0% found this document useful (0 votes)
5 views29 pages

Iot Unit 3

The document outlines the integration of IoT and web technologies, covering topics such as web servers for IoT, data communication, cloud computing benefits, and various communication protocols like MQTT and CoAP. It emphasizes the role of cloud computing in enhancing IoT capabilities and discusses tools like Node-RED for programming IoT applications. Additionally, it differentiates between Machine-to-Machine (M2M) and IoT communications, highlighting their respective protocols and use cases.

Uploaded by

siddheshkale8199
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
5 views29 pages

Iot Unit 3

The document outlines the integration of IoT and web technologies, covering topics such as web servers for IoT, data communication, cloud computing benefits, and various communication protocols like MQTT and CoAP. It emphasizes the role of cloud computing in enhancing IoT capabilities and discusses tools like Node-RED for programming IoT applications. Additionally, it differentiates between Machine-to-Machine (M2M) and IoT communications, highlighting their respective protocols and use cases.

Uploaded by

siddheshkale8199
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 29

UNIT;III loT and Web

3
CHAPTER

UniversityPrescribed Syllabus

data between web


IT Web:Web&
server for loT, Sending/Receiving

& loT device, Cloud for loT, Node RED, M2M Vs loT
eanuer

Basics of WSNs, WSN architecture and


Communication Protocols,

types,
used in the
applications
Applications : Modern loT case studies /
loT

agriculture,
health care.etc
areas of transportation,

purpose and definition, Edge


Edge Computing : Edge computing Edge
hardware architectures,
computing use cases, Edge computing
Models - Edge,
Computing, Communication
platforms, Edge vs Fog
Fog and M2M.

3.1 IOT & WEB

3.1.1 Web Server for IoT


uses HTTP
that
hardware
A web server is software and to respond
and other protocols
(Hypertext Transfer Protocol)
Wide Web.
to client the World
requests made over
website
content
is to display
The server users.
webpages to
main job of a web
and delivering
through storing, processing
loT Technologies (MU-S.Y. B.Sc. Comp-Sem 4)
(loT &
Web)
..Page
a 3.1.2 Sending / Receiving Data
Server and IoT Device between Web
Web server respond to the client
request in
following two ways: eitherof
the
Sending the file to the client associated with
URL. the
requested
Generating response by invoking a script and
with database.
communicating

Static
data storage Applicatiorn
data store

Static data Static data


request response Application Server
Servlet request

Web Sever
Web oontaine
Servlet response
HTTP HTTP
request response Other sevices

Web cient

Fig. 3.1.1

When client sends request for a web page, the web server

search for the requested page if requested page is found then

it will send it to client with an HTTP response.


If the requested web page not found, web server will
is the

send an HTTP response: Error 404 Not found.

If client has requested for some other resources then the weð

server will contact to the application server and data store to

construct the HTTP response.


a 3.1.3 Cloud for IoT
Internet
of
of the
One component that improves the success users
enables
Things is Cloud Computing. Cloud computing the
over
using services provided
to perform computing tasks
Internet.

Publications..A
SACHIN SHAH Venu
(Q4-08) Tech-Neo
B.Sc. Comp-Sem 4)
(loT & Web) ...Pageno...(3-3)
(MU-S..Y,

oTTechnologies
of the Internet of Things in conjunction with cloud
use
The become kind
has a
of catalyst: the Internet of
technologiescloud computing are now related to each other.
and
Things
aretrue technologies of the future that will bring many
These
benefits.
the rapid growth
of technology, the problem of storing,
Due to
and accessing large amounts of data has arisen.
processing,
relates to the mutual use of the Internet of

Great innovation
and cloud technologies. In combination, it will be
Things
to use powerful processing of sensory data streams
possible
services.
and new monitoring
As an example, sensor data can be uploaded and saved using
cloud computing for later use as intelligent monitoring and

activation using other devices. The goal is to transform data


into insights and thus drive cost-effective and productive

action.

S Benefits And Functions of IoT


Cloud

There are many benefits of combining these services

(1) IoT Cloud Computing provides many connectivity options,


a wide range of
implying large network access. People use
mobile
devices to gain access to cloud computing resources:
but
devices, tablets, laptops. This is convenient for users
creates the problem of the need for network access points.
on-demand. In other
(2) Developers can use loT cloud computing
permission
words, it is a web service accessed without special
is Internet access.
or any help. The only requirement
to
(8) Based on the request, users can scale the service according
their needs. Fast and flexible means you can expand storage
with the number of
Space, edit software settings, and work
Users. Due to this characteristic,it is possible to provide deep
computing power and storage.
pooling of resources. It
*loud Computing implies the
builds close connections
ntluences increased collaboration and
between users.

