Unit I
Unit I
Internet of
Things
Course Type: CC
Course Code: MCA106
Credits: 2
Total Hours: 30
UNIT I NOTES
What is a Computer Network?
o Computer Network is a group of computers connected with each other
through wires, optical fibres or optical links so that various devices can interact
with each other through a network.
o The aim of the computer network is the sharing of resources among various
devices.
o In the case of computer network technology, there are several types of networks
that vary from simple to complex level.
There are two types of NIC: wireless NIC and wired NIC.
o Wireless NIC: All the modern laptops use the wireless NIC. In Wireless NIC, a
connection is made using the antenna that employs the radio wave
technology.
o Wired NIC: Cables use the wired NIC to transfer the data over the medium.
2.Hub
Hub is a central device that splits the network connection into multiple devices. When
computer requests for information from a computer, it sends the request to the Hub.
Hub distributes this request to all the interconnected computers.
3.Switches
Switch is a networking device that groups all the devices over the network to transfer
the data to another device. A switch is better than Hub as it does not broadcast the
message over the network, i.e., it sends the message to the device for which it belongs
to. Therefore, we can say that switch sends the message directly from source to the
destination.
5.Router
Router is a device that connects the LAN to the internet. The router is mainly used to
connect the distinct networks or connect the internet to multiple computers.
6.Modem
Modem connects the computer to the internet over the existing telephone line. A
modem is not integrated with the computer motherboard. A modem is a separate part
on the PC slot found on the motherboard.
o Peer-To-Peer network
o Client/Server network
Peer-To-Peer network
o Peer-To-Peer network is a network in which all the computers are linked
together with equal privilege and responsibilities for processing the data.
o Peer-To-Peer network is useful for small environments, usually up to 10
computers.
o Peer-To-Peer network has no dedicated server.
o Special permissions are assigned to each computer for sharing the resources,
but this can lead to a problem if the computer with the resource is down.
Advantages of Peer-To-Peer Network:
o It is less costly as it does not contain any dedicated server.
o If one computer stops working but, other computers will not stop working.
o It is easy to set up and maintain as each computer manages itself.
Client/Server Network
o Client/Server network is a network model designed for the end users called
clients, to access the resources such as songs, video, etc. from a central
computer known as Server.
o The central controller is known as a server while all other computers in the
network are called clients.
o A server performs all the major operations such as security and network
management.
o A server is responsible for managing all the resources such as files, directories,
printer, etc.
o All the clients communicate with each other through a server. For example, if
client1 wants to send some data to client 2, then it first sends the request to the
server for the permission. The server sends the response to the client 1 to initiate
its communication with the client 2.
wired Personal Area Network: Wired Personal Area Network is created by using the
USB.
o Security issue: A WAN network has more security issues as compared to LAN
and MAN network as all the technologies are combined together that creates
the security problem.
o Needs Firewall & antivirus software: The data is transferred on the internet
which can be changed or hacked by the hackers, so the firewall needs to be
used. Some people can inject the virus in our system so antivirus is needed to
protect from such a virus.
o High Setup cost: An installation cost of the WAN network is high as it involves
the purchasing of routers, switches.
o Troubleshooting problems: It covers a large area so fixing the problem is
difficult.
o 1) Bus Topology
o The bus topology is designed in such a way that all the stations are connected
through a single cable known as a backbone cable.
o Each node is either connected to the backbone cable by drop cable or directly
connected to the backbone cable.
o When a node wants to send a message over the network, it puts a message over
the network. All the stations available in the network will receive the message
whether it has been addressed or not.
o The bus topology is mainly used in 802.3 (ethernet) and 802.4 standard
networks.
o The configuration of a bus topology is quite simpler as compared to other
topologies.
o The backbone cable is considered as a "single lane" through which the
message is broadcast to all the stations.
o The most common access method of the bus topologies is CSMA (Carrier Sense
Multiple Access).
o Low-cost cable: In bus topology, nodes are directly connected to the cable
without passing through a hub. Therefore, the initial cost of installation is low.
o Moderate data speeds: Coaxial or twisted pair cables are mainly used in bus-
based networks that support up to 10 Mbps.
o Familiar technology: Bus topology is a familiar technology as the installation
and troubleshooting techniques are well known, and hardware components are
easily available.
o Limited failure: A failure in one node will not have any effect on other nodes.
o Extensive cabling: A bus topology is quite simpler, but still it requires a lot of
cabling.
o Difficult troubleshooting: It requires specialized test equipment to determine
the cable faults. If any fault occurs in the cable, then it would disrupt the
communication for all the nodes.
o Signal interference: If two nodes send the messages simultaneously, then the
signals of both the nodes collide with each other.
o Reconfiguration difficult: Adding new devices to the network would slow
down the network.
o Attenuation: Attenuation is a loss of signal leads to communication issues.
Repeaters are used to regenerate the signal.
