IOT VTU - Module 3
IOT VTU - Module 3
Module 3:
IoT Processing Topologies and Types
Syllabus:
o DATA FORMAT:
Structured Data,
Unstructured Data
o IMPORTANCE OF PROCESSING IN IOT
o PROCESSING TOPOLOGIES:
On-Site Processing,
Off-Site Processing
Remote Processing,
Collaborative Processing
o IOT DEVICE DESIGN AND SELECTION CONSIDERATIONS
o PROCESSING OFFLOADING:
Offload Location,
Offload Decision Making,
Offloading Considerations
o SUMMARY
Check yourself topics:
Difference Between Microprocessors And Microcontrollers,
Network Bandwidth,
Network Latency
RISC Versus CISC Processors,
Volatile Versus Non-Volatile Memory
Text book:
1.SUDIP MISRA, ANANDARUP MUKHERJEE, ARIJIT ROY, “INTRODUCTION TO IOT”,
CAMBRIDGE UNIVERSITY PRESS 2021
Prepared by RAJA G V – Dept. of ECE, Sri Sairam College of Engineering, Anekal Page 1
Regulation – 2022 (CBCS Scheme) INTRODUCTION TO IOT - 22ETC15H
Prepared by RAJA G V – Dept. of ECE, Sri Sairam College of Engineering, Anekal Page 2
Regulation – 2022 (CBCS Scheme) INTRODUCTION TO IOT - 22ETC15H
Established languages such as Structured Query Language (SQL) are used for accessing these data in
RDBMS.
However, in the context of IoT, structured data holds a minor share of the total generated data over the
Internet.
3.1.2 UNSTRUCTURED DATA
In simple words, all the data on the Internet, which is not structured, is categorized as unstructured.
These data types have no pre-defined structure and can vary according to applications and data-
generating sources.
Some of the common examples of human-generated unstructured data include text, e-mails, videos,
images, phone recordings, chats, and others.
Some common examples of machine-generated unstructured data include sensor data from traffic,
buildings, industries, satellite imagery, surveillance videos, and others.
As already evident from its examples, this data type does not have fixed formats associated with it,
which makes it very difficult for querying algorithms to perform a look-up.
Querying languages such as NoSQL are generally used for this data type.
Prepared by RAJA G V – Dept. of ECE, Sri Sairam College of Engineering, Anekal Page 3
Regulation – 2022 (CBCS Scheme) INTRODUCTION TO IOT - 22ETC15H
Prepared by RAJA G V – Dept. of ECE, Sri Sairam College of Engineering, Anekal Page 4
Regulation – 2022 (CBCS Scheme) INTRODUCTION TO IOT - 22ETC15H
ON-SITE PROCESSING
As evident from the name, the on-site processing topology signifies that the data is processed at the
source itself.
This is crucial in applications that have a very low tolerance for latencies.
These latencies may result from the processing hardware or the network (during transmission of the
data for processing away from the processor).
Applications such as those associated with healthcare and flight control systems (real-time systems)
have a breakneck data generation rate.
These additionally show rapid temporal changes that can be missed (leading to catastrophic damages)
unless the processing infrastructure is fast and robust enough to handle such data.
Figure shows the on-site processing topology, where an event (here, fire) is detected utilizing a
temperature sensor connected to a sensor node.
The sensor node processes the information from the sensed event and generates an alert.
The node additionally has the option of forwarding the data to a remote infrastructure for further
analysis and storage
OFF-SITE PROCESSING
The off-site processing paradigm, as opposed to the on-site processing paradigms, allows for latencies
(due to processing or network latencies); it is significantly cheaper than on-site processing topologies.
This difference in cost is mainly due to the low demands and requirements of processing at the source
itself.
Often, the sensor nodes are not required to process data on an urgent basis, so having a dedicated and
expensive on-site processing infrastructure is not sustainable for large-scale deployments typical of
IoT deployments.
Prepared by RAJA G V – Dept. of ECE, Sri Sairam College of Engineering, Anekal Page 5
Regulation – 2022 (CBCS Scheme) INTRODUCTION TO IOT - 22ETC15H
In the off-site processing topology, the sensor node is responsible for the collection and framing of
data that is eventually to be transmitted to another location for processing.