(Q4-08) Publications...A SACHIN


SHAH Venture
Tech-Neo
loT Tehnologies (MU-S.Y. B.Sc. Comp-Sem 4)
(loT &
WNeb)
(5) As the number of IoT devices
and )Pag0
security concerns emerge. Cloud automation
in
with reliable authentication solutions u8e
and provide
Finally, IoT cloud encryption grows,
(6)
computing is protocols.companies
exactly as much from the convenient
service as
costs vary depending on use: the you pay. because
This youget.
statistics. A growing
provider
network of measures mneans
that
objects with
needed to connect to the IP your
Internet and usage
the components of the network. exchange addresses data is

A 3.1.4 Node RED between

Node-RED is a
programming tool foor
hardware devices, APIs and wiring
online
services in together
interesting ways.
neW and
It provides a
browser-based editor that
makes it
together flows using the wide easy to
range of nodes in wire

that can be deployed to its runtime the


in a palette
single-click.
It is developed by IBM Emerging
Technology
it is a free source programming instrument, organization and
A
NODE-RED stream works by passing messages
between
hubs. The messages in NODE-RED
are straightforward
JavaScript objects that can have any arrangement of

properties.

Installing NODE-RED
Installing with npm (Nodepackage manager)

sudonpm install -g --unsafe-perm node-red

Installing with docker

docker run -it -p 1880:1880 -name


mynoderednodered /node-red

Installing with snap

sudo snap install node-red

SACHIN SHAH Ve
s..A

(Q4-08) L9 Tech-Neo Publication


B.Sc. Comp-Sem 4) (loT & Web) ..Page no..(3-5)
(MU-S.Y.
Technologies
oT
NODE-RED
Running Node-RED establishment and introduetory
the
When can used. Three ways to run
is finished, it be

arrangement
NODE-RED:
Locally

On a device

In the identified cloud environment

Protocols
M2M vs IoT Communication
A 3.1.5

IS M2M
to Machine communication. It is a
MOM stands for Machine
the devices using wired
direct communication system between
without any human
or wireless communications channels

interaction.

the data and shares it with other connected devices.


It collects
without the use of the
It is technology that allows devices
a
internetto connect between devices.
as monitoring and
defence,
Various applications, such
tracking, production and facility management, are provided by
M2M communications.

S loT Communication Protocols

(1)MQTT (Message Queue Telemetry Port)

open Source
MQ Telemetry Transport (MQTT) an
publish/subscribe messaging transport protocol is designed
high
for power constrained devices and low-bandwidth,
latency networks. .

and for connecting small


It is lightweight in nature is ideal

devices to constrained networks.

Itensures reliability and assurance of delivery toa larger


extent.

"The protocol on topics and hence the receivers of


is based
Une messages can make sense of the data without even
knowing who the sender is.

(Q4-08) SHAH Venture


Tech-Neo Publications...A SACHIN
loT Technologies(MU-S.Y. B.Sc. Comp-Sem 4)
(loT &
This kind of behaviour
Neb).Pago
and low bandwidth encourages
networks which usage of of h noo..(0)
which
of the M2M and IoT seems to b
communication be
high-ateney
(2) COAP channels. the
(Constrained Application Protocoly NOrn
CoAP or the
Constrained
specialized web transfer Application
protocol that Protocol
constrained nodes is is a
and constrained
It is
designed for networksinsuitable for
M2M applications such
IoT.
and building as
automation. smart
Based on REST energy
model like HTTP, in
make resources CoAP also the
available under a
access these URL, and servers
resources using clients
POST, and DELETE. methods such as can
GET DI

Like HTTP, itcan also carry


and different
is
able to integrate types of
with XML, payloads
data format of
your
JSON, CBOR, or
choice. any
The strong security
which makes capabilities of CoAP is
it a desired another factor
choice among the
protocols. available IoT

Designed to use minimal


on the network it works resources, both on the
device and
on microcontrollers with as low as
10KiB of RAM and 100 KiB of code space
(RFC7228).
(3)OMA LWM2M (Open
Mobile Alliance Light Weight
M2M)
LWM2M is a light weight
protocol developed by Open
Mobile Alliance and is specifically for
device and service
management.
The device management includes device statistics,
firmware update, access controls etc.
It helps in
implementing an interface between M2M device
and M2M Server and also provides a choice for the M2M
Service Provider to deploy an M2M system to provide
service to the M2M user.
loT Technologies (MU-S.Y. B.Sc, Comp-Sem 4)
(loT &
This kind of
behaviour &Web)Page
and low bandwidth encourages
networks usage of

of the M2M and IoT which


seemsto be
communication
(2) COAP channels.
high-daterney
the
(Constrained Application
Protocol) norTmn

CoAP theor
Constrained
specialized web transfer Application
protocol Protocol
constrained nodes and that is
constrained
Itis designed networks insuitable
for M2M applications IoT. for
and building such as
automation. smart
Based on RESTmodel like energy
HTTP, in
make resources CoAP also
available under a the
access these URL, and servers
resources using clients
methods such
POST,and DELETE. can as
GET,
Like PUT,
HTTP, it can also. carry different
and able to integrate
is types of
with XML, JSON. payloads
data format of your CBOR, Or
choice. any
The strong security
capabilitiesof CoAP is
which makes it a another facto
desired choice
protocols.
among the available Ioh

Designed to use minimal


on the network it works resources, both on the device and
on
10KiB of RAM and 100 KiBmicrocontrollers with aslow 8s
of code space (RFC
7228).
(3)OMA LWM2M (Open Mobile
Alliance Light Weight M2M)
LWM2M is a
light weight protocol
developed by Open
Mobile Alliance and is specifically for
device and service

management.
The device management includes device statistics,

firmware update, access controls etc.

