functions. For example, use extensions to
centers. more easily integrate Lambda with your favorite tools for monitoring, observability, security, and
IoT backends: Build serverless backends using Lambda to handle web, mobile, IoT, and third-party API governance.
requests. Function blueprints
S
Mobile backends: Build backends using Lambda and Amazon API Gateway to authenticate and process A function blueprint provides sample code that shows how to use Lambda with other AWS services
API requests. Use AWS Amplify to easily integrate your backend with your iOS, Android, Web, and
TE
TE
or third-party applications. Blueprints include sample code and function configuration presets for
React Native frontends. Node.js and Python runtimes.
Database access
NO
NO
When using Lambda, you are responsible only for your code. Lambda manages the compute fleet that offers a
A database proxy manages a pool of database connections and relays queries from a function. This
balance of memory, CPU, network, and other resources to run your code. Because Lambda manages these
enables a function to reach high concurrency levels without exhausting database connections.
resources, you cannot log in to compute instances or customize the operating system on provided runtimes.
File systems access
Lambda performs operational and administrative activities on your behalf, including managing capacity,
K
K
monitoring, and logging your Lambda functions. You can configure a function to mount an Amazon Elastic File System (Amazon EFS) file system to a
local directory. With Amazon EFS, your function code can access and modify shared resources safely
If you need to manage your own compute resources, AWS has other compute services to meet your needs. For and at high concurrency.
H
H
example:
ES
ES
Amazon Elastic Compute Cloud (Amazon EC2) offers a wide range of EC2 instance types to choose Getting started with Lambda
from. It lets you customize operating systems, network and security settings, and the entire software
To work effectively with Lambda, you need coding experience and expertise in the following domains:
GN
GN
stack. You are responsible for provisioning capacity, monitoring fleet health and performance, and
using Availability Zones for fault tolerance. Linux OS and commands, as well as concepts such as processes, threads, and file permissions.
AWS Elastic Beanstalk enables you to deploy and scale applications onto Amazon EC2. You retain Familiarity with security services and concepts: AWS Identity and Access Management (IAM) and
VI
VI
ownership and full control over the underlying EC2 instances. access control principles, and AWS Key Management Service (AWS KMS) and public key infrastructure.
Cloud concepts and IP networking concepts (for public and private networks).
Lambda features Distributed computing concepts such as queues, messaging, notifications, and concurrency.
The following key features help you develop Lambda applications that are scalable, secure, and easily
extensible:
Concurrency and scaling controls such as concurrency limits and provisioned concurrency give you
fine-grained control over the scaling and responsiveness of your production applications.
Functions defined as container images
AWS IoT provides cloud services and device support that you can use to implement IoT solutions. AWS provides
Devices communicate with cloud services by using various technologies and protocols. Examples include:
many cloud services to support IoT-based applications. So to help you understand where to start, this section
provides a diagram and definition of essential concepts to introduce you to the IoT universe. Wi-Fi/Broadband internet
Broadband cellular data
Devices
S
A device is a type of hardware that manages interfaces and communications. Devices are usually located in close
TE
TE
proximity to the real-world interfaces they monitor and control. Devices can include computing and storage
resources, such as microcontrollers, CPU, memory. Examples include:
NO
NO
Raspberry Pi
Arduino
Voice-interface assistants
K
K
LoRaWAN and devices
Amazon Sidewalk devices
Custom IoT devices
H
H
ES
ES
Interfaces
GN
Apps User interfaces
Components that allow devices and users to communicate with each other.
VI
VI
Apps give end users access to IoT devices and the features provided by the cloud services to which those o Input interfaces
devices are connected.
Enable a user to communicate with a device
AWS IoT is an example of an IoT connection and management service. Input components that measure or sense something in the outside world in a way that a device
Compute services, such as Amazon Elastic Compute Cloud and AWS Lambda understands. Examples include:
Database services, such as Amazon DynamoDB o Temperature sensor (converts temperature to an analog or digital signal)
o Humidity sensor (converts relative humidity to an analog or digital signal) porting guides so that you can build innovative IoT products or solutions on your choice of hardware
o Analog to digital convertor (converts an analog voltage to a numeric value) platforms.
o Ultrasonic distance measuring unit (converts a distance to a numeric value) AWS IoT Device Tester
o Optical sensor (converts a light level to a numeric value) AWS IoT Device Tester for FreeRTOS and AWS IoT Greengrass is a test automation tool for
o Camera (converts image data to digital data) microcontrollers. AWS IoT Device Tester tests your device to determine if it will run FreeRTOS or
Actuators AWS IoT Greengrass and interoperate with AWS IoT services.
Output components that the device can use to control something in the outside world. Examples AWS IoT ExpressLink
include: AWS IoT ExpressLink powers a range of hardware modules developed and offered by AWS Partners.
o Stepper motors (convert electric signals to movement) The connectivity modules include AWS-validated software, making it faster and easier for you to
o Relays (control high electric voltages and currents) securely connect devices to the cloud and seamlessly integrate with a range of AWS services. For
S
more information, visit the AWS IoT ExpressLink overview page or see the AWS IoT ExpressLink
TE
TE
Programmer's Guide.
