Reference Materials
Reference Materials
Collect and Transmit Data : For this purpose sensors are widely used they
are used as per requirements in different application areas.
Actuate device based on triggers produced by sensors or processing
devices : If certain condition is satisfied or according to user’s requirements
if certain trigger is activated then which action to performed that is shown by
Actuator devices.
Receive Information : From network devices user or device can take certain
information also for their analysis and processing purposes.
Communication Assistance : Communication assistance is the phenomena
of communication between 2 network or communication between 2 or more
IoT devices of same or different Networks. This can be achieved by different
communication protocols like : MQTT , Constrained Application Protocol,
ZigBee, FTP, HTTP etc.
Architecture of Internet of Things (IoT)
1. Sensing Layer –
The sensing layer is the first layer of the IoT architecture and is responsible
for collecting data from different sources. This layer includes sensors and
actuators that are placed in the environment to gather information about
temperature, humidity, light, sound, and other physical parameters. These
devices are connected to the network layer through wired or wireless
communication protocols.
2. Network Layer –
The network layer of an IoT architecture is responsible for providing
communication and connectivity between devices in the IoT system. It
includes protocols and technologies that enable devices to connect and
communicate with each other and with the wider internet. Examples of
network technologies that are commonly used in IoT include WiFi, Bluetooth,
Zigbee, and cellular networks such as 4G and 5G. Additionally, the network
layer may include gateways and routers that act as intermediaries between
devices and the wider internet, and may also include security features such
as encryption and authentication to protect against unauthorized access.
3. Data processing Layer –
The data processing layer of IoT architecture refers to the software and
hardware components that are responsible for collecting, analyzing, and
interpreting data from IoT devices. This layer is responsible for receiving raw
data from the devices, processing it, and making it available for further
analysis or action.The data processing layer includes a variety of
technologies and tools, such as data management systems, analytics
platforms, and machine learning algorithms. These tools are used to extract
meaningful insights from the data and make decisions based on that
data.Example of a technology used in the data processing layer is a data
lake, which is a centralized repository for storing raw data from IoT devices.
4. Application Layer –
The application layer of IoT architecture is the topmost layer that interacts
directly with the end-user. It is responsible for providing user-friendly
interfaces and functionalities that enable users to access and control IoT
devices.This layer includes various software and applications such as mobile
apps, web portals, and other user interfaces that are designed to interact
with the underlying IoT infrastructure. It also includes middleware services
that allow different IoT devices and systems to communicate and share data
seamlessly.The application layer also includes analytics and processing
capabilities that allow data to be analyzed and transformed into meaningful
insights. This can include machine learning algorithms, data visualization
tools, and other advanced analytics capabilities.
Characteristics of IoT:
Massively scalable and efficient
IP-based addressing will no longer be suitable in the upcoming future.
An abundance of physical objects is present that do not use IP, so IoT is
made possible.
Devices typically consume less power. When not in use, they should be
automatically programmed to sleep.
A device that is connected to another device right now may not be
connected in another instant of time.
Intermittent connectivity – IoT devices aren’t always connected. In order to
save bandwidth and battery consumption, devices will be powered off
periodically when not in use. Otherwise, connections might turn unreliable
and thus prove to be inefficient.
Advantages of IoT :
5. Improved decision-making.
6. Cost savings.
Disadvantages of IoT :
9. Limited regulation and legal framework for IoT, which can lead to confusion
and uncertainty.
An IoT platform is a set of components that allows developers to spread out the
applications, remotely collect data, secure connectivity, and execute sensor
management. An IoT platform manages the connectivity of the devices and allows
developers to build new mobile software applications.
Internet of Things (IoT) Development Platforms
The giant Techno company has used the IoT platforms for efficiency. According
to Google, the Cloud Platform is the top part for encouraging IoT technology.