It helps in implementingan interface between M2M device


and M2M Server and also provides a choice for the MZM
Service Provider to deploy an M2M system to provide
service to the M2M user.

(Q4-08) Tech-Neo Publications..A SACHIN SHAH Ventue


(MU-S.Y. B.Sc. Comp-Sem 4) (loT & Web) ....Page no.. (3-7)

Technologies
1oT

helps to implement an interface between M2M


LWM2M
device
and M2M Server and also provides a choice for the

M2M Service Provider to deploy an M2M system to offer

serviceto the M2M user.,


between IoT and M2M
Difference

Basis ot
IoT M2M
Internet of Things Machine to Machine
Abbreviation

Devices have objects Some degree


Intelligence
that are responsible of intelligenceis
for decision making observed in this.

type The connection is via The connection is a


Connection
used Network and using point topoint
various

communication
types.

Communication Internet protocols Traditional protocols


are used such and communication
protocol used
asHTTP, FTP, technology

and Telnet. techniques are used

Data Sharing Data is shared Data is shared

between other with only the

applications that are communicating

used to improve the parties.


end-user experience.

Internet Internet connection Devices are not

is for dependent on the


required
communication Internet.

Type of It supports cloud It supports


Communication communication point-to-point
communication.

(Q4-08) Tech-Neo Publications...A SACHIN SHAH Venture


loT Technologies (MU-S.Y. B.Sc. Comp-Sem 4)
(loT &
W
Web)
Basis of ..Page
IoT
no..(0)
Computer Involves the usage M2M
of
System both Mostly
Hardware and
Software. based hardware
technology
Scope A
large
number of
devices yet Limited
scope is Scope
devices, for
large.

Business Type Business 2


used
Business(B2B) and
Business 2Business
(B2B)
Business 2

Open API
support

Examples
Consumer(B2C)
Supports
integrations.

Smart
Open |
API There is
no
for Open
APIs
support

wearables,Big
Sensors, Data and
Data and Cloud, etc.
Information, etc.
A 3.1.6 Basics of WSNS

A Wireless Sensor Network


is one kind of
wireless network
that includes a large
number of circulating, self-directed.
minute, low powered devices named sensor nodes called
motes.

These networks certainly cover a huge number of spatially

distributed, little, battery-operated, embedded devices that


are networked to caringly collect, process, and transfer data to

the operators, and it has controlled the capabilities of

computing & processing. Nodes are tiny computers, which


work jointly to form networks.

The sensor node is a multi-functional, energy-efficient wireless

device. A collection of sensor nodes collects the data from the


surroundings to achieve specific application objectives.

IM

(Q4-08V HAL Tech-Neo Publications..A SACHIN SHAH Venture


B.So. Comp-Sem (loT Web) ..Page no...(3-9)

4)
&
(MU-S.Y.
Tochnologies
loT

Fig. 3.1.2

The communication between motes can be done with each


In a wireless sensor network, the
other using transceivers.
order of hundreds/ even
number of motes can be in the
n/ws, Ad Hoc networks will
thousands. In contrast with sensor
have fewer nodes without any structure.

a 3.1.7 WSN Architecture and Types


network architecture
The most common wireless sensor
Model. The architecture of the
follows the OSI architecture
WSN includes five layers and three cross layers.
namely
Mostly sensor n/w, we require five layers,
in
The
n/w, data link & physical layer.
application, transport,
power management, mobility
three cross planes are namely
These layers of the WSN
management, and task management.
n/w and make the sensors work
are used to accomplish the
the complete efficiency of the
together in order to raise
network.

Types of WSN Architectures


The architecture used in WSN is sensor network architecture.
applicable in different places such
This kind of architecture is
as well as it is used in
as hospitals, schools, roads, buildings
disaster
differentapplications such as security management,
management & crisis management, etc.

Publications...A SACHIN
SHAH Venture
(Q4-08) Tech-Neo
loT Technologies
(MU-S.Y. B.Sc. Comp-Sem 4)
(loT &
There are two types Web)
of )Pag
go
networks which include architectures used no...
the in
(10)
wireless sensor following.
architectures: There wirelesB
and Clustered Layered are 2
Architecture. Bensor
below. These are Network types of
explained
as
Architecture,
(1) Layered
Network Architecture following
(2) Clustered
Network Architecture

(1)Layered Network
Architecture
This kind of
network uses
hundreds of
a base station. Here the sensor
nodes as
done into arrangement of well as
concentric layers. network
nodes can
It comprises five be
layers as well as 3
the following. cross layers
which
The five layers in the incude
architecture are:
Application Layer