AWS IoT services overview
AWS IoT Greengrass
In the IoT universe, AWS IoT provides the services that support the devices that interact with the world and the AWS IoT Greengrass extends AWS IoT to edge devices so they can act locally on the data they
NO
NO
data that passes between them and AWS IoT. AWS IoT is made up of the services that are shown in this generate and use the cloud for management, analytics, and durable storage. With AWS IoT
illustration to support your IoT solution. Greengrass, connected devices can run AWS Lambda functions, Docker containers, or both, execute
predictions based on machine learning models, keep device data in sync, and communicate with
other devices securely – even when they are not connected to the Internet.
K
K
FreeRTOS
FreeRTOS is an open source, real-time operating system for microcontrollers that lets you include
H
H
small, low-power edge devices in your IoT solution. FreeRTOS includes a kernel and a growing set of
ES
ES
software libraries that support many applications. FreeRTOS systems can securely connect your
small, low-power devices to AWS IoT and support more powerful edge devices running AWS IoT
Greengrass.
GN
GN
AWS IoT control services
VI
VI
Connect to the following AWS IoT services to manage the devices in your IoT solution.
AWS IoT Core is a managed cloud service that enables connected devices to securely interact with
cloud applications and other devices. AWS IoT Core can support many devices and messages, and it
AWS IoT device software can process and route those messages to AWS IoT endpoints and other devices. With AWS IoT Core,
your applications can interact with all of your devices even when they aren’t connected.
AWS IoT provides this software to support your IoT devices.
AWS IoT Core Device Advisor
AWS IoT Device SDKs AWS IoT Core Device Advisor is a cloud-based, fully managed test capability for validating IoT
devices during device software development. Device Advisor provides pre-built tests that you can
The AWS IoT Device and Mobile SDKs help you efficiently connect your devices to AWS IoT. The AWS
IoT Device and Mobile SDKs include open-source libraries, developer guides with samples, and
use to validate IoT devices for reliable and secure connectivity with AWS IoT Core, before deploying streaming, or real-time audio or video interactivity between camera IoT devices, web browsers, and
devices to production. mobile devices for a variety of use cases.
AWS IoT Device Defender AWS IoT Analytics
AWS IoT Device Defender helps you secure your fleet of IoT devices. AWS IoT Device Defender AWS IoT Analytics lets you efficiently run and operationalize sophisticated analytics on massive
continuously audits your IoT configurations to make sure that they aren’t deviating from security volumes of unstructured IoT data. AWS IoT Analytics automates each difficult step that is required
best practices. AWS IoT Device Defender sends an alert when it detects any gaps in your IoT to analyze data from IoT devices. AWS IoT Analytics filters, transforms, and enriches IoT data before
configuration that might create a security risk, such as identity certificates being shared across storing it in a time-series data store for analysis. You can analyze your data by running one-time or
multiple devices or a device with a revoked identity certificate trying to connect to AWS IoT Core. scheduled queries using the built-in SQL query engine or machine learning.
AWS IoT Device Management AWS IoT Events
AWS IoT Device Management services help you track, monitor, and manage the plethora of AWS IoT Events detects and responds to events from IoT sensors and applications. Events are
S
connected devices that make up your device fleets. AWS IoT Device Management services help you patterns of data that identify more complicated circumstances than expected, such as motion
TE
TE
ensure that your IoT devices work properly and securely after they have been deployed. They also detectors using movement signals to activate lights and security cameras. AWS IoT Events
provide secure tunneling to access your devices, monitor their health, detect and remotely continuously monitors data from multiple IoT sensors and applications, and integrates with other
troubleshoot problems, as well as services to manage device software and firmware updates. services, such as AWS IoT Core, IoT SiteWise, DynamoDB, and others to enable early detection and
NO
NO
unique insights.
AWS IoT data services AWS IoT FleetWise
AWS IoT FleetWise is a managed service that you can use to collect and transfer vehicle data to the
Analyze the data from the devices in your IoT solution and take appropriate action by using the following AWS
cloud in near-real time. With AWS IoT FleetWise, you can easily collect and organize data from
K
K
IoT services.
vehicles that use different protocols and data formats. AWS IoT FleetWise helps to transform low-
Amazon Kinesis Video Streams level messages into human-readable values and standardize the data format in the cloud for data
H
H
Amazon Kinesis Video Streams allows you to stream live video from devices to the AWS Cloud, analyses. You can also define data collection schemes to control what data to collect in vehicles and
when to transfer it to the cloud.
ES
ES
where it is durably stored, encrypted, and indexed, allowing you to access your data through easy-
to-use APIs. You can use Amazon Kinesis Video Streams to capture massive amounts of live video AWS IoT SiteWise
data from millions of sources, including smartphones, security cameras, webcams, cameras AWS IoT SiteWise collects, stores, organizes, and monitors data passed from industrial equipment
GN
GN
embedded in cars, drones, and other sources. Amazon Kinesis Video Streams enables you to play by MQTT messages or APIs at scale by providing software that runs on a gateway in your facilities.
back video for live and on-demand viewing, and quickly build applications that take advantage of The gateway securely connects to your on-premises data servers and automates the process of
computer vision and video analytics through integration with Amazon Rekognition Video, and collecting and organizing the data and sending it to the AWS Cloud.