Unlike the on-site processing topology, the off-site topology has a few dedicated high-processing
enabled devices, which can be borrowed by multiple simpler sensor nodes to accomplish their tasks.
At the same time, this arrangement keeps the costs of large-scale deployments extremely manageable.
In the off-site topology, the data from these sensor nodes (data generating sources) is transmitted
either to a remote location (which can either be a server or a cloud) or to multiple processing nodes.
Multiple nodes can come together to share their processing power in order to collaboratively process
the data (which is important in case a feasible communication pathway or connection to a remote
location cannot be established by a single node).
REMOTE PROCESSING
This is one of the most common processing topologies prevalent in present-day IoT solutions.
It encompasses sensing of data by various sensor nodes; the data is then forwarded to a remote server
or a cloud-based infrastructure for further processing and analytics.
The processing of data from hundreds and thousands of sensor nodes can be simultaneously offloaded
to a single, powerful computing platform; this results in massive cost and energy savings by enabling
the reuse and reallocation of the same processing resource while also enabling the deployment of
smaller and simpler processing nodes at the site of deployment.
This setup also ensures massive scalability of solutions, without significantly affecting the cost of the
deployment.
Figure shows the outline of one such paradigm, where the sensing of an event is performed locally,
and the decision making is outsourced to a remote processor (here, cloud).
However, this paradigm tends to use up a lot of network bandwidth and relies heavily on the presence
of network connectivity between the sensor nodes and the remote processing infrastructure.
Prepared by RAJA G V – Dept. of ECE, Sri Sairam College of Engineering, Anekal Page 6
Regulation – 2022 (CBCS Scheme) INTRODUCTION TO IOT - 22ETC15H
COLLABORATIVE PROCESSING
This processing topology typically finds use in scenarios with limited or no network connectivity,
especially systems lacking a backbone network.
Additionally, this topology can be quite economical for large-scale deployments spread over vast
areas, where providing networked access to a remote infrastructure is not viable.
In such scenarios, the simplest solution is to club together the processing power of nearby processing
nodes and collaboratively process the data in the vicinity of the data source itself.
This approach also reduces latencies due to the transfer of data over the network.
Additionally, it conserves bandwidth of the network, especially ones connecting to the Internet.
Figure shows the collaborative processing topology for collaboratively processing data locally.
This topology can be quite beneficial for applications such as agriculture, where an intense and
temporally high frequency of data processing is not required as agricultural data is generally logged
after significantly long intervals (in the range of hours).
One important point to mention about this topology is the preference of mesh networks for easy
implementation of this topology.
3.4 IOT DEVICE DESIGN AND SELECTION CONSIDERATIONS
The main consideration of minutely defining an IoT solution is the selection of the processor for
developing the sensing solution (i.e., the sensor node).
This selection is governed by many parameters that affect the usability, design, and affordability of the
designed IoT sensing and processing solution.
Prepared by RAJA G V – Dept. of ECE, Sri Sairam College of Engineering, Anekal Page 7
Regulation – 2022 (CBCS Scheme) INTRODUCTION TO IOT - 22ETC15H
In this chapter, we mainly focus on the deciding factors for selecting a processor for the design of a
sensor node.
The main factor governing the IoT device design and selection for various applications is the
processor.
However, the other important considerations are as follows.
SIZE:
This is one of the crucial factors for deciding the form factor and the energy consumption of a sensor
node.
It has been observed that larger the form factor, larger is the energy consumption of the hardware.
Additionally, large form factors are not suitable for a significant bulk of IoT applications, which rely on
minimal form factor solutions (e.g., wearables). Energy:
The energy requirements of a processor is the most important deciding factor in designing IoT-based
sensing solutions.
Higher the energy requirements, higher is the energy source (battery) replacement frequency.
This principle automatically lowers the long-term sustainability of sensing hardware, especially for
IoT-based applications.
Cost:
The cost of a processor, besides the cost of sensors, is the driving force in deciding the density of
deployment of sensor nodes for IoT-based solutions.
Cheaper cost of the hardware enables a much higher density of hardware deployment by users of an
IoT solution.
For example, cheaper gas and fire detection solutions would enable users to include much more
sensing hardware for a lesser cost.
Memory:
The memory requirements (both volatile and non-volatile memory) of IoT devices determines the
capabilities the device can be armed with.
Features such as local data processing, data storage, data filtering, data formatting, and a host of other
features rely heavily on the memory capabilities of devices.
However, devices with higher memory tend to be costlier for obvious reasons.
Processing power:
As covered in earlier sections, processing power is vital (comparable to memory) in deciding what
type of sensors can be accommodated with the IoT device/node, and what processing features can
integrate on-site with the IoT device.
The processing power also decides the type of applications the device can be associated with.
Prepared by RAJA G V – Dept. of ECE, Sri Sairam College of Engineering, Anekal Page 8
Regulation – 2022 (CBCS Scheme) INTRODUCTION TO IOT - 22ETC15H
Typically, applications that handle video and image data require IoT devices with higher processing
power as compared to applications requiring simple sensing of the environment.
I/O rating:
The input–output (I/O) rating of IoT device, primarily the processor, is the deciding factor in
determining the circuit complexity, energy usage, and requirements for support of various sensing
solutions and sensor types.
Newer processors have a meager I/O voltage rating of 3.3 V, as compared to 5 V for the somewhat
older processors.
This translates to requiring additional voltage and logic conversion circuitry to interface legacy
technologies and sensors with the newer processors.
Despite low power consumption due to reduced I/O voltage levels, this additional voltage and circuitry
not only affects the complexity of the circuits but also affects the costs.
Add-ons:
The support of various add-ons a processor or for that matter, an IoT device provides, such as analog
to digital conversion (ADC) units, in-built clock circuits, connections to USB and Ethernet, inbuilt
wireless access capabilities, and others helps in defining the robustness and usability of a processor
or IoT device in various application scenarios.
Additionally, the provision for these add-ons also decides how fast a solution can be developed,
especially the hardware part of the whole IoT application.
As interfacing and integration of systems at the circuit level can be daunting to the uninitiated, the
prior presence of these options with the processor makes the processor or device highly lucrative to
the users/ developers.
Prepared by RAJA G V – Dept. of ECE, Sri Sairam College of Engineering, Anekal Page 9
Regulation – 2022 (CBCS Scheme) INTRODUCTION TO IOT - 22ETC15H
Starting from the primary layer of sensing, we can have multiple sensing types tasked with
detecting an environment (fire, surveillance, and others).
The sensors enabling these sensing types are integrated with a processor using wired or
wireless connections (mostly, wired). In the event that certain applications require immediate
processing of the sensed data, an on-site processing topology is followed, similar to the one in
Figure.
However, for the majority of IoT applications, the bulk of the processing is carried out remotely
in order to keep the on-site devices simple, small, and economical.
Typically, for off-site processing, data from the sensing layer can be forwarded to the fog or
cloud or can be contained within the edge layer.
Prepared by RAJA G V – Dept. of ECE, Sri Sairam College of Engineering, Anekal Page 10
Regulation – 2022 (CBCS Scheme) INTRODUCTION TO IOT - 22ETC15H
The edge layer makes use of devices within the local network to process data that which is
similar to the collaborative processing topology shown in Figure
The devices within the local network, till the fog, generally communicate using short-range
wireless connections.
In case the data needs to be sent further up the chain to the cloud, long-range wireless
connection enabling access to a backbone network is essential.
Fog-based processing is still considered local because the fog nodes are typically localized
within a geographic area and serve the IoT nodes within a much smaller coverage area as
compared to the cloud.
Fog nodes, which are at the level of gateways, may or may not be accessed by the IoT devices
through the Internet.
Finally, the approach of forwarding data to a cloud or a remote server, as shown in the topology
in Figure,
requires the devices to be connected to the Internet through long-range wireless/wired
networks, which eventually connect to a backbone network.
This approach is generally costly concerning network bandwidth, latency, as well as the
complexity of the devices and the network infrastructure involved.
Prepared by RAJA G V – Dept. of ECE, Sri Sairam College of Engineering, Anekal Page 11
Regulation – 2022 (CBCS Scheme) INTRODUCTION TO IOT - 22ETC15H
1) Offload location (which outlines where all the processing can be offloaded in the IoT
architecture),
2) Offload decision making (how to choose where to offload the processing to and by how
much), and finally
EDGE:
Offloading processing to the edge implies that the data processing is facilitated to a location at or near
the source of data generation itself.
Offloading to the edge is done to achieve aggregation, manipulation, bandwidth reduction, and other
data operations directly on an IoT device.
Computation takes place at the edge of a device’s network, which is known as edge computing.
That means a computer is connected with the network of the device, which processes the data and
sends the data to the cloud in real-time.
That computer is known as “edge computer” or “edge node”
With this technology, data is processed and transmitted to the devices instantly.
Yet, edge nodes transmit all the data captured or generated by the device regardless of the importance
of the data.
Example of Edge computing:
Autonomous vehicle edge computing devices collect data from cameras and sensors on the vehicle,
process it, and make decisions in milliseconds, such as self-parking cars.
In order to accurately assess a patient’s condition and foresee treatments, data is processed from a
variety of edge devices connected to sensors and monitors.
FOG:
Fog computing is an extension of cloud computing. It is a layer in between the edge and the cloud.
When edge computers send huge amounts of data to the cloud, fog nodes receive the data and analyze
what’s important. Then the fog nodes transfer the important data to the cloud to be stored and delete
Prepared by RAJA G V – Dept. of ECE, Sri Sairam College of Engineering, Anekal Page 12
Regulation – 2022 (CBCS Scheme) INTRODUCTION TO IOT - 22ETC15H
the unimportant data or keep them with themselves for further analysis. In this way, fog computing
saves a lot of space in the cloud and transfers important data quickly.
Fog computing is a decentralized computing infrastructure that is utilized to conserve network
bandwidth, reduce latencies, restrict the amount of data unnecessarily flowing through the Internet,
and enable rapid mobility support for IoT devices.
The data, computing, storage and applications are shifted to a place between the data source and the
cloud resulting in significantly reduced latencies and network bandwidth usage.
Fog computing uses various protocols and standards, so the risk of failure is much lower.
Fog provides low latency.
Fog includes millions of small nodes.
Fog processing and storage are done on the edge of the network close to the source of information,
which is crucial for real-time control.
Fog acts as a mediator between data centers and hardware, and hence it is closer to end-users. If there
is no fog layer,
Fog architecture is distributed and consists of millions of small nodes located as close to client devices
as possible.
REMOTE SERVER:
A simple remote server with good processing power may be used with IoT-based applications to
offload the processing from resource constrained IoT devices.
Rapid scalability may be an issue with remote servers, and they may be costlier and hard to maintain
in comparison to solutions such as the cloud.
A Remote Desktop server allows users to work from any location – at home, on the road, or in the
office. A network connection is not required.
There is no additional hardware needed to link the remote user to the server. All that is needed is
access to the Internet and a web browser
CLOUD:
Cloud computing is a configurable computer system, which can get access to configurable resources,
platforms, and high-level services through a shared pool hosted remotely.
A cloud is provisioned for processing offloading so that processing resources can be rapidly
provisioned with minimal effort over the Internet, which can be accessed globally.
Prepared by RAJA G V – Dept. of ECE, Sri Sairam College of Engineering, Anekal Page 13
Regulation – 2022 (CBCS Scheme) INTRODUCTION TO IOT - 22ETC15H
Cloud enables massive scalability of solutions as they can enable resource enhancement allocated to a
user or solution in an on-demand manner, without the user having to go through the pains of acquiring
and configuring new and costly hardware
Cloud architecture is centralized and consists of large data centers that can be located around the globe, a
thousand miles away from client devices
If there is no fog layer, the cloud communicates with devices directly, which is time-consuming.
In cloud computing, data processing takes place in remote data centers
Cloud is more powerful than fog regarding computing capabilities and storage capacity
The cloud consists of a few large server nodes. Fog includes millions of small nodes.