Transport Layer

Network Layer
Data Link Layer

Physical Layer

The three cross layers include the


following:
Power Management Plane
Mobility Management Plane
Task Management Plane
These three cross layers
are mainly used for
controlling the
network as well as to make
the sensors function as one in
order to enhance the
overall network
efficiency.
The application layer is liable for traffic management and
offers software for numerous applications that convert the
data in a clear form to find positive information

(Q4-08) P Tech-Neo Publication..A SACHIN SHAH Venture


(MU-
lanologies

Task

Mobility
Layer
Application Power

Layer
Transport

Management
Network Layer

Management
Plarne
Management
Plane
Data Link Layer
Plane

Physical Layer

Layer
Fig. 3.1.3 : Application
in
numerous applications
arranged in
networks
Sensor military, environment,
fields such
as agricultural,
different

medical, etc.

8 Transport Layer is to deliver congestion


of the transport layer to
The function
where a lot of protocols intended
reliability
avoidance and the upstream.
are either practical on
offer this function
for loss recognition
use dissimilar mechanisms when
These protocols is exactly needed
The transport layer
and loss recovery.
networks.
to contact other
a system isplanned

Network Layer has a lot


layer isrouting, it
The main function of the network tasks are
in
the main
but,
oftasks based on the application, and sensor
buffers,
the power conserving, partial
memory,

don't have a universal ID and have


tobe self-organized.
Data Link Layer data frame
The for multiplexing
data link layer is liable confirm
error control,
detection, data streams, MAC, &
the multipoint.
reliability
(or) point-
of
point-point

SACHIN SHAH Venture


(Q4-08) Publications...A
Tech-Neo
loT Technologies (MU-S.Y. B.Sc. Comp-Sem 4)
(\oT &
Web)
n9
Physlcal Layer 12
The physical layer provides an
edgefor
of bits above the physical
medium. Thistransferring a
for the selection of layer
frequency, generation is streatm

frequency, signal detection, Modulation & of responsible


a
IEEE 802.15.4 is suggested astypical data Carrier
for encryption.
areas &
wireless sensor low rate
networks with
consumption, density, the range low particular
of cost,
the battery life. CSMA/CA is used to communication power
to
support star &improve
peer topology
peerto
(2)Clustered Network Architecture
In this kind architecture, separately
of
sensor
groups known as clusters which depend nodes add
on the into
Protocol" because it uses clusters.
Leach
The term Leach Protocol'
stands for "Low
Clustering Hierarchy". The main Energy
Adaptive
properties of this
mainly include the following. protocol

-Sensor Node

Cluster

Data Flow

Base Station

Fig. 3.1.4

This is a two-tier hierarchy clustering architecture.


sensornodes
This distributed algorithm is used to arrange the
into groups, known as clusters.

(Q4-08) B Tech-Neo Publications..A


SACHIN SHAH Venture
Comp-Sem 4) (loT & Web) ...Pageno... (3-13)
Y. B.Sc.
(MU-S.
formed separately, the head nodes of

which is
prTochnOlogles
cluster
create
the TDMA (Time-division multiple
every will
In
cluster
the
plans.
access)

JOT APPLICATIONS

used in the Transportation


Applications of
3.2.1 a wide network
incorporates
transportation objects and other
in actuators, smart
IoT
sensors, data about the real-
embedded network collects
This software
devices.
it over the specialized
intelligent and transmits
world scenario information.
that data into useful been
totransform sector have
the transport and
of

The operations of IoT enabled technologies


with the help
revolutionized
is
Smart solutions. urban areas
system in the
the transportation vehicle population
Furthermore,
day by day as the the
becoming more
complex the need of
This highlights
is increasing. to have
on the road IoT in transportation
to integrate benefits.
municipalities
and secure transportation
access to greater and advanced
of secure
Considering
the importance IoT's important and
discusses
this article the Current
transportation, are revolutionizing
that
applications
common
transport sector.

(1) Efficient Traffic Management within the


segment
is the biggest of IoT
Traffic management the adoption
where Million
industry
transportation most prominent.
to be the data
is observed and vehicle-related
echnologies of traffic
and Billions of Gigabytes
through CCTVcameras.
are being generated centers for
management
to traffic the car
This data is transferred and punishing
vehicles
look at the regulations.
keeping a closer rules and
the traffic
oWners who are violating
Venture
SACHIN SHAH
(Q4-08) L9 Tech-Neo Publications..A
tof Teshnolsgres (MU-8.Y,B So
Comp-Sem 4)
(\oT
Smart parking, Web)
autonmatie
Acident
ABRAtAnce are thernfle light
help the traflie few
and ayatem
traffieefficiently patrolling npplications of
and officera
(2) Automated reducing
the riak In
Toll and of
Tlcketlng
mannging
The traditional accidenta. he
tolling and
becoming outdated but ticketing
effective for Othey are systems
assisting the also are
road. current flow not not
Unly
of proving
With the to b
increased vehicles
number onthe
booths of
have vehicles on
become busy the
highways and
and the drivers crowded as roadà,
thetoll
waiting for their turn. have to spend well
a
on
lot the
The toll of
booths do time
not have
manpower to enough
to immediately assist
traditional tolling many resources
and
and ticketing vehicles.
transportation offers Compared
RFID tags and automated tolls. systems, IoT
With in
other smart the
ticketing sensors, help of
have become managing toll
much easier and
officers. for
traffic
police
The majority of
advanced vehicles
connectivity. Any vehicle nowadays have
which might be IoT
from the tolling a
kilometer
station can away
easily be
help of IOT detected with the
technologies. This
traffic barriers for enables the lifting of
the
the vehicles to pass
through.
However, the older
vehicles do
not have IoT
but the smartphones connectivity.
of the car owners
can servethe same
purpose as well, that is,
taking automatic payments
through phones linked to the digital wallet.
This indicates that IoT in
transportation is much more
flexible and is compatible with new vehicles and