2) Ring Topology
3) Star Topology
o A Central point of failure: If the central hub or switch goes down, then all the
connected nodes will not be able to communicate with each other.
o Cable: Sometimes cable routing becomes difficult when a significant amount
of routing is required.
4) Tree topology
o Tree topology combines the characteristics of bus topology and star topology.
o A tree topology is a type of structure in which all the computers are connected
with each other in hierarchical fashion.
o The top-most node in tree topology is known as a root node, and all other
nodes are the descendants of the root node.
o There is only one path exists between two nodes for the data transmission. Thus,
it forms a parent-child hierarchy.
5) Mesh topology
o Mesh technology is an arrangement of the network in which computers are
interconnected with each other through various redundant connections.
o There are multiple paths from one computer to another computer.
o It does not contain the switch, hub or any central computer which acts as a
central point of communication.
o The Internet is an example of the mesh topology.
o Mesh topology is mainly used for WAN implementations where communication
failures are a critical concern.
o Mesh topology is mainly used for wireless networks.
o Mesh topology can be formed by using the formula:
Number of cables = (n*(n-1))/2;
Reliable: The mesh topology networks are very reliable as if any link breakdown will
not affect the communication between connected computers.
Easier Reconfiguration: Adding new devices would not disrupt the communication
between other devices.
Disadvantages of Mesh topology
6) Hybrid Topology
o Reliable: If a fault occurs in any part of the network will not affect the
functioning of the rest of the network.
o Scalable: Size of the network can be easily expanded by adding new devices
without affecting the functionality of the existing network.
o Flexible: This topology is very flexible as it can be designed according to the
requirements of the organization.
o Effective: Hybrid topology is very effective as it can be designed in such a way
that the strength of the network is maximized and weakness of the network is
minimized.
o Complex design: The major drawback of the Hybrid topology is the design of
the Hybrid network. It is very difficult to design the architecture of the Hybrid
network.
o Costly Hub: The Hubs used in the Hybrid topology are very expensive as these
hubs are different from usual Hubs used in other topologies.
o Costly infrastructure: The infrastructure cost is very high as a hybrid network
requires a lot of cabling, network devices, etc.
Introduction to IoT
IoT stands for Internet of Things. It refers to the interconnectedness of physical
devices, such as appliances and vehicles, that are embedded with software,
sensors, and connectivity which enables these objects to connect and
exchange data. This technology allows for the collection and sharing of data
from a vast network of devices, creating opportunities for more efficient and
automated systems.
Internet of Things (IoT) is the networking of physical objects that contain
electronics embedded within their architecture in order to communicate and
sense interactions amongst each other or with respect to the external
environment. In the upcoming years, IoT-based technology will offer advanced
levels of services and practically change the way people lead their daily lives.
Advancements in medicine, power, gene therapies, agriculture, smart cities,
and smart homes are just a few of the categorical examples where IoT is
strongly established.
IOT is a system of interrelated things, computing devices, mechanical and
digital machines, objects, animals, or people that are provided with unique
identifiers. And the ability to transfer the data over a network requiring human-
to-human or human-to-computer interaction.
IoT is network of interconnected computing devices which
are embedded in everyday objects, enabling them to send
and receive data.
Over 9 billion ‘Things’ (physical objects) are currently connected to the
Internet, as of now. In the near future, this number is expected to rise to
a whopping 20 billion.
With the help of IoT, we can handle outdoor things, household work, and
gadgets. Using it, you can control your ACs or any other electrical appliances.
It has spread worldwide because of its low cost and rapid growth and
productivity.
The Internet of things is beneficial technology that has not only made the world
advanced and updated but has also reduced laborious work. But how does it
work?
The important thing is the data. Once collected from different sources, the data
can be easily exchanged through the network and connection established. The
connection is established through mobiles or any other connected device via
the Internet and wireless connections.
But what makes this IoT so popular globally? For this, let's study the
characteristics of IoT.
IoT can connect through several wireless devices, like sensors, mobile phones,
trackers, etc. This way, the person will not have to wait for an internet
connection to operate a device.
2. Identity of Things
The collaboration of name and number gives an identity to an internet device.
Giving an identity to the device is an essential aspect of loT. Identity helps to
differentiate between various internet devices and select the device we want
to send the command.
Every device needs a different controlling power based on the type of data
provided. It is essential to give a unique identity to every device so that we
can set up passwords or other security means. For example, fingerprints, face
recognition IP addresses, and Face lock systems are several means of security
given to the different identified devices to protect them.
3. Intelligence
The intelligence of IoT devices depends on the sensors' intelligence. The
sensors send the data to the user for further analysis.
We need to update the IoT devices regularly to get the smart work done. It
adds to their features and makes them smarter.
4. Dynamic
We need to create IoT devices in a way that they can adapt to the environment.