Moreover, with the utmost security system, Google Cloud offers complete
functioning effectively. Standing as one of the top Internet of Things Platforms,
it offers various fascinating features. For example, robust A.I. aptitudes, Fast
business procedures, Machine learning with vast capacity. Not only these, but
the Google Cloud IoT also increases the work rate of the devices. This platform
uses cloud amenities to lessen the cost and inspires location intelligence as
well. They mainly focus on effective, fast, and efficient ways to run your
business. In addition, the Google Cloud platform offers real-time
understandings of devices used worldwide. This Google platform makes files
maintenance and sharing easy. You can operate this IoT platform within any
operating system without any problems.
The Microsoft open-source Internet of Things platform allows you to build safe
and mountable edge-to-cloud results rapidly. As per the companies’ desires,
you can use this platform for developing your apps flexibly. It consists of the
boosted Artificial Intelligence solutions. The Microsoft Azure IoT Platform offers
ready-to-use tools, facilities, and models to develop the apps accordingly.
Undoubtedly, this platform protects the data and files from the cloud. The Azure
platform completely manages the databases safely. The best feature of this IoT
development Platform is the Azure IoT Edge. It has the ability to function the
apps even if you are offline. Moreover, this IoT is designed in such a way that
different industrial sectors can easily use it. No matter, it is a manufacturing
industry or transportation one.
Oracle IoT
Last but not least, IBM Watson IoT offers various features related to IoT
solutions. This offers a completely accomplished cloud service for device
management. Also, it provides utmost scalability and flexibility to connected
devices. The IBM Watson IoT platform helps you to collect data from several
sources like assets, buildings, automobiles, and others things. Moreover, it
possesses direct access to the newest data in the Cloudant NoSQL DB
solution. IBM has other fine features like collecting raw data and understanding
its patterns. This helps in taking out the treasured insights of the unstructured
data. Also, IBM supports the easy transfer of data workload to the clouds.
Moreover, this platform assists you to optimize the data and resources for your
profit.
In the retail context, BLE can be used with beacon technology to provide customer service like
in-store navigation. Beacons are essentially small transmitters that use BLE to transmit signals
to nearby IoT devices. By transmitting signals to nearby IoT devices, beacons can make
location-based searching and navigation much easier and accurate.
LPWANs
LPWANs (Low Power Wide Area Networks) are new sets of protocols developed for IoT
solutions but can also be used by other devices to communicate over a wide area. Even cellular
networks can provide a wide-area communication network, but the cost of communication over
cellular networks is high because of its high power consumption. LPWANs enable
communications over wide area with the help of small and inexpensive batteries that can last for
long-term making it a cost-saving option in comparison with cellular networks.
There are different types of licensed (NB-IoT, LTE-M) and unlicensed (MIOTY, LoRa) LPWANs
that are built differently for different purposes. While power consumption is one of the big
challenges for licensed LPWANs, Quality of Service (QoS) and scalability are some challenges
faced by unlicensed LPWANs.
Generally speaking, LPWANs can connect almost all types of sensors and enable data sharing
among themselves and with the cloud. With the help of LPWANs, IoT sensors can facilitate
numerous applications. For instance, sensors can allow remote monitoring of everything.
However, LPWANs can send only small blocks of data over the network in a single instance,
and it cannot send a large amount of data at a time.
Mesh protocols
A mesh usually refers to a rich interconnection network of devices that are made up of devices
organized in a mesh topology. Mesh topology is a networking infrastructure in which all
connected devices can cooperate to transfer and share data amongst each other.
ZigBee is one of the most popular mesh protocols used for IoT applications. It is a short-range,
low-power protocol that is commonly deployed to extend communication over multiple IoT
devices. When compared with LPWANs, ZigBee provides large data transfer at a single
instance but with much less power-efficiency due to mesh infrastructure.
Due to its short physical range, ZigBee and other similar mesh protocols are best suited for
medium-range IoT devices that are distributed within small areas. For instance, ZigBee
protocols can be best suited for smart home sensor networks like smart lighting.