demonstrate easy integration with older vehicles as well,


for automated toll and ticketing
procedures.

(Q4-08) Tech-Nec Publications.. A SACHIN SHAH Venture


Comp-Sem 4) (loT & Web) ....Page no... (3-15)
B.Sc.
Y.
(MU-S.

Tachnologies
Cars
or autonomous vehicles are the coolest
cars
sel-driving
Self-driving have been introduced in the transportation
that
decades, the concept of self-driving
things In the past
but this has been turned into
industry. like a dream,
just
Was with the support of IoT technologies.
Cars reality
aninnovative of moving sensing
capable safely
cars are
by

Self-driving with little or no human interaction.


environment,
the data about the surrounding, self-
to gather
However, of sensors.
wide range
cars use
a

driving
car uses acoustic sensors.
Cor instance, the self-driving
(Light detection and
sensors, radar, LiDAR
ultrasonic
and GPS sensors to have information
camera
ranging),
and take the data-driven decision
about the surroundings the
accordingly. This indicates that
about mobility
loT
cars is dependent on
functioning of self-driving
sensors.
self-driving
sensors equipped in the
With the help of IoT,
in
the data about the surrounding
cars continuously gather
unit or
data either to a central
real-time and transfer this
cloud.
seconds,
data in a fraction of
The system analyses the
per the
cars to perform as
enabling the self-driving
the
This indicates that IoT connects
information provided.
cars and enables them
to
sensor network for self-driving
function in the desired manner.

Monitoring
(9) Advanced Vehicle Tracking or Transportatlon
systems
Vehicle tracking or transportation monitoring
many businesses to manage their
have become the need of
effectively. With the
help
ieets and supply chain processes
companies have smooth
O GPS trackers, transportation
facts and figures about the
access to real-time location,
vehicle.

(Q4-08) SHAH Venture


Tech-Neo Publications..A SACHIN
loT Technologles
(MU-S.Y, B.So. Comp-Sem 4)
(loT &V
Web)
This enables the .Page
important transportation
assets in companies to no...15

monitoring, loT devicesreal-time. Apart monitor


can also Erom their
behavior and can
inform about monitor
time. the location
the
driving
style
In fleet anddrivets
management systems, IoT idling
operating and fuel has
expenditures along
maintenance. As far minimized
with
as the
concerned, then transportation the
it can
be said cost of
that
made the implementation real-timemonitoring

enabling the drivers


of
smart decisions tracking is
to identify
the issues much has
immediately and take in the easier,
precautions
A 3.2.2
Applications used in the
where
necessary.
vehicle

IOT systems
Agriculture
play an
important role
monitoring and give for
a proper solution crop
and
IOT leads to accordingly. soil
smartfarming.
waste and
Using IOT,farmers
increase can
productivity. The minimize
monitoring of fields system allows
with the help
monitor the status of of sensors. the
the area. Farmers on

There are
various uses of IOT in
follows:
agriculture that
are as
(1)IOT analytics
in agriculture
The data from
smart sensors
can be further
automated analyzedfor
decision-making and
predictive analysis.
Machine learning
and predictive
for farmers to analysis will be
cope up with the helpful
drought, weather conditions
flood,etc. such as
(2)
Drone-based uses

qls. Drones are als0


useful in
smart farming.
ijoo drones are useful to On one side,
monitor the soil,
and on another air, moisture quality,
side, they
can also be used
activities
such as for physical
prevention of
farms, physical breakouts in
automated
spraying of fertilizers,and
many more.
(Q4-08)
9 Tech-Neo
Publications..A SACHIN SHAH Ven
Y, B.Sc. Comp-Sem
4) (loT & Web) ....Page no.. (3-17)
(MU-S.

oTTochnologies there are sonme limitations of using a drone, but


Although toreducethe manual workforce.
useful
itis
monitoring
crop
Real-time smart-motion sensing
detectors, light
detectors,
Motion are useful to provide real-time data
Snmart sensors
sensorS,
of their farms,
tofarmers
in the monitoring of the quality of their
will
be helpful
It

products.

