0% found this document useful (0 votes)
225 views25 pages

IOT Unit-1 (R20 DS)

Uploaded by

Manohar Manu
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
225 views25 pages

IOT Unit-1 (R20 DS)

Uploaded by

Manohar Manu
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 25

UNIT- I

Introduction to Internet of Things

1. INTRODUCTION to IOT

The Internet is basically a global network of connected standard devices like computers, mobiles & tablets that
is governed by standard protocols. Through the Internet, people can share information and communicate from
anywhere with an Internet connection.

Things means a physical object, an action or idea, a situation or activity.

Internet of Things (IoT) is a network of physical objects or people called “things” that are embedded with
software, electronics, network, and sensors that allows these objects to collect and exchange data.

Benefits or advantages of IoT:

• improved accuracy
• efficiency and economic benefit with reduced human intervention.
• Improved Customer Engagement
• Technical Optimization
• Reduced Waste.

Disadvantages of IOT:

• Security Concerns: The interconnected nature of IoT devices raises significant security challenges. ...
• Privacy Issues: ...
• Complexity in Implementation: ...
• High Initial Costs: ...
• Data Overload: ...
• Limited Standardization
Applications of IOT:

• Home Lighting
• Wearable Technology
• Smart phones
• Home and Applocations
1
• Personal computers
• Healthcare
• Online shopping etc

IOT Vision: the vision of IOT is where things (wearable watches, alarm, clocks, home devices, surrounding
objects) become ‘smart’ and function like living entities by sensing computing and communicating systems. A
vision where embedded devices interact with remote objects or persons through connectivity, for examples, using
Internet or Near Field Communication or other technologies.

Example of IOT: Smart Umbrella:

The umbrella, embedded with a circuit for the purpose of computing & communication connects to the internet.
A website regularly publishes the weather report. The umbrella receives these reports each morning, analyses the
data and issues reminders to the owner at intermittent intervals around his/ her office going time. The reminder
can be distinguished using differently coloured LED flashes such as red flashes for hot & sunny days , yellow
flashes for rainy days.

A reminder can be sent to the owner’s mobile at a pre-set time before leaving for office using NFC, Bluetooth or
SMS technologies.

The message can be i) protect yourself from rain, it is going to rain

ii) protect yourself from the sun, it is going to be hot & sunny. Know the owner can decide to carry or not to carry
the umbrella.

2. IOT ARCHITECTURAL VIEW

IOT World Forum architectural committee published 7-layer IOT architectural reference model in 2014. This
committee was led by cisco, IBM, Rockwell automation, & others. In this architecture edge computing, data
storage & access were included.

The IoT Architecture generally comprises of 7 layers.


2
Layer 1: Physical devices & control layer: which converts analog signals into digital data and vice versa. The
is the initial stage of any IoT system consists of wide range of “things” or endpoint devices that act as a bridge
between the real and digital worlds. They vary in form and size, from tiny silicon chips to large vehicles. this
layer consisting of the “things” themselves and the sensors, machines, actuators and Edge Node devices. it gathers
the data from environment & surroundings.

Sensors such as probes, gauges, meters, and others. They collect physical parameters like temperature or
humidity, turn them into electrical signals, and send them to the IoT system. IoT sensors are typically small and
consume little power.
Actuators, translating electrical signals from the IoT system into physical actions. Actuators are used in motor
controllers, lasers, robotic arms.
achines and devices connected to sensors and actuators or having them as integral parts.

Layer 2: Connectivity layer: enabling data transmission

The second level is used for communications across devices, networks, and cloud services. This layer includes
the mapping of field data to the logical and physical technologies used as well as the backhaul to the on premise
or cloud and the next layer, Edge Computing.

This layer is responsible for reliable communication & transmission of data between the devices & networks. The
connectivity between the physical layer and the cloud is achieved by using a single solution or multiple

3
technologies, depending on the need. It may be wired (Ethernet, NFC, LPWAN (Low-power Wide-area
Network) or wireless (WiFi, Bluetooth ) technologies.

Layer 3: Edge or fog computing layer: reducing system latency

Edge computing is the practice of processing and computing client-side data close to the data source, rather than
moving it to a central server or cloud-based location. It brings computing resources, data storage, and enterprise
applications closer to where people or devices actually consume an application or data .