A cloud system collapses without an Internet connection
Nodes are installed far away from the Nodes in this computing are installed closer to the
03. cloud. cloud (remote database where data is stored).
The power consumption of nodes is The power consumption of nodes filter important
09. low. information from the massive amount of data
Prepared by RAJA G V – Dept. of ECE, Sri Sairam College of Engineering, Anekal Page 14
Regulation – 2022 (CBCS Scheme) INTRODUCTION TO IOT - 22ETC15H
Edge computing helps devices to get Fog computing helps in filtering important
faster results by processing the data information from the massive amount of data
simultaneously received from the collected from the device and saves it in the cloud
10. devices. by sending the filtered data.
Prepared by RAJA G V – Dept. of ECE, Sri Sairam College of Engineering, Anekal Page 15
Regulation – 2022 (CBCS Scheme) INTRODUCTION TO IOT - 22ETC15H
Game theory is a common example of the bargaining based approach. This approach does not need to
depend on historical data for decision making purposes.
Bargaining theory is the branch of game theory dealing with the analysis of bargaining problems, in
which some parties bargain over the division of certain goods.
Game theory studies interactive decision-making, where the outcome for each participant or "player"
depends on the actions of all.
If you are a player in such a game, when choosing your course of action or "strategy" you must take into
account the choices of others.
Learning based approach:
Unlike the bargaining based approaches, the learning based approaches generally rely on past
behavior and trends of data flow through the IoT architecture.
The optimization of QoS parameters is pursued by learning from historical trends and trying to
optimize previous solutions further and enhance the collective behavior of the IoT implementation.
The memory requirements and processing requirements are high during the decision making stages.
The most common example of a learning based approach is machine learning.
OFFLOADING CONSIDERATIONS
There are a few offloading parameters which need to be considered while deciding upon the offloading
type to choose.
These considerations typically arise from the nature of the IoT application and the hardware being
used to interact with the application. Some of these parameters are as follows.
Bandwidth:
The maximum amount of data that can be simultaneously transmitted over the network between two
points is the bandwidth of that network.
The bandwidth of a wired or wireless network is also considered to be its data-carrying capacity and
often used to describe the data rate of that network.
The maximum amount of data transmitted over an internet connection in a given amount of time.
Bandwidth is often mistaken for internet speed when it's actually the volume of information that can
be sent over a connection in a measured amount of time – calculated in megabits per second (Mbps).
Bandwidth is an important factor when it comes to determining the quality and speed of a network or
internet connection
Latency:
It is the time delay incurred between the start and completion of an operation. In the present context,
latency can be due to the network (network latency) or the processor (processing latency).
Prepared by RAJA G V – Dept. of ECE, Sri Sairam College of Engineering, Anekal Page 16
Regulation – 2022 (CBCS Scheme) INTRODUCTION TO IOT - 22ETC15H
In either case, latency arises due to the physical limitations of the infrastructure, which is associated
with an operation.
The operation can be data transfer over a network or processing of a data at a processor.
Latency can be measured one way, for example, the amount of time it takes to send a request for
resources, or the length of the entire round-trip from the browser's request for a resource to the moment
when the requested resource arrives at the browser
Latency is the literal time it takes for a packet of data to go from its origination and reach its
destination.
The measurement of latency is measured in milliseconds. Just 50 milliseconds of latency — a time of less
than one-tenth of a second — can result in poor network and application performance
Criticality:
It defines the importance of a task being pursued by an IoT application.
The more critical a task is, the lesser latency is expected from the IoT solution.
For example, detection of fires using an IoT solution has higher criticality than detection of agricultural
field parameters.
The former requires a response time in the tune of milliseconds, whereas the latter can be addressed
within hours or even days.
Critical Internet of Things (IoT) connectivity is an emerging concept in IoT development that enables
more efficient and innovative services across a wide range of industries by reliably meeting time-
critical communication needs
Time-critical IoT applications (e.g., industrial control, digital twins, robotics, autonomous systems, and
immersive/interactive environments) Safety-critical applications, requirements, and fail-safe protocols.
Time coordinated computing and communications
Resources:
It signifies the actual capabilities of an offload location.