(4)
Smart
: Irrigation system

parts of smart agriculture usingIOT. In it, IOT


isone of the
It
the farmer the moisture
the Vater lanes created by or
checks
level in the environment,

x 3.2.3 IoT in the healthcare


IoT technology brings numerous applications in healthcare,

from remote monitoring to smart sensors to medical device


It keeps the patients safe and healthy as well as
integration.
improves the physician delivers care towards the patients.

Healthcare devices collect diverse data from a large set of real

world cases that increases the accuracy and the size of


medical data.

Prsšaet CaunextlriLy
Inttascuctere

10T
Healthcare System
Architecture

AppllçatoA
Matfor

Diagusstic
EvestBssed Astloa
Poxitiv

Fig. 3.2.1
(Q4-08)
Tech-Neo Publications...A SACHIN SHAH Venture

2
loT Technologies (MU-S.Y. B.Sc.Comp-Sem 4) (oT &
Web)
..Page no...
The application of the Internet of (3-18)

transforms it into more smart, fast


Things (IoT
in )
and more
IoT architecture in healthcare
is different accurate, T
healthcare
health care system. that There
brings
start
Product Infrastructure: IoT
product
bardware/software infrastructure
component read the such
sensors as
display them to a dedicated device. signals

Sensors : IoT in healthcare has


different
and

as pulse-oximeter, sensors
electrocardiogram, devices
thermometer, such
sensor, sphygmomanometer
(blood pressure) il1uid
that level
current patient situation (data).

Connectivity
Bluetooth,
:
WiFi,
IoT system
etc.)
provides better
of
read
the

devices connectivity
(using
microcontroller to server and

Analytics :
Healthcare system
and correlates to get analyzesthe data
from
sensors
vice-versa to read data from

healthy parameters of
the basis of their the patient sensors
analyze data they can and on
health. upgrade the
patient

Application Platform :IoT system access


healthcare professionals information
on their monitor to
patients with all details. device for all

Fig. 3.2.2 :IoT in Healthcare - a concept

(Q4-08) Tech-Neo Publications..A SACHIN SHAH Venture


rechnOI

EDGE COMPUTING:

computing purpose and definition


Edge
3.3.1

f Edge
Computing
computing
is the processing and computing
of client data
centralized server or a
source rather than
a
Edge
data
to the
closer
location.
cloud-based
computing resources,
edge computing brings
At its simplest, closer to where the
and enterprise applications
storage,
consume the information.
data

actually
people
Computing
S Purpose of Edge
an loT system with a local source of
provides
Bdge computing The IoT device
and computing.
storage,
data processing, server.
and sends it to the edge
gathers data
of the local
analyzes data at the edge
Meanwhile, the server scalable data
faster, more readily
network, enabling

processing. data
usual design that involves sending
When compared to the system
for analysis, an IoT edge computing
to a central
server
has : IoT device
between the
of communication
Reduced latency
and the network.
increased operational
times and
Faster response
efficiency.
the system
bandwidth consumption as
Smaller network storage or
the cloud for long-term
data to
only streams
analysis. loses
even if the system
The ability to continue operatingcentral server.
the cloud or the
connection with way to use the
cost-effective
Edge computing is an efficient, risking
network
without
Internet of Things at scale
overloads.

SACHIN SHAH Venture


(Q4-08) Publications.A
BTech-Neo
loT Technologies (MU-S.Y. B.So. Comp-Sem 4)
((oT & Web)
business relying on IoT edge
A
Pago no.
also lowers (320)
data breach. If
someone breaches the
potential

the intruder will only have access impact of


to local an edge a
what happens if someone
hacks a raw device,
central data
The same "smaller blast server). (unlike
radius" logic
data leaks and similar applies to
threats to
data
Additionally, edge computing integrity. accidental
offers a layer
mission-critical IoT tasks. If a of
single local redundancy for
other edge servers and IoT unit
devices can goes
without issues.
There are no single go on down,
points of
bring all operations down to a
halt. failure operating
that can

3.3.2 Edge Computing Use Cases


(1) Much of the technology we use today for
business,from content delivery entertainment
and
systems and smart
to gaming, 5G, or predictive
maintenance, technology
form of edge computing incorporates SOme
technology. Streaming music
and wids
platforms, for example, often
cache information
latency, offering more network to lower
flexibility when it comes to ees
trafficdemands.
(2) Manufacturers benefit from
edge computing by keeping a
closer eye on theiroperations. Edge computing enables
companies to closely monitor equipment and production
lines
for efficiency and, in some cases, detect
failures before they
happen, helping avoid costly delays due to downtime.
(3) Similarly, you can
also see edge computing being used in
healthcare to look after patients, giving physicians more real
time insight into people's health without the need to send their
information to third-party database for processing.
Elsewhere, oil and gas companies can keep watch of their

assets and avoid costly complications.


(4) Smart home construction uses edge computing solutions as
well. More and more devices need to communicate and process

data in a localized network, especially devices like voice

assistants. Without the help of decentralized processing power,


Amazon Alexa and Google Assistant would take far more time
to find requested answers for users.