Edge computing occurs on gateways, local servers, or other edge nodes scattered across the network. At this level,
data can be:

• evaluated to determine if it needs further processing at higher levels,

• formatted for further processing,

• decoded,

• filtered, and

• redirected to an additional destination

Layer 4 :Data accumulation:

Data accumulation stage: This stage, As the sensor data keeps changing with time, L4 layer converts this data
in motion to data in rest. Data accumulation layer stores the data in an easy accessible format. The layer
dramatically reduces data through filtering and selective storing.

4
Layer 5: Data Abstraction

Data abstraction is the process of reducing multiple data to simplified version without altering the meaning.
Whereas in Semantic representation, the data is represented in a meaningful form which can be understood by
human.

Layer 6: Application Layer

At this layer, information is analyzed by software to give answers to key business questions. There are hundreds
of IoT applications that vary in complexity and function, using different technology stacks and operating systems.
by using some applications we can analyze the data. This application is varying on data & depends on business
needs. For ex: aarogya sathu app.

Layer 7: Collaboration and Processes:


At this layer, application processing is presented to users, and data processed at lower layers is integrated in to
business applications. This layer is about human interaction with all of the layers of the IoT system and where
economic value is delivered. The challenge at this layer is to effectively leverage the value of IoT and the layers
of infrastructure and services below and leverage this into economic growth, business optimization and/or social
good.

3. IOT Design methodology


IoT Design Methodology that includes:

1. Purpose & Requirements Specification:


The first step in IoT system design methodology is to define the purpose and requirements of the system. In this
step, the system purpose, behavior and requirements (such as data collection requirements, data analysis
requirements, system management requirements, data privacy and security requirements, user interface
requirements, ...) are captured.

5
System Management Requirements: system should remotely provide monitoring and control functions
Data Analysis Requirements: The System should perform local analysis of the data.
Application Deployment Requirement : Deployed locally on device, but acts remotely without manual
intervention.
Security: Authentication to Use the system must be available
2.Process Specification:
In this step, the use cases of the IoT system are formally described based on and derived from the purpose and
requirement specifications.
3. Domain Model Specification:
Describes the main concepts, entities and objects in the domain of IoT system to be designed • It defines the
attributes of the objects and relationships between them •
4. Information Model Specification:
Information Model defines the structure of all the information in the IoT system, for example, attributes of Virtual
Entities, relations, etc. Information model does not describe the specifics of how the information is represented
or stored.
5. Service Specifications:
Service specifications define the services in the IoT system, service types, service inputs/output, service
endpoints, service schedules, service preconditions and service effects.
6
6. IoT Level Specification:
define the IoT level for the system. we defined 7 IoT deployment levels
7. Functional View Specification:
The Functional View (FV) defines the functions of the IoT systems grouped into various Functional Groups
(FGs). Each Functional Group either provides functionalities for interacting with instances of concepts defined in
the Domain Model or provides information related to these concepts.

8.Operational View Specification:


In this step, various options pertaining to the IoT system deployment and operation are defined, such as, service
hosting options, storage options, device options, application hosting options, etc
9. Device & Component Integration:
The ninth step in the IoT design methodology is the integration of the devices and components.
10. Application Development:
The final step in the IoT design methodology is to develop the IoT application.

4.IoT Device Capabilities

Each IoT device provides one or more capabilities or features or functions to achieve one or more goals.
The 4 necessary IOT capabilities are

1. Transducer capabilities :
A transducer converts a signal from one physical structure to another.
It converts one type of energy into another type. It might be used as actuator in various systems.
7
Transducer capabilities interact with the physical world and serve as the edge between digital and physical
environments. Transducer capabilities provide the ability for computing devices to interact directly with physical
entities of interest. Every IoT device has at least one transducer capability. The two types of transducer capabilities
are:

(i)Sensing: Sensors are used for sensing things and devices etc.
A device that provides a usable output in response to a specified measurement.
The sensor attains a physical parameter and converts it into a signal suitable for processing (e.g. electrical,
mechanical, optical) the characteristics of any device or material to detect the presence.

The output of the sensor is a signal which is converted to a human-readable form like changes in characteristics,
changes in resistance, capacitance, impedance, etc.

(ii)Actuating: An actuator is a device that converts energy into motion. It does this by taking an electrical signal
and combining it with an energy source.Examples of actuating capabilities include heating coils, cardiac electric
shock delivery, electronic door locks, unmanned aerial vehicle operation, servo motors, and robotic arms.