WiFi/WiFi HaLOW
Everyone would know what WiFi is because of its pervasiveness in both industrial and home
environments. However, WiFi is not used with most of the IoT devices. Except for a few
applications like digital signages and security cameras, WiFi does not provide a feasible option
for IoT connectivity. The use of the WiFi network is limited in IoT devices, mainly because of its
low range, high power consumption, and low scalability. A lesser-known derivative of WiFi
known as WiFi HaLow is introduced for IoT devices. WiFi HaLow offers increased range and
improved power efficiency. However, the use of WiFi HaLow has received less support from
industries as the network offers low security.
RFID
RFID (Radio-frequency identification) uses radio waves to transfer small data packets over the
network within small areas. It is easy to embed an RFID chip in IoT devices. RFID readers can
then read the tags and give information about the product that is attached to tags. One of the
common applications of RFID is inventory management. By attaching RFID tags to all products
and connecting it to IoT devices, businesses can keep track of the number of products available
in stock. Thus RFID can help in better stock planning leading to an optimized supply chain
management. RFID tags can also help smart home IoT devices. For instance, a smart washing
machine that can read RFID tags can be controlled.
The use of IoT devices is increasing globally. According to an estimate, there will be 41.6 billion
IoT devices generating 79.4ZB (zettabytes) of data in 2025. Simultaneously the chances of
cyber-attacks on data may also increase. With the increased use of IoT devices and
vulnerability to cyber-attacks, it is time for businesses and other stakeholders to know and
choose IoT protocols and standards that can potentially keep the possibilities of cyber breaches
at bay. To choose the best IoT protocol for businesses means accurately weighing the criteria of
range, power consumption, bandwidth, latency, QoS, and security.
Cloud Computing provides us means of accessing the applications as utilities over the Internet.
It allows us to create, configure, and customize the applications online.
What is Cloud?
The term Cloud refers to a Network or Internet. In other words, we can say that Cloud
is something, which is present at remote location. Cloud can provide services over
public and private networks, i.e., WAN, LAN or VPN.
Cloud Computing refers to manipulating, configuring, and accessing the hardware and
software resources remotely. It offers online data storage, infrastructure, and application.
Physical Layer
Control Layer
Service Layer
Cloud computing is based on service models. These are categorized into three basic
service models which are -
Infrastructure-as–a-Service (IaaS)
Platform-as-a-Service (PaaS)
Software-as-a-Service (SaaS)
The Infrastructure-as-a-Service (IaaS) is the most basic level of service. Each of the service
models inherit the security and management mechanism from the underlying model
IaaS provides access to fundamental resources such as physical machines, virtual machines,
virtual storage, etc.
Platform-as-a-Service (PaaS)
PaaS provides the runtime environment for applications, development and deployment
tools, etc.
Software-as-a-Service (SaaS)
Benefits
Cloud Computing has numerous advantages. Some of them are listed below -
Portability
This is another challenge to cloud computing that applications should easily be migrated
from one cloud provider to another. There must not be vendor lock-in. However, it is not
yet made possible because each of the cloud provider uses different standard
languages for their platforms.
Interoperability
It means the application on one platform should be able to incorporate services from the
other platforms. It is made possible via web services, but developing such web services
is very complex.
Computing Performance
Data intensive applications on cloud requires high network bandwidth, which results in
high cost. Low bandwidth does not meet the desired computing performance of cloud
application.
It is necessary for cloud systems to be reliable and robust because most of the
businesses are now becoming dependent on services provided by third-party.
Distributed System
Types of Virtualization:
1. Hardware Virtualization.
2. Operating system Virtualization.
3. Server Virtualization.
4. Storage Virtualization.
Hardware Virtualization:
Usage:
Server Virtualization:
Usage:
Storage Virtualization:
Usage:
Storage virtualization is mainly done for back-up and recovery purposes.