(Q4-08) 9 Tech-Neo Publications...A SACHIN SHAH Venture


4) (loT & Wet)
B.Sc. Comp-Sem
(MU-S.y
ogies
Hardware Architectures
Edge computing
3.3 EdgeComputing Architecture

Cloud
server

Layer
ad
Bo
prDcessing
dala
warehousing
bola
LAN'NAN

ServerEdge Node Serrer


Edge Node
Layer &buffer
reduction Edge Node/Server
Edge
„nata
and
processing
caching
nata response
Control

Virtualization

B)
Layer
Devise
andcontrollers
Sensor
Fig.3.3.1

of the
simply means the edge
architecture
An edge-computing the network vary
present at the edge of
devices be
network. The A mobile phone can
the functionalities.
based upon
the edge.
employed at network etc. Edge
at the edge of the
A router can be employed which can perform temporary data
those devices
comprises of before sending
the actual
storage
processing
and temporary
and processing.
to the cloud for further storage
data an edge is
an edge device and
between
The communication computing
provides data
edge gateway. Edge
by an a Edge is
facilitated data.
to the source of
nearer rest of the
capabilities and the
between the core network
demarcation
network in an edge computing environment.
edge architecture
connect the
as an interface to devices
1 just acts The
or cloud environment.
fog domain
With either be capable of providing
should
which are employed atthe edge
services.
storage and computing
Y.
Sc.
B.
C
(MU-S.
at a dístance from the
Tochnologios can be artual
loT network depending upon the
of a of the
cases,
rese
The edge In most the edge can be just a h
available,
edgedevice. collectingthe data.
and bandwidth
main edge device,
time the from
distance
Platformns
Edge by reducing the
3.3.4 up analysis forth. latency
speeds and
computing data back
Edge in moving cloud and
data center
systens,
involved on the as

time data sources and


pressure devices
eases to support
It also have in addition
perimeter, tothe
no longer enterprise
they
theimmediate
outside environment. of things (IoT)use
connected for internet
directly is beneficial wireless and situated in
computing are typically
Edge
loT devices as
cases
drivesedge computing
locations. by:
remote platform the
computing processing
away from central

An edge data
real-timne
Enabling
cloud
or data center. the data close to the edge
and optimizing
buffering,
Caching,
LoTinto a
or IoT system. by edge devices and
device received
the data
Transforming for analysis.
can be processed
format that
Edge Computing Data center
Cloud

Machine to

DataCaching machine
Realtime
Buffering optimization
data processing
computing
platfom
Edge
Basic analytics

Edge Devicesor IOT

Fig. 3.3.2

Venture
SHAH
(Q4-08) Tech-Neo Publications...A SACHIN
(MU-S.Y. B.Sc. Comp-Semn
Web) no..(3-23)

4)
TAchnologles (loT & ....Page

The key features of an edge


computing platform include the
following :

Edge application support

Applications have to be
edge. You might want
specifically designed to run on the
to port
the to edge
cloud existing applications from

develop edge environments, or you might


native want to
applications,
The platform you
choose should
suite. It may comewith its
also development
integrate with
app delivery third-party
through services for
(APIs). application
programming interfaces
-2 Analytics insights

Since edge
endpoints are
challenging to distributed in
maintain control nature, it can be
and visibility
Therefore, the over time.
platform must
dashboard to include
monitor all an analytics
edge devices in
environment and use your IT
telemetry to
locations. collect data
Typically, edge from remote
central hub to computing platforms
maintain the
observability of
will have a
3.
Cloud to
edge key metrics.
infrastructure
Most
enterprises do not run
fully
deployment. Instead, the greenfield
edge environment edge
extension to the acts as
primary cloud and an
efficienciesby can often
offloading unlock cost
edge. workloads firom the
cloud to the
The
platform you choOse should
streamline
provisioning, cloud to
ideally through edge
infrastructure as
techniques to drive code
consistency automation.
Edge
security

Security is a significant concern the edge


at

processing happens as data


in a location far away from
IT team. thecentral

Tech-NeoPublica
Cor
B.Sc.
(MU-S.Y.
platform should
Technologies conmputing have
loT edge enforce to
why your that you can manage
That's protocols data flow between
security
built-in and govern edge
access also integrate
edge network platform may third-party
tools
The monitoring
devices. and security
services
security

IoT enablement case for edge computing in


5. use
the primary allow IoT
IoT is Edge platforms devices

environments. actions locally


enterprise carry out automated
data and
to process
time.
losing any latency
without to look for specific IoT
is advisable
Therefore,
it
as an IoT marketplace,
such
features,
enablement experience in IoT
tools, and prior
containerization

deployments.

3.3.5 Edge vs Fog Computing

IS Edge Computing
of a device's network
place at the edge
Computation takes
edge computing.
which is known as
the network of the
a computer is connected with
That means the data to the
processes the data and sends
device, which as edge
comnputer is known
cloud real-time. That
in
node".
computer" or "edge
S Fog Computing
of cloud computing. It is a layer
Fog computing is an extension
cloud. When edge computers send
in between the edge and the
nodes receive the data
huge amounts of data to the cloud, fog
and analyze what's important.