8
2.• Data capabilities :
Data capabilities are typical digital computing functions involving data: data storing and data processing.
3 • Interface capabilities:
Interface capabilities enable device interactions (e.g., device-to-device communications, human-to-device
communications). The types of interface capabilities are:
Application interface: the ability for other computing devices to communicate with an IoT device through an
IoT device application. An example of an application interface capability is an application programming interface
(API).

Human user interface: the ability for an IoT device and people to communicate directly with each other.
Examples of human user interface capabilities include keyboards, mice, microphones, cameras, scanners,
monitors, touch screens, touchpads, speakers, and haptic devices.

Network interface: the ability to interface with a communication network for the purpose of communicating
data to or from an IoT device—A network interface capability includes both hardware and software €Examples
of network interface capabilities include Ethernet, Wi-Fi, Bluetooth, Long-Term Evolution (LTE), and ZigBee.
Every IoT device has at least one enabled network interface capability and may have more than one.

4.• Supporting capabilities :

Supporting capabilities provide functionality that supports the other IoT capabilities. Examples are device
management, cyber security, and privacy capabilities.

5.NETWORKS USED IN IOT

IoT network is the network with physical interconnected objects embedded with sensors, smart devices that
connect and exchange data with other devices and systems without human intervention.

The choice of the network for an IoT application depends on factors such as

• The coverage area


• Power consumption
• The density of the objects
• Amount and nature of data
• Costs
• Security
• The device environment, etc.
9
Four types of IoT wireless networks:

6.M2M COMMUNICATION

Machine-to-machine is a term for technology that lets machines talk to each other and do things without people
helping them.
Communication in M2M may be wired or wireless systems. The communication Protocols are 6LowPAN,
LWM2M, MQTT, XMPP. Each communication device is assigned 48-bits Ipv6 addresses
Examples of M2M communication in this case would be vending machines sending out inventory information or
ATM machines getting authorization to despense cash.

How M2M Works:


Any form of M2M comes in four parts. The first part is made up of the sensors for gathering data. In a SCADA
system, these could be temperature gauges, RFID tags, and other technologies. In an IoT system, these could be
smart devices like a smart thermometer or the motion sensors in a smart security system.

The second component of M2M is some method for transferring that data. Many M2M systems use cellular
networks for real-time data transfer over long distances.

The third component would be a method for storing, reviewing, or analyzing that data

10
The fourth component is a method for acting on that data. This is what actuators are for. Actuators
automatically respond to the data to perform an action. One example of an actuator is the internal electric switch
in a smart heater, which could turn the heater on or off automatically depending on the information received
from the sensors in the IoT system.

Machine-to-machine (M2M) communication allows machines and devices to pass along small amounts of
information to other machines.

M2M refers to networking of machines for the purpose of remote monitoring and control and data exchange. As
in above fig M2M system consists of M2M area networks, communication network and application domain.
An M2M area network comprises of machines which have embedded hardware modules for sensing , actuation
and communication. Various communication protocols can be used for M2M local area networks such as Zigbee,
Bluetooth, m-bus, wireless m-bus, plc etc. these communication protocols provide connectivity between M2M
nodes within an M2M area network.

The communication network provides connectivity to remote M2M area networks. The communication network
can use either wired or wireless networks. While the M2M area network use non-ip based communication
protocols, the communication network uses ip based networks. Since to translate from non-ip to ip based protocols
, M2M gateways are used.
M2M Architecture:

11
M2M architecture consists of Three domains
• M2M Device domain,
• M2M network
• M2M Application domain

M2M Devices Domain Communication: Device domain Provide connectivity between M2M Devices and
M2M Gateways, e.g. personal area network.

it consists of three entities: physical devices, communication interface and gateway. Sensors and communication
devices are the endpoints of M2M applications. Sensors or devices sense the data from environment and send to
the gateway via connectivity interface. Generally, devices can connect directly to an operator’s network, or they
will probably interconnect using WPAN technologies such as ZigBee or Bluetooth. communication interface is a
port or a subsystem, which receives the input from one end & sends the received data to another. The gateway
module provides control & localization service for data collection. Gateways and routers are the endpoints of the
operator’s network in scenarios where sensors and M2M devices do not connect directly to the network.

M2M network domain: It provides the communications between the M2M Gateway(s) and M2M application(s),
it uses wired or wireless networks such as LTE, WiMAX, Satillite communication and WLAN.