VI
VI
libraries for ML frameworks. You can also send non-video time-serialized data such as audio data, AWS IoT TwinMaker
thermal imagery, depth data, RADAR data, and more. AWS IoT TwinMaker builds operational digital twins of physical and digital systems. AWS IoT
Amazon Kinesis Video Streams with WebRTC TwinMaker creates digital visualizations using measurements and analysis from a variety of real-
Amazon Kinesis Video Streams with WebRTC provides a standards-compliant WebRTC world sensors, cameras, and enterprise applications to help you keep track of your physical factory,
implementation as a fully managed capability. You can use Amazon Kinesis Video Streams with building, or industrial plant. You can use real-world data to monitor operations, diagnose and
WebRTC to securely live stream media or perform two-way audio or video interaction between any correct errors, and optimize operations.
camera IoT device and WebRTC-compliant mobile or web players. As a fully managed capability, you
don't have to build, operate, or scale any WebRTC-related cloud infrastructure, such as signaling or
media relay servers to securely stream media across applications and devices. Using Amazon Kinesis
Video Streams with WebRTC, you can easily build applications for live peer-to-peer media
AWS IoT Core for LoRaWAN makes it possible to set up a private LoRaWAN network by connecting
AWS IoT Core services
your LoRaWAN devices and gateways to AWS without the need to develop and operate a LoRaWAN
Network Server (LNS). Messages received from LoRaWAN devices are sent to the rules engine
AWS IoT Core provides the services that connect your IoT devices to the AWS Cloud so that other cloud services
where they can be formatted and sent to other AWS IoT services.
and applications can interact with your internet-connected devices.
Rules engine
The Rules engine connects data from the message broker to other AWS IoT services for storage and
additional processing. For example, you can insert, update, or query a DynamoDB table or invoke a
Lambda function based on an expression that you defined in the Rules engine. You can use an SQL-
based language to select data from message payloads, and then process and send the data to other
services, such as Amazon Simple Storage Service (Amazon S3), Amazon DynamoDB, and AWS
S
Lambda. You can also create rules that republish messages to the message broker and on to other
subscribers. For more information, see Rules for AWS IoT.
TE
TE
AWS IoT Core control services
NO
NO
The AWS IoT Core control services provide device security, management, and registration features.
You can define custom authorizers that allow you to manage your own authentication and
K
K
The next section describes each of the AWS IoT Core services shown in the illustration.
authorization strategy using a custom authentication service and a Lambda function. Custom
authorizers allow AWS IoT to authenticate your devices and authorize operations using bearer token
AWS IoT Core messaging services
H
H
authentication and authorization strategies.
The AWS IoT Core connectivity services provide secure communication with the IoT devices and manage the
ES
ES
Custom authorizers can implement various authentication strategies; for example, JSON Web Token
messages that pass between them and AWS IoT.
verification or OAuth provider callout. They must return policy documents that are used by the
GN
GN
Device gateway device gateway to authorize MQTT operations. For more information, see Custom authentication.
Enables devices to securely and efficiently communicate with AWS IoT. Device communication is Device Provisioning service
secured by secure protocols that use X.509 certificates. Allows you to provision devices using a template that describes the resources required for your
VI
VI
Message broker device: a thing object, a certificate, and one or more policies. A thing object is an entry in the
Provides a secure mechanism for devices and AWS IoT applications to publish and receive messages registry that contains attributes that describe a device. Devices use certificates to authenticate with
from each other. You can use either the MQTT protocol directly or MQTT over WebSocket to AWS IoT. Policies determine which operations a device can perform in AWS IoT.
publish and subscribe. For more information about the protocols that AWS IoT supports, see Device
The templates contain variables that are replaced by values in a dictionary (map). You can use the
communication protocols. Devices and clients can also use the HTTP REST interface to publish data
same template to provision multiple devices just by passing in different values for the template
to the message broker.
variables in the dictionary. For more information, see Device provisioning.
The message broker distributes device data to devices that have subscribed to it and to other AWS Group registry
IoT Core services, such as the Device Shadow service and the rules engine. Groups allow you to manage several devices at once by categorizing them into groups. Groups can
AWS IoT Core for LoRaWAN also contain groups—you can build a hierarchy of groups. Any action that you perform on a parent
group will apply to its child groups. The same action also applies to all the devices in the parent
group and all devices in the child groups. Permissions granted to a group will apply to all devices in AWS IoT Core support service
the group and in all of its child groups. For more information, see Managing devices with AWS IoT.
Amazon Sidewalk Integration for AWS IoT Core
Jobs service
Amazon Sidewalk is a shared network that improves connectivity options to help devices work
Allows you to define a set of remote operations that are sent to and run on one or more devices
together better. Amazon Sidewalk supports a wide range of customer devices such as those that
connected to AWS IoT. For example, you can define a job that instructs a set of devices to download
locate pets or valuables, those that provide smart home security and lighting control, and those that
and install application or firmware updates, reboot, rotate certificates, or perform remote
provide remote diagnostics for appliances and tools. Amazon Sidewalk Integration for AWS IoT Core
troubleshooting operations.
makes it possible for device manufacturers to add their Sidewalk device fleet to the AWS IoT Cloud.
To create a job, you specify a description of the remote operations to be performed and a list of
targets that should perform them. The targets can be individual devices, groups or both. For more
information, see Jobs.
S
Registry
TE
TE
Organizes the resources associated with each device in the AWS Cloud. You register your devices CLOUD SECURITY ISSUES:RISKS, THREATS, AND CHALLENGES
and associate up to three custom attributes with each one. You can also associate certificates and
All companies face security risks, threats, and challenges every day. Many think these terms all mean the
NO
NO
MQTT client IDs with each device to improve your ability to manage and troubleshoot them. For
more information, see Managing devices with AWS IoT. same thing, but they’re more nuanced. Understanding the subtle differences between them will help you
Provides shared responsibility for security in the AWS Cloud. Your devices must keep their
What is the difference between risks, threats, and challenges?