Then the fog nodes transfer the important data tothe cloud
to

be stored and delete the unimportant data or keep them with


themselves for further analysis.

In this way, fog computing saves a lot of space in the cloud and

transfers important data quickly.

(Q4-08) Tech-Neo Publications..A SACHIN SHAH Venture


E B.Sc. Comp-Sem 4) (loT & Web)....Page no... (3-25)
(MU-S.Y.

eTTechnologies
Between Edge Computing and
Difference
2 3.3.6 Fog Computing

FogComputing
Edge Computing

NO
than scalable when
scalable fog Highly
Less
1.
compared to edge
computing.
computing.

of nodes are
of nodes are Millions
Billions
2.
present.
present.

Nodes in this computing


Nodes are installed far away
3. the
are installed closer to
from the cloud.
cloud(remote database

where data is stored).

is
is a Fog computing
4. Edge computing
of cloud
of fog computing. subdivision
subdivision
computing.

The bandwidth
5. The bandwidth requirement
requirementis high. Data
very low. Because data
is
originating from edge
comes from the edge nodes
nodes is transferred to the
themselves.
cloud.

cost is
6. Operational
Operational cost is higher.
comparatively lower.

probability of data
7. Attacks on The
High privacy.
attacks is higher.
data are very low.

8. the Fog is an extended layer of


Edge devices are

inclusion of the IoT devices cloud.

or client's network.

(Q4-08) Tech-NeoPublications..A SACHIN SHAH Venture


loT Technologles (MU-S.Y. B.Sc. Comp-Sem 4)
& Web)
(loT

.Pago
Sr. EdgeComputing no...
(3)
No. Fog
Computing
9. The power consumption of
The power
nodes is low.
nodes consumption
flter of

information important
from
massive the
amount of
collected data
from the
and saves device
it in
the
high. filter

10. Edge computing helps Fog


devices to get faster results in computing
helps
filtering
by processing the data information important
from
simultaneously received the
massive
from the devices. amount of data
collected from
the device
and saves it in
the cloud
by sending
the filtered
data.

a 3.3.7 Communication Models -Edge, Fog an M2M


S Edge Computing
Computing at the edge means
pushing data processingout to
the edge of the
network, where data is
generated. Any edge
device like a router,
sensor, or smart device can do Edge
Computing. Each device has its own role in procesing
information.

Edge Computing may have no affiliation


with a cloud or a
server and can exist as a standalone
machine. Typically, Edge
Computing devices are used in Machine-to-Machine
(M2M)
systems that are closed. Typical functions of Edge
Computing
include: data aggregation, denaturing, filtering ae
scrubbing, and anomaly detection,The intent is to reduce cosu

and latency and control network bandwidth.

(Q4-08) Tech-Neo Publications. A SACHIN SHAH Ventu


Comp-Sem
4) (loT & Web)..Pageno...(3-27)
Y, B.Sc.
(MU-S.

Tcnoloies

Computing to where the data is and pushes


computing
BFog capabilities closer to where the
colocates processing
Fog and
intelligence
originates.
Edge Computingin that fog has an
data
from
processed and stored
cloud services. Data is
differs
Fog with There
is transmitted back.
pertinent data
node and
association
between the actual sensor device
at afog fog nodes
multiple
be itself.
could center
cloud data
andthe the actions of an Edge Computing
all
perform the
devices workloads between
Fog
are flexiblein partitioning
but also offers
device,
data centers. Fog Computing
and cloud the
fog
nodes
software frameworks, making
the benefits
of well-defined
and developer.
to the user
transparent
fog and cloud amount of data
reduce the
Computing
Both Fog and Edge and the cloud,
between sensors
being sent back-and-forth network bandwidth.
and conserving
saving time and power, will be valuable
both Fog and Edge Computing
Ultimately,
solutions
as IoT expands.
computing

3 M2M
machine to machine,
and is a
stands for
be
M2M quite simply one that can
concept, though
straightforward when it
relatively
to extremely complex
from very simple
everything
comes to its implementation. can communicate
with
how machines human
n short,M2M is about requiring
without necessarily important
One another, It's a hugely
the information. home
to relay seen in any
ddleman and can be
technology that's now ubiquitous
or office. doesn't
it
because
primarily
M2M is not new technology, digital
a
or complex
any wireless technologies
actually require
devices.

Venture
SACHIN SHAH
(Q4-08) Tech-NeoPublications..A
loT Technologies (MU-S.Y. B.Sc. Comp-Sem 4)
(loT
&Web)
....Page
A wired connection between no...

considered an M2M two (320)


machines
connection, and indeed can
cerations of this tec still
technology used be
phone lines tothe very
However, in the irst
modern world,
machines that M2M communicate.
communicate Usually
networkS. Inthis using things
like refers to
article, we're going WiFi or
technology underpins totake a mobile
world.
M2M, and how look at
it's
applied in the what
the real

Chapter
Ends...

J'a

lstiyi

You might also like