It consists of M2M server, device identity, device and device-network management, Data Analysis, Abstraction,
Accumulation, and Management similar to IOT level. (connect+collect+assemble+analyse).

12
M2M Application domain: consists of applications for services, monitoring, analysis & controlling of devices
networks. Here data goes through various app. Services & is used by the specific business processing engineer.

The key features of a typical M2M connection:

• Very low power consumption. This is done to prevent unnecessary power loss.

• It allows you to monitor events via its monitoring abilities.

• Enables the machine to send and receive data at specified time intervals.

• Geo-specific alerts that wake up specific devices when they enter pre-defined areas.

• A network operator may be present to provide packet-switching services.

• Data transfers may be delayed, meaning an M2M connection has time tolerance.

• M2M connections are known for having the ability to receive and send small packets of
data continuously.

Challenges in M2M:

• Security: Ensuring the confidentiality, integrity, and authenticity of the communicated data is a critical
concern.
• Interoperability: As the number of connected devices from different manufacturers increases, ensuring
interoperability becomes essential.
• Standardization: Adoption of common standards for communication protocols helps facilitate seamless
interactions between diverse devices.
• Scalability: Designing systems that can scale to accommodate a large number of devices while
maintaining performance is a challenge.

Applications of M2M:

• Utility Companies. All utility companies use M2M communication for the objective of bringing in power
products and invoicing consumers. ...
• Traffic control. ...
• Telemedicine. ...
• Security in Businesses. ...
• Telemetry.

13
DIFFERENCE BETWEEN M2M and IoT:

Basis IoT M2M


Abbreviation Internet of Things Machine to Machine
Communicates directly between
Communication IoT sensors automation
machines
The connection is via using various
Connection Point to Point Connection
communication types

Communication Communication technology techniques


HTTP, Ftp, Telnet, etc are used
protocols and traditional protocols are used.

Objects are responsible for decision Observation of some degree of


Intelligence
making intelligence
Hardware and Software based
Technology Hardware-based technology
technology
Devices can be connected through
Data Delivery Depending on Internet protocol
mobile or other networks
Devices do not rely on internet
Internet Connection Active Internet connection is required
connection
Many users can connect at a time over Communicate with a single machine at
Scope
the Internet a time
B2C(Business to Customers) and Only B2B(Business to Business) is
Business Type
B2B(Business to Business) used
Open API support IoT supports open API Integrations M2M does not support open API

Data is shared with applications that Data is shared with the communication
Data Sharing
tend to improve the end-user experience parties themselves.

7.Fundamental of IoT’s
The fundamentals of IOT are:
• Connectivity: Devices in IoT are connected to the internet, allowing them to communicate with each
other and with central systems.
• Sensors and Actuators: Sensors collect data from the physical environment, while actuators perform
actions based on received data.
• Data Processing: IoT involves the processing of large volumes of data, often in real-time or near-real-
time, to derive meaningful insights.

14
• Communication Protocols: Various communication protocols, such as MQTT, CoAP, and HTTP,
facilitate data exchange between IoT devices and platforms.
• Security: Security is crucial to protect IoT devices, data, and communication channels from
unauthorized access and cyber threats.
IOT devices
A device is a hardware unit that can sense aspects of its environment and/or perform tasks of its environment.
They are small-scale embedded processing microcontrollers with On-chip RAN and flashmemory,I/O
capabilities and networking interfaces that are integrated on System-On-a-Chip(SOC)
Characteristics of Devices:
• Microcontroller
• Powersource
• Sensors and Actuators
• Communication
• Operating System
• User Interface
• Device Management
Types of Devices:
Basic Devices:
Devices that only provide the basic services of sensor reading, and/or actuate and provide limited support for
user interaction.
Examples:
Home alarms
Smart meters
Building Automation Systems.
Advanced Devices:
Devices that only provide the basic services of sensor reading, and/or actuate and provide limited support for
user interaction and also host the application logic and a WAN connection.
Examples:
Onboard units in cars
Robots
Video camera
Connected Printers.

15
8.Internet of Things (IoT) Gateways
A Gateway is a hardware device that is used to connect two dissimilar type of networks. It allows us to send /
receive data through the internet.
Gateway provides bridge between different communication technologies which means we can say that a
Gateway acts as a medium to open up connection between cloud and controller(sensors / devices) in Internet
of Things (IoT). By the help of gateways it is possible to establish device to device or device to cloud
communication. A gateway can be a typical hardware device or software program.
It enables a connection between sensor network and Internet along with enabling IoT communication, it also
performs many other tasks such as this IoT gateway performs protocol translation, aggregating all data, local
processing and filtering of data before sending it to cloud, locally storing data and autonomously controlling
devices based on some inputted data, providing additional device security.