For example, an AC should have a sensor that can send a signal to the cloud
and adjust it to the premises of the place. Similarly, the camera can easily
click photographs by adjusting to light situations, like day and night.
5. Scalability
Scalability means the amount of data one can handle efficiently. The IoT has
created a setup to handle enormous data and generate useful analysis.
6. Self-Upgradation
As we saw above, updating the software regularly is important. But who has
the time to remember to do that? Thus, with its artificial intelligence, IoT
upgrades itself without human help. It also allows the set up of a network for
the addition of any new IoT devices. Thus, the technology can quickly start
working without delay if the setup has already been done.
7. Architecture
The architecture of IoT is designed in a way that it is capable of supporting
various devices, technologies, and protocols. Its main work is to confirm
whether each connected device does not interfere with the other. This way,
the safety and security of each device's data are maintained.
8. Security
With the increasing number of IoT devices, issues regarding the security of
personal data have arisen. There might be a chance of data leakage as a large
amount of data is collected, exchanged, and generated. There is a chance of
personal data being transferred without approval, which is a matter of concern.
To overcome this challenge, IoT has created networks, systems, and devices
wherein privacy is well maintained. Maintaining safety and security is a big
dare for IoT. However, it still handles it without any disruption.
9. Network
With the increasing number of IoT devices in a network, it becomes difficult to
maintain communication for proper functioning. However, cloud service and
gateway are a few methods that can solve such problems.
Often, one device can use the connectivity of another device to establish
network connectivity even if the second device is not connected to a network.
Because IoT devices can communicate with one another, it is more effective
and adaptable than other current technologies.
10. Data
The data gathered from IoT devices are analysed for future prediction. For
example, a calorie meter. It helps to regulate the number of calories each day.
We also have fitness data, thermostats, and various devices that monitor our
health. Therefore, we can use the data collected through these devices.
Evolution of IoT
Over the Years with the rising adoption of the Internet of Things (IoT), the
modern world is becoming broader and faster in terms of connectivity. As we
know, IoT refers to the millions of physical devices that are connected to the
internet and provides a platform for every industry to foster innovation and
productivity. Although the technology is in its infant stage, the potential it holds
for businesses is massive and it represents the next evolution of the connected
world where it won’t be remiss to say that – “Interconnectedness is the new
normal.”
1982 – Students invent a connected Coke machine. Students at Carnegie Mellon
University connected the department vending machine to the main computer
via the local network, enabling them to check if drinks were available and cold.
Not everyone liked Coke, but they all loved this invention.
1989 – The World Wide Web is invented British scientist Tim Berners-Lee
invented the World Wide Web (WWW) while working at CERN. The
Governmental system of satellites was complemented by privately held ones,
providing future IoT systems with communications. The first website that
Berners-Lee brought online from the Swiss Alps is still available.
1990-1993 – World’s first IoT device invented in 1990, John Romkey created the
first IOT device – a toaster that could be turned on and off over the Internet. By
1991, he had automated the entire process by adding a crane system that
inserted the bread as well. Then in 1993, the world's first webcam prototype,
the Trojan Room Coffee Pot, was installed at the University of Cambridge to
monitor the amount of coffee remaining in the brewing machine.
1998 – Mark Weiser creates a connected water fountain Father of ubiquitous
computing Mark Weiser created a fountain outside his office. The flow and the
height of the water mimicked the price trends and volume of the stock market
in real-time. The 2008 crisis would have been a spectacular sight.
1999 – “The Internet of Thing” is coined Kevin Ashton, the founder of Auto-ID,
titled a presentation he made at Procter & Gamble “The Internet of Things”.
Ashton linked the ideas of RFID (radio-frequency identification) and the Internet,
which impressed the listeners with its innovativeness. While his idea of RFID-
based device connectivity differs from today’s IP-based (Internet Protocol) IoT,
Ashton’s breakthrough played an essential role in IoT history and technological
development overall.
2005 – The first smart home device is created Originally released in June 2005,
the Nabaztag – an early version of smart home devices like Alexa and Google
Home – was an ambient electronic device shaped like a rabbit, able to alert its
owner and speak to them about the weather, stock market changes, RSS feeds,
etc. In 2019, the iconic bunny made a comeback for a limited time with a new
Raspberry Pi brain.
2008-2009 – IoT is born According to Cisco IBSG*, IoT was conceived between
2008 and 2009, when the number of connected machines surpassed the number
of humans on the planet. Currently, there are about 21.5 billion connected
devices in the world – almost three times the number of people on the planet
2011 – IoT added to the hype-cycle for emerging technologies in 2011, Gartner,
the market research company that invented the famous “hype-cycle for
emerging technologies”, included “The Internet of Things” on their list. This
year, Gartner named Vodafone as a Leader in its 2021 Magic Quadrant for
Managed IoT Connectivity Services for the seventh time in a row.
2013-2014 – IoT devices start using sensors Thermostats and home lighting
started