K
K
credentials safe to securely send data to the message broker. The message broker and rules engine
use AWS security features to send data securely to devices or other AWS services. For more A risk is a potential for loss of data or a weak spot.
information, see Authentication.
H
H
A threat is a type of attack or adversary.
A challenge is an organization’s hurdles in implementing practical cloud security.
ES
ES
AWS IoT Core data services
Let’s consider an example: An API endpoint hosted in the cloud and exposed to the public Internet is
The AWS IoT Core data services help your IoT solutions provide a reliable application experience even with
GN
GN
a risk, the attacker who tries to access sensitive data using that API is the threat (along with any specific
devices that are not always connected.
techniques they could try), and your organization’s challenge is effectively protecting public APIs while
Device shadow keeping them available for legitimate users or customers who need them.
VI
VI
A JSON document used to store and retrieve current state information for a device.
A complete cloud security strategy addresses all three aspects, so no cracks exist within the foundation.
Device Shadow service
You can think of each as a different lens or angle with which to view cloud security. A solid strategy must
The Device Shadow service maintains a device's state so that applications can communicate with a
mitigate risk (security controls), defend against threats (secure coding and deployment), and overcome
device whether the device is online or not. When a device is offline, the Device Shadow service
challenges (implement cultural and technical solutions) for your business to use the cloud to grow
manages its data for connected applications. When the device reconnects, it synchronizes its state
securely.
with that of its shadow in the Device Shadow service. Your devices can also publish their current
state to a shadow for use by applications or other devices that might not be connected all the time. 4 Cloud Security Risks
For more information, see AWS IoT Device Shadow service.
You cannot completely eliminate risk; you can only manage it. Knowing common risks ahead of time will
prepare you to deal with them within your environment. What are four cloud security risks?
1. Unmanaged Attack Surface Providers have different default configurations, with each service having its distinct implementations and
2. Human Error nuances. Until organizations become proficient at securing their various cloud services, adversaries will
3. Misconfiguration continue to exploit misconfigurations.
4. Data Breach
4. Data Breaches
1. Unmanaged Attack Surface
A data breach occurs when sensitive information leaves your possession without your knowledge or
An attack surface is your environment’s total exposure. The adoption of microservices can lead to an permission. Data is worth more to attackers than anything else, making it the goal of most attacks. Cloud
explosion of publicly available workload. Every workload adds to the attack surface. Without close misconfiguration and lack of runtime protection can leave it wide open for thieves to steal.
management, you could expose your infrastructure in ways you don’t know until an attack occurs.
The impact of data breaches depends on the type of data stolen. Thieves sell personally identifiable
S
No one wants that late-night call. information (PII) and personal health information (PHI) on the dark web to those who want to steal
TE
TE
identities or use the information in phishing emails.
Attack surface can also include subtle information leaks that lead to an attack. For example,
CrowdStrike’s team of threat hunters found an attacker using sampled DNS request data gathered over Other sensitive information, such as internal documents or emails, could be used to damage a company’s
NO
NO
public WiFi to work out the names of S3 buckets. CrowStrike stopped the attack before the attackers did reputation or sabotage its stock price. No matter the reason for stealing the data, breaches continue to
any damage, but it’s a great illustration of risk’s ubiquitous nature. Even strong controls on the S3 be an imposing threat to companies using the cloud.
buckets weren’t enough to completely hide their existence. As long as you use the public Internet or
cloud, you’re automatically exposing an attack surface to the world. How To Manage Cloud Security Risks
K
K
Your business may need it to operate, but keep an eye on it. Follow these tips to manage risk in the cloud:
H
H
2. Human Error Perform regular risk assessments to find new risks.
Prioritize and implement security controls to mitigate the risks you’ve identified (CrowdStrike can
ES
ES
According to Gartner, through 2025, 99% of all cloud security failures will be due to some level of human help).
error. Human error is a constant risk when building business applications. However, hosting resources on Document and revisit any risks you choose to accept.
GN
GN
the public cloud magnifies the risk.
4 Cloud Security Threats
The cloud’s ease of use means that users could be using APIs you’re not aware of without proper controls
VI
VI
and opening up holes in your perimeter. Manage human error by building strong controls to help people A threat is an attack against your cloud assets that tries to exploit a risk. What are four common threats
One final rule — don’t blame people for errors. Blame the process. Build processes and guardrails to help 1. Zero-Day Exploits
people do the right thing. Pointing fingers doesn’t help your business become more secure. 2. Advanced Persistent Threats
3. Insider Threats
3. Misconfiguration 4. Cyberattacks
Cloud settings keep growing as providers add more services over time. Many companies are using more 1. Zero-day Exploits
than one provider.
Cloud is “someone else’s computer.” But as long as you’re using computers and software, even those run
in another organization’s data center, you’ll encounter the threat of zero-day exploits.
Zero-day exploits target vulnerabilities in popular software and operating systems that the vendor hasn’t With a secure foundation, go on the offensive with threat hunting. (CrowdStrike can help)
patched. They’re dangerous because even if your cloud configuration is top-notch, an attacker can exploit
zero-day vulnerabilities to gain a foothold within the environment. 4 Cloud Security Challenges
2. Advanced Persistent Threats Challenges are the gap between theory and practice. It’s great to know you need a cloud security
strategy. But where do you start? How do you tackle cultural change? What are the daily practical steps
An advanced persistent threat (APT) is a sophisticated, sustained cyberattack in which an intruder to make it happen?
establishes an undetected presence in a network to steal sensitive data over a prolonged time.
What are four cloud security challenges every company faces when embracing the cloud?
APTs aren’t a quick “drive-by” attack. The attacker stays within the environment, moving from workload
to workload, searching for sensitive information to steal and sell to the highest bidder. These attacks are 1. Lack of Cloud Security and Skills
S
dangerous because they may start using a zero-day exploit and then go undetected for months. 2. Identity and Access Management
3. Shadow IT
TE
TE
3. Insider Threats 4. Cloud Compliance
An insider threat is a cybersecurity threat that comes from within the organization — usually by a
NO
NO
1. Lack Of Cloud Security Strategy and Skills
current or former employee or other person who has direct access to the company network, sensitive
data and intellectual property (IP), as well as knowledge of business processes, company policies or other Traditional data center security models are not suitable for the cloud. Administrators must learn new
information that would help carry out such an attack. strategies and skills specific to cloud computing.
K
K
4. Cyberattacks Cloud may give organizations agility, but it can also open up vulnerabilities for organizations that la ck the
internal knowledge and skills to understand security challenges in the cloud effectively. Poor planning can
H
H
A cyber attack is an attempt by cybercriminals, hackers or other digital adversaries to access a computer manifest itself in misunderstanding the implications of the shared responsibility model, which lays out the
network or system, usually for the purpose of altering, stealing, destroying or exposing information. security duties of the cloud provider and the user. This misunderstanding could lead to the exploitation of
ES
ES
unintentional security holes.
Common cyberattacks performed on companies include malware, phishing, DoS and DDoS, SQL
GN
GN
Injections, and IoT based attacks. 2. Identity and Access Management
LEARN MORE Identity and Access Management (IAM) is essential. While this may seem obvious, the challenge lies in
VI
VI
the details.
As companies increase their use of cloud hosting for storage and computing, so increases the risk of
attack on their cloud services. Proactive prevention is always preferred over required remediation.Read It’s a daunting task to create the necessary roles and permissions for an enterprise of thousands of
more about cloud specific vulnerabilities and how to prevent them employees. There are three steps to a holistic IAM strategy: role design, privileged access management,
and implementation.
How to Handle Cloud Security Threats
Begin with a solid role design based on the needs of those using the cloud. Design the roles outside of
There are so many specific attacks; it’s a challenge to protect against them all. But here are three any specific IAM system. These roles describe the work your employees do, which won’t chang e between
guidelines to use when protecting your cloud assets from these threats and others.
cloud providers.
Follow secure coding standards when building microservices Next, a strategy for privileged access management (PAM) outlines which roles require more protection
Double and triple check your cloud configuration to plug any holes due to their privileges. Tightly control who has access to privileged credentials and rotate them regularly.
Finally, it’s time to implement the designed roles within the cloud provider’s IAM service. This step will be
What is Cloud Data Security?
much easier after developing these ahead of time.
Cloud data security refers to the technologies, policies, services and security controls that protect any
3. Shadow IT
type of data in the cloud from loss, leakage or misuse through breaches, exfiltration and unauthorized
Shadow IT challenges security because it circumvents the standard IT approval and management process. access. A robust cloud data security strategy should include:
Shadow IT is the result of employees adopting cloud services to do their jobs. The ease with which cloud Ensuring the security and privacy of data across networks as well as within applications, containers,
resources can be spun up and down makes controlling its growth difficult. For example, developers can workloads and other cloud environments
quickly spawn workloads using their accounts. Unfortunately, assets created in this way may not be Controlling data access for all users, devices and software
adequately secured and accessible via default passwords and misconfigurations. Providing complete visibility into all data on the network
S
The adoption of DevOps complicates matters. Cloud and DevOps teams like to run fast and without The cloud data protection and security strategy must also protect data of all types. This includes:
TE
TE
friction. However, obtaining the visibility and management levels that the security teams require is
Data in use: Securing data being used by an application or endpoint through user authentication and
difficult without hampering DevOps activities. DevOps needs a frictionless way to deploy secure
access control
NO
NO
applications and directly integrate with their continuous integration/continuous delivery (CI/CD) pipeline.
There needs to be a unified approach for security teams to get the information they need without Data in motion: Ensuring the safe transmission of sensitive, confidential or proprietary data while it
slowing down DevOps. IT and security need to find solutions that will work for the cloud — at DevOps’ moves across the network through encryption and/or other email and messaging security measures
velocity. Data at rest: Protecting data that is being stored on any network location, including the cloud, through
K
K
access restrictions and user authentication
4. Cloud Compliance
EXPERT TIP
H
H
Organizations have to adhere to regulations that protect sensitive data like PCI DSS and HIPAA. Sensitive
The cloud is a term used to describe servers — as well as any associated services, software applications,
ES
ES
data includes credit card information, healthcare patient records, etc. To ensure compliance standards
are met, many organizations limit access and what users can do when granted acc ess. If access control databases, containers and workloads — that are accessed remotely via the internet. Cloud environments
measures are not set in place, it becomes a challenge to monitor access to the network. are typically divided into two categories: a private cloud, which is a cloud environment used exclusively by
GN
GN
one customer; or a public cloud, which is an environment that is shared by more than one user.
How to Overcome Cloud Security Challenges
How secure is the cloud?
VI
VI
Each challenge is different and therefore requires unique solutions. Take the time to plan before maki ng
use of any cloud services. A sound strategy takes into consideration any common cloud challenges like Theoretically, the cloud is no more or less secure than a physical server or data center so long as the
the ones we’ve discussed here. Then you’ll have a plan of action for each anticipated challenge. organization has adopted a comprehensive, robust cybersecurity strategy that is specifically designed to
protect against risks and threats in a cloud environment.
And therein lies the problem: Many companies may not realize that their existing security strategy and
legacy tooling, such as firewalls, do not protect assets hosted in the cloud. For this reason, organizations
must fundamentally reconsider their security posture and update it to meet the security requirements of
this new environment.
Another big misconception about the cloud is that the cloud provider is responsible for all security 1. Data breaches
functions, including data security. In fact, cloud security follows what is referred to as the shared
responsibility model. Data breaches occur differently in the cloud than in on-premises attacks. Malware is less relevant.
Instead, attackers exploit misconfigurations, inadequate access, stolen credentials and other
Hence, cloud security — and, by extension, cloud data security — is a shared responsibility between the vulnerabilities.
cloud service provider (CSP) and its customers.
2. Misconfigurations
EXPERT TIP
Misconfigurations are the No. 1 vulnerability in a cloud environment and can lead to overly permissive
According to this model, the CSP, such as Google Cloud Platform (GCP), Amazon Web Services (AWS), privileges on accounts, insufficient logging and other security gaps that expose organizations to cloud
and Microsoft Azure (Azure), is responsible for managing and protecting the underlying hardware breaches, insider threats and adversaries who leverage vulnerabilities to gain access to data.
S
security. However, customers are expected to enable security at the infrastructure and application layer.
This includes all tools, technologies, policies and methods meant to protect the organization’s data and 3. Unsecured APIs
TE
TE
other cloud-based assets.
Businesses often use APIs to connect services and transfer data, either internally or to partners, suppliers,
NO
NO
Why should businesses store data in the cloud? customers and others. Because APIs turn certain types of data into endpoints, changes to data policies or
privilege levels can increase the risk of unauthorized access to more data than the host intended.
Organizations have shifted to the cloud because it is a key enabler of almost every digital business
transformation strategy. When it comes to cloud data storage, specifically, organizations can unlock 4. Access control/unauthorized access
K
K
valuable benefits, such as:
Organizations using multi-cloud environments tend to rely on default access controls of their cloud
providers, which becomes an issue particularly in a multi-cloud or hybrid cloud environment. Inside
Lower costs: Cloud storage is generally more affordable for businesses and organizations because the
H
H
infrastructure costs are shared across users. threats can do a great deal of damage with their privileged access, knowledge of where to strike, and
ability to hide their tracks.
ES
ES
Resource optimization: Typically speaking, in a cloud model, the CSP is responsible for maintaining
cloud-based servers, hardware, databases or other cloud infrastructure elements. In addition, the
6 Cloud Data Security Best Practices
organization no longer needs to host or maintain on-premises components. This not only decreases
GN
GN
overall IT costs but allows staff to be redeployed to focus on other issues, such as customer support or To ensure the security of their data, organizations must adopt a comprehensive cybersecurity strategy
business modernization. that addresses data vulnerabilities specific to the cloud.
VI
VI
Improved access: Cloud-hosted databases can be accessed by any authorized user, from virtually any
device, in any location in the world so long as there is an internet connection — a must for enabling the Key elements of a robust cloud data security strategy include:
modern digital workforce.
1. Leverage advanced encryption capabilities
Scalability: Cloud resources, such as databases, are flexible, meaning they can be quickly spun up or
down based on the variable needs of the business. This allows the organization to manage surges in
One effective way to protect data is to encrypt it. Cloud encryption transforms data from plain text into
demand or seasonal spikes in a more timely and cost-effective way.
an unreadable format before it enters the cloud. Data should be encrypted both in transit and at rest.
Data encryption is by default enabled in cloud platforms using platform-managed encryption keys. 6. Enable cloud workload protection.
However, customers can gain additional control over this by bringing their own keys and managing them
centrally via encryption key management services in the cloud. For organizations with stricter security Cloud workloads increase the attack surface exponentially. Protecting workloads requires visibility and
standards and compliance requirements, they can implement native hardware security module (HSM) - discovery of each workload and container events, while securing the entire cloud-native stack, on any
enabled key management services or even third-party services for protecting data encryption keys. cloud, across all workloads, containers, Kubernetes and serverless applications. Cloud workload
protection (CWP) includes vulnerability scanning and management, and breach protection for workloads,
2. Implement a data loss prevention (DLP) tool. including containers, Kubernetes and serverless functions, while enabling organizations to build, run and
secure cloud applications from development to production.