Block Diagram of IOT gateway

Key functionalities of IoT Gateway :


• Establishing communication bridge
• Provides additional security.
16
• Performs data aggregation.
• Pre processing and filtering of data.
• Provides local storage as a cache/ buffer.
• Data computing at edge level.
• Ability to manage entire device.
• Device diagnostics.
• Adding more functional capability.
• Verifying protocols.
Working of IoT Gateway :
1. Receives data from sensor network.
2. Performs Pre processing, filtering and cleaning on unfiltered data.
3. Transports into standard protocols for communication.
4. Sends data to cloud.
5. We can’t access the internet without a gateway
IoT Gateways are key element of IoT infrastructure as Gateways establish connection for communication and
also performs other task as described above. So IoT Gateway is one of most essential thing when we start think
about an IoT ecosystem.

9.DATA MANAGEMENT
In the context of the Internet of Things (IoT), data management refers to the processes and technologies used to
handle the vast amount of data generated by IoT devices. IoT involves the interconnection of various physical
devices, sensors, and actuators through the internet, enabling them to collect and exchange data. Managing this
data efficiently is crucial for deriving meaningful insights, making informed decisions, and optimizing IoT
systems.

17
Here are key aspects of data management in IoT:

1. Data Collection: IoT devices continuously generate data from sensors and other sources. Data
management involves the collection of this raw data in real-time or near-real-time from diverse sources.
2. Data Storage: Storing the massive volumes of data generated by IoT devices requires scalable and
efficient storage solutions. Traditional databases may not be suitable for handling the variety, velocity,
and volume of IoT data. Technologies such as NoSQL databases, time-series databases, and distributed
storage systems are often used.
3. Data Processing: IoT data often needs to be processed in real-time to extract valuable insights and
respond to events promptly. Stream processing and complex event processing are commonly employed
for real-time analytics.
4. Data Integration: IoT environments typically involve a variety of devices and platforms, leading to
data silos. Data integration ensures that data from different sources can be combined and analyzed
cohesively. This may involve standardizing data formats and protocols.
5. Data Security: Given the sensitive nature of IoT data, security is a critical concern. Data management
in IoT includes implementing robust security measures to protect data during collection, transmission,
storage, and processing.
6. Data Analytics: Extracting meaningful information from IoT data involves the use of analytics tools
and techniques. This can include descriptive analytics, predictive analytics, and prescriptive analytics to
understand past trends, predict future events, and suggest actions.
7. Data Governance: Establishing policies and procedures for data quality, privacy, and compliance
ensures that IoT data is reliable and adheres to regulatory requirements. This involves defining roles and
responsibilities, data access controls, and auditing mechanisms.
8. Scalability: As the number of IoT devices and the volume of data increase, a scalable data management
infrastructure is essential. This includes the ability to scale storage, processing, and analytics capabilities
to meet growing demands.

Efficient data management in IoT is crucial for unlocking the full potential of connected devices, enabling
organizations to make informed decisions, improve operational efficiency, and create innovative solutions.

10.Business processes in IoT

18
• It consists of a series of activities, which serves a particular result. BP is used when an enterprise has a
number of interrelated processes which serve a particular goal. Which results enable sales, planning &
production.
• The BP is a representation or process matrix or flowchart of a sequence of activities with interleaving
decision points.
• IOT/M2M enables the devices, data in database for business processes. The data supports the process.
• For ex: streetlight control & processes.
• Each group of streetlights sends data in real time through the gateways. The gateways connect to the
internet. The control & management processes streetlights real time database & group databases.

Business intelligence:
• it is a process which enables a business service to extract new facts & knowledge & then undertake better
decisions.
• The new facts & knowledge follow from the earlier results of data processing, aggregation & then
analyzing those results.
Distributed business process:
• Business processes need to be distributed. Distribution of processes reduces the complexity,
communication costs, enables faster responses & smaller processing load at the central system.
• For ex: distribution of control process for each group of lights at the gateway itself reduces complexity,
communication costs, faster responses & smaller processing load at the central system.
• DBPS(Distributed business process System) is a collection of logically interrelated business processes
in an enterprise network. DBPS means a software system that manages the distributed BPs.