These capabilities may be the processing power, the suite of analytical algorithms, and others.
For example, it is futile and wasteful to allocate processing resources reserved for real-time
multimedia processing (which are highly energy-intensive and can process and analyze huge volumes
of data in a short duration) to scalar data (which can be addressed using nominal resources without
wasting much energy).
Data volume:
The amount of data generated by a source or sources that can be simultaneously handled by the offload
location is referred to as its data volume handling capacity.
Prepared by RAJA G V – Dept. of ECE, Sri Sairam College of Engineering, Anekal Page 17
Regulation – 2022 (CBCS Scheme) INTRODUCTION TO IOT - 22ETC15H
Typically, for large and dense IoT deployments, the offload location should be robust enough to
address the processing issues related to massive data volumes
3.6 SUMMARY
This chapter started with an overview of the various data formats available on the Internet and to
which various IoT solutions are exposed.
The complexities in handling the numerous data formats available present a significant challenge to
the design of IoT-based solutions. In order to address these challenges, the importance of processing
in IoT is discussed.
This discussion is followed by an introduction to various processing topologies, which can be chosen
to address the challenges of IoT processing.
These topologies are broadly made up of two categories: 1) On-site processing and 2) Off-site
processing.
The off-site processing is typically composed of approaches to offload data to locations which are not
the same as the one from which the data was generated.
A discussion on processing offloading follows these topologies. Various offload location types, means
of deciding offload location and quantity are explained.
Finally, the various parameters to be considered for offloading are discussed to enable the reader to
grasp the nuances of processing in IoT.
Prepared by RAJA G V – Dept. of ECE, Sri Sairam College of Engineering, Anekal Page 18
Regulation – 2022 (CBCS Scheme) INTRODUCTION TO IOT - 22ETC15H
A good download speed is at least 100 Mbps, and a good upload speed is at least 10 Mbps.
With 100 Mbps, you can watch Netflix or YouTube, attend Zoom meetings, and play most online
games on several devices at the same time
Network Latency:
Latency can be measured one way, for example, the amount of time it takes to send a request for
resources, or the length of the entire round-trip from the browser's request for a resource to the moment
when the requested resource arrives at the browser
Latency is the literal time it takes for a packet of data to go from its origination and reach its
destination.
Prepared by RAJA G V – Dept. of ECE, Sri Sairam College of Engineering, Anekal Page 19
Regulation – 2022 (CBCS Scheme) INTRODUCTION TO IOT - 22ETC15H
Prepared by RAJA G V – Dept. of ECE, Sri Sairam College of Engineering, Anekal Page 20
Regulation – 2022 (CBCS Scheme) INTRODUCTION TO IOT - 22ETC15H
Contents of Volatile memory are stored Contents of Non-volatile memory are stored
2.
temporarily. permanently.
In volatile memory, data can be easily In non-volatile memory, data cannot be easily
5. transferred in comparison to non-volatile transferred in comparison to volatile
memory. memory.
In Volatile memory, process can read and In Non-volatile memory, process can only
6.
write. read.
Volatile memory generally has less storage Non-volatile memory generally has more
7.
capacity. storage capacity than volatile memory.
In volatile memory, the program’s data are In non-volatile memory, any kind of data
8. stored which are currently in process by the which has to be saved permanently are
CPU. stored.
Volatile memory has a huge impact on the Non-volatile memory has a huge impact on a
10.
system’s performance. system’s storage capacity.
Volatile memory chips are generally kept on Non-volatile memory chips are embedded on
12.
the memory slot. the motherboard.
Prepared by RAJA G V – Dept. of ECE, Sri Sairam College of Engineering, Anekal Page 21
Regulation – 2022 (CBCS Scheme) INTRODUCTION TO IOT - 22ETC15H
Advantages- Advantages-
Fast speed More reliable
13. Low power consumption Stores data permanently
Better system performance as it Inexpensive memory
increases speed Helps in booting of operating system
storing operations, similar to how a multiplication command will handle evaluating, loading,
and storing data, which is why it’s complicated.
Prepared by RAJA G V – Dept. of ECE, Sri Sairam College of Engineering, Anekal Page 22