Data loss prevention (DLP) is part of a company’s overall security strategy that focuses on detecting and
preventing the loss, leakage or misuse of data through breaches, exfiltration and unauthorized access. CrowdStrike’s Cloud Security Solutions
S
A cloud DLP is specifically designed to protect those organizations that leverage cloud repositories for CrowdStrike has redefined security with the world’s most advanced cloud-native platform that protects
TE
TE
data storage. and enables the people, processes and technologies that drive modern enterprise. The industry continues
to recognize CrowdStrike as a leader, most recently with CRN naming CrowdStrike a Winner of the 2022
3. Enable unified visibility across private, hybrid and multi-cloud environments. Tech Innovator Award for Best Cloud Security.
NO
NO
Unified discovery and visibility of multi-cloud environments, along with continuous intelligent monitoring Powered by the CrowdStrike Security Cloud, the CrowdStrike Falcon® platform leverages real -time
of all cloud resources are essential in a cloud security solution. That unified visibility must be able to indicators of attack (IOAs), threat intelligence, evolving adversary tradecraft and enriched telemetry from
detect misconfigurations, vulnerabilities and data security threats, while providing actionable insights and across the enterprise to deliver hyper-accurate detections, automated protection and remediation, elite
K
K
guided remediation. threat hunting and prioritized observability of vulnerabilities.
H
Another key element of data security is having the proper security policy and governance in place that It is estimated that there will be around 20.4 billion devices connected to the internet by 2020, well how big is
ES
ES
enforces golden cloud security standards, while meeting industry and government regulations across the this number? To give a figure the total world population is 7.6 billion, meaning there will be around 3 devices
entire infrastructure. A cloud security posture management (CSPM) solution that detects and prevents connected to the internet for every human on the earth. This makes it evident that Internet of things will have a
GN
GN
misconfigurations and control plane threats is essential for eliminating blind spots and ensuring major role and strong impact in the future. Adding to this the largest Internet retailer in the world Amazon Inc.
compliance across clouds, applications and workloads. also provides IOT services in name of AWS IOT.
VI
VI
5. Strengthen identity and access management (IAM). The AWS IOT service stands for Amazon Web Service Internet of Things. It allows you to connect your things
(devices) to the internet to exchange data securely, process it and act upon it. It is very popular cloud for IoT
Identity and access management (IAM) helps organizations streamline and automate identity and access Projects. Along with AWS IOT the Amazon web services also provides tons of other features like virtual machine
management tasks and enable more granular access controls and privileges. With an IAM s olution, IT deployment, web-hosting and other stuff which is way out of scope of this tutorial. In this tutorial, we will get
teams no longer need to manually assign access controls, monitor and update privileges, or deprovision started with the AWS IOT by creating a thing and then we will test if the thing is working properly using the
accounts. Organizations can also enable a single sign-on (SSO) to authenticate the user’s identity and MQPTT.fx application.
allow access to multiple applications and websites with just one set of credentials.
Creating you Amazon AWS account
When it comes to IAM controls, the rule of thumb is to follow the principle of least privilege, which
First things first, to get started with anything using AWS IOT we need an account in Amazon AWS. Just get into
means allowing required users to access only the data and cloud resources they need to perform their
the Amazon AWS website and click on “Create a Free Account”.
work.
You will be taken through the sign up procedure. During the process of sign up Amazon will ask for your
Debit/Credit card details. Sadly we need either of one to create an account with AWS. But, since you can use it
S
for free for duration of 12 months it should not be a problem. Just enter your card details since you will not be
TE
TE
charged for 12 months, but make sure to de-activate the account before 12 months if you are not using the
account any longer.
Step 3: You will be taken to the main page, where you will find some tour documents. You can read through them
NO
NO
if interested. But to proceed with the tutorial click on the “Manage” option on the menu which can be found at
You will also be asked for PAN number which is not mandatory, once the sign up process is complete log in to you
left side of you screen as highlighted in below picture.
account.
K
Step 1: In the main page, under AWS services search for “iot core”. You should see the IOT core option being
listed as shown below click on it to open the AWS IOT console
H
H
ES
ES
GN
GN
VI
Step 2: You will be greeted with the introductory message from AWS IOT, just click on “get started”
VI
Downloaded by Hopeserveenterprises Hope ([email protected]) Downloaded by Hopeserveenterprises Hope ([email protected])
lOMoARcPSD|42770001 lOMoARcPSD|42770001
Step 4: Now, it is time to register a thing. A thing is a device like a sensor module or ESP8266 or ESP32 or any Step 6: We have to provide a name for the thing we are creating, it can be any name here I have named my thing
device which can connect to the internet. So we should create a thing on the AWS console through which our as circuitdigest. After naming the thing just scroll down and click on next. If you are interested you can read
actual devices can communicate. To create the thing just click on the “Register a thing” through the other options which gives more definition to the things functions, but you can ignore them for now.
S
TE
TE
NO
NO
Step 7: One peculiar feature with AWS IOT is that it is of industrial standard since the communication is highly
secured. So for everything we create we have to associate it with a certificate and a policy. So as soon as you hit
next in the previous step you will be prompted to choose your security certificate. We have to create a new one
K
K
clicking on “Create Certificate”
H
H
Step 5: There are option to create a single thing or multiple ones, if we create multiple ones they all will share the
ES
ES
same security features. For now to keep things simple to get started we will just create a single thing by clicking
on “create a single thing”
GN
GN
VI
VI
Step 8: Here AWS will provide the keys for the thing that we just created. This thing can be accessed only through
validating through these keys. Make sure you click on the Activate button first and then download the three key
files and save it on your computer somewhere secure. Never share these keys with public, since they can use your
AWS account by launching this thing and you will be charged for it.
S
TE
TE
Step 11: Right now there will be no policies in your account since you have just created it so, for now leave it and
click on “Register Thing”. We will create a policy in our next step and then attach it.
NO
NO
Step 9: The three key files that I downloaded is moved to a folder on my desktop, a snap shot of the same is
shown below. For some users the CA file when downloaded might open on chrome as a stream of code. In that
K
K
case just right click on the code and click save as and save it on your desktop. Make sure the extension of the file
is .pem if it ends with .text change it.
H
H
ES
ES
GN
GN
Step 10: Once you are ready with the certificates we have to create a policy for our thing. Download and save the
certificates in a known location and get back to your browser windows and click on “Attach a policy”
VI
VI
Step 12: You will be taken back to the main page, here we have to create a policy so on the left side menu find for
an option called secure and then click on policies as shown below
S
TE
TE
Step 13: As we know we don’t have any policies yet so click on “create a policy “
Step 15: You will be taken back to the main page, now select secure and certificates to get the following page. In
NO
NO
the page you will have the certificate that we created previously, we have to add the policy that we just created
to this certificate by clicking on options and selecting “Attach policy” as shown below.
K
K
H
H
ES
ES
GN
GN
VI
VI
Step 14: In this step we will create a policy, the name of the policy will be circuitdigest for me, but again it is a user
choice. For action enter iot:* and for Resources ARN enter *. Also make sure the allow button is checked for
allowing effect.
Step 16: You will get a pop-up in which you can select the name of the policy that we just created and then click
Iot:* Indicates that we can both subscribe and publish to the things with this policy
on accept button. For me the name of the policy is CircuitDigest
* Indicates that the thing is accessible to all clients who have access to this certificate
Finally press the “Create” button on the end of the page to create the policy.
Step 2: In the new page click on interact option on the left side of the screen and you will be provided with all the
links for accessing your thing. As said keep these links confidential. For now we need the HTTPS link (Circled in
red) for testing if the thing is working properly so just copy it.
S
TE
TE
NO
NO
That is it, we have created a thing, a certificate and a policy and have linked the policy and certificate to the
thing that we have created. Next we can check if the thing is working by using the “test” option in the AWS IOT
console. Before that we need to get the Broker address of the thing we just created.
K
K
Getting your AWS thing Details:
Step 1: After creating a Thing we need to get the details of the thing like its broker address update link etc to
H
H
access the thing from anywhere using the internet. These details can be found in manage option and clicking on
ES
ES
the name of the thing.
GN
Step 1: Go to the main screen and select the Test option. This will load the MQTT client which can be used to test
our thing.
VI
VI
Downloaded by Hopeserveenterprises Hope ([email protected]) Downloaded by Hopeserveenterprises Hope ([email protected])
lOMoARcPSD|42770001 lOMoARcPSD|42770001
Step 2: On the left side you can see two options Subscribe to a topic and Publish to a topic. First you have to Step 1: Download the MQTT.fx file form this download link. Make sure you select the correct operating system of
subscribe to the thing we just created by entering the name which in my case is circuitdigest. your machine.
Step 2: Open the application and click on the settings icon to configure the MQTT as client. The settings icon is
shown in the picture below:
S
TE
TE
Click on publish to topic and you should see the message reflected in your thing as shown below
NO
NO
Step 3: A new window called Edit Connection Profiles will pop up. Here we have to create the profile for the thing
K
K
that we just created using Amazon AWS. In the Profile name give a name of your choice I have given
“MQTT_Sample”. Then for the broker address paste the address that we got in previous section of “Getting your
H
H
AWS thing Details” section. The Broker Port for AWS IOT is 8883 for all users so enter the same. Then select SSL/TLS
ES
ES
GN
GN
VI
VI
Using MQTT.fx with AWS IOT: Step 4: Now we have to select Self-signed certificates and link the certificates that we downloaded in step 8. Also
make sure PEM formatted is checked. Follow the image below to know which keys you should choose
MQTT.fx is an application which can be used as a client to test and debug IOT devices. In the following steps we
will learn how we can connect the MQTT.fx with the thing that we just created.
S
TE
TE
NO
NO
Step 7: Now go back to the Publish screen tab and publish a message and check if we are getting it on our
Step 5: Finally click on OK and then you will taken back to the main window. Now click on the connect button. IF subscribed channel .To publish a message use the same name. Here I have used the same “bingo” as my name
everything is working properly then MQTT should be able to connect to our thing and the following screen will be and my message is “Hola! Amingo”. Click on the publish button
K
K
displayed. Check for the green circle on the top right corner (en-circled)
H
H
ES
ES
GN
GN
VI
VI
Step 6: Now that we are connected to the thing we can try testing it subscribing to a name. Click on Subscribe tab
Step 8: Now go back to Subscribe tab and you should be able to see the message that we just published as shown
and give any random name and then click on subscribe. Here I have selected bingo as my name. After subscribing
below
you will get the following name.
VIGNESH K NOTES
NC4201 INTERNET OF THINGS AND CLOUD
S
TE
NO
K
H
ES
We are all done with creating and testing our thing that was created using AWS IOT. Since we have also linked it
with MQTT as client it should be easy for us to monitor and debug the thing in future. You can also follow the
video at the bottom to get a better understanding.
GN
VI