19
• DBPS exits as cooperation between the BPs in a transparent manner. Transparent means that each user
within the system may access all of the process decisions within all of the processes as if they were a
single business process.

➢ 11.Everything as a service (XaaS):


"Everything as a Service" (XaaS) is a comprehensive term that refers to the delivery of various services over the
internet, enabling users to access and use these services on-demand without the need for ownership or physical
installation. XaaS encompasses a wide range of service models and has become a fundamental concept in the
era of cloud computing. Here are some key aspects of XaaS:

Definition:
• XaaS represents a cloud computing service model where various services, applications, and
resources are provided to users over the internet as a service. It is an umbrella term that covers
different service models, each represented by a specific acronym.
Types of XaaS:
• Software as a Service (SaaS): Software applications delivered over the internet on a subscription
basis. Users access the software through a web browser without the need for local installations.
• Platform as a Service (PaaS): Provides a platform that allows users to develop, run, and manage
applications without dealing with the complexities of infrastructure. It includes tools, libraries,
and services for application development.
• Infrastructure as a Service (IaaS): Delivers virtualized computing resources over the internet,
including virtual machines, storage, and networking. Users have control over the operating
system, but the underlying infrastructure is managed by the service provider.
• Desktop as a Service (DaaS): Delivers virtual desktop environments to users over the internet.
Users access their desktops remotely, and the desktop environment is hosted on cloud
infrastructure.

20
• Data as a Service (DaaS): Provides access to specific data sets or databases over the internet.
Users can access and consume data without needing to manage the underlying infrastructure.
• Function as a Service (FaaS): Also known as serverless computing, FaaS allows users to run
individual functions or pieces of code in response to events without managing the infrastructure.
Characteristics of XaaS:
• On-Demand Access: Services are available to users on-demand, and users pay for what they
consume, typically on a subscription or usage-based model.
• Scalability: XaaS services can scale up or down based on demand, allowing users to adapt to
changing requirements without upfront infrastructure investments.
• Managed Services: Infrastructure, software, and other resources are managed by the service
provider, reducing the burden on users to maintain and update the underlying components.
• Multi-Tenancy: Multiple users or organizations can use the same underlying resources, with
logical isolation to ensure security and privacy.
• Service Customization: Users can often customize and configure services based on their specific
needs.
Benefits of XaaS:
• Cost Savings: Users can avoid upfront capital expenses for infrastructure and software, paying
only for what they use.
• Flexibility: XaaS allows users to adapt quickly to changing requirements, scale resources as
needed, and experiment with new services.
• Accessibility: Services can be accessed from anywhere with an internet connection, promoting
collaboration and remote work.
• Efficiency: Managed services reduce the operational burden on users, allowing them to focus on
their core activities.
Challenges and Considerations:
• Security and Privacy: Storing and accessing data and applications over the internet raise
concerns about security and data privacy.
• Dependency on Service Providers: Organizations relying heavily on XaaS may face challenges if
service providers experience outages or disruptions.
• Customization Limitations: Some XaaS services may have limitations in terms of customization
and control over underlying components.

21
10.Role of Cloud computing in IoT

Cloud computing plays a crucial role in the Internet of Things (IoT) ecosystem, providing a scalable and
flexible infrastructure to support the storage, processing, and analysis of massive amounts of data generated by
IoT devices. Here are several key roles that cloud computing plays in IoT:

1. Data Storage and Management:


• Scalable Storage: Cloud platforms offer scalable storage solutions that can accommodate the
large volumes of data generated by IoT devices.
• Data Management: Cloud-based databases and data lakes enable efficient organization, retrieval,
and management of IoT data.
2. Data Processing and Analytics:
• Scalable Processing Power: Cloud computing provides the computational resources necessary
for real-time or batch processing of IoT data, allowing for advanced analytics and insights
generation.
• Big Data Analytics: Cloud platforms offer tools and services for analyzing large datasets,
uncovering patterns, trends, and correlations in IoT data.
3. Edge Computing Integration:
• Edge-Cloud Collaboration: Cloud computing complements edge computing by providing
additional resources for complex processing and analytics that may be challenging to perform at
the edge.
• Hybrid Architectures: Combining edge computing and cloud computing creates a hybrid
architecture, allowing organizations to balance performance, latency, and resource utilization.
4. Device Management and Security:
• Device Provisioning: Cloud platforms assist in the onboarding and provisioning of IoT devices,
facilitating device registration, authentication, and management.
• Security Services: Cloud providers offer security services, such as identity management,
encryption, and access controls, to ensure the confidentiality and integrity of IoT data.
5. Scalability and Flexibility:
• Resource Scaling: Cloud platforms enable organizations to scale their IoT infrastructure up or
down based on demand, ensuring that they can handle varying workloads efficiently.
• Global Reach: Cloud services have a global presence, allowing IoT applications to scale and be
accessible from different geographical locations.
6. Connectivity and Integration:
22
• IoT Protocols and Standards: Cloud services often support a variety of IoT communication
protocols and standards, facilitating seamless integration with diverse devices and platforms.
• APIs and Integration Tools: Cloud platforms provide APIs and integration tools that simplify the
connection between IoT devices and cloud services.
7. Cost Efficiency:
• Pay-as-You-Go Model: Cloud computing follows a pay-as-you-go pricing model, allowing
organizations to pay only for the resources they consume, which can be cost-effective for IoT
deployments.
• Resource Optimization: Cloud platforms help organizations optimize resource utilization by
dynamically allocating and deallocating resources based on demand.
8. Firmware and Software Updates:
• Over-the-Air (OTA) Updates: Cloud services enable the seamless deployment of firmware and
software updates to IoT devices, ensuring they are always up-to-date with the latest features and
security patches.
9. Data Collaboration and Sharing:
• Collaboration Platforms: Cloud-based collaboration platforms enable secure sharing and
collaboration on IoT data, allowing multiple stakeholders to derive insights and make informed
decisions.

11.Benefits of Cloud in IoT


Benefits And Functions of IoT Cloud:
There are many benefits of combining these services –

1. IoT Cloud Computing provides many connectivity options, implying large network access. People
use a wide range of devices to gain access to cloud computing resources: mobile devices, tablets,
laptops..
2. Developers can use IoT cloud computing on-demand
3. It provide deep computing power and storage.
4. Cloud Computing implies the pooling of resources. It influences increased collaboration and
builds close connections between users.
5. As the number of IoT devices and automation in use grows, security concerns emerge. Cloud
solutions provide companies with reliable authentication and encryption protocols.

23
6. Finally, IoT cloud computing is convenient because you get exactly as much from the service as
you pay

12.SECURITY ACCEPTS IN IOT


Some of the most required capabilities of a secure network are briefly discussed.
• Resilience to attacks: The system should be capable enough to recover itself in case if it crashes during data
transmission. For an example, a server working in a multiuser environment, it must be intelligent and strong
enough to protect itself from intruders or an eavesdropper. In the case, if it is down it would recover itself without
intimation the users of its down status.

• Data Authentication: The data and the associated information must be authenticated. An authentication
mechanism is used to allow data transmission from only authentic devices.

• Access control: Only authorized persons are provided access control. The system administrator must control
access to the users by managing their usernames and passwords and by defining their access rights so that different
users can access only relevant portion of the database or programs.

• Client privacy: The data and information should be in safe hands. Personal data should only be accessed by
authorized person to maintain the client privacy. It means that no irrelevant authenticated user from the system or
any other type of client cannot have access to the private information of the client.

24
UNIT-1 PREVIOUS QUESTION PAPERS
1. a) Define IoT. Explain the role of things and internet in IoT. [8M]
b) What are the major layers in IoT Architecture? [7M]
2. a) Explain the advantages and disadvantages of an IoT. [8M]
b).write the design principles of IOT [7M]
3. a) What is internet of things? Describe the characteristics of IoT. [8M]
b) Explain working of IoT gateways. [7M]
4. a) State and explain M2M communication with example. [8M]
b) Explain in detail about XaaS (Everything as a Service). [7M]
5. a) What are the design principles of IoT? Explain. [8M]
b) What are examples of IoT devices? Explain. [7M]
6 .a) discuss the needed capabilities of IOT [8M]
b) Explain various Business Model Patterns in the IoT. [7M]
7. a) Mention the applications of IoT. [8M]
b) Write about Data Management in detail. [7M]
8. a) Define IoT and M2M. Illustrate the differences between IoT and M2M. [8M]
b) What are the major privacy and security issues in case of IoT? [7M]
9. a) Define Role of Cloud in IoT[8]
b)Defi Security aspects in IoT.

……The END……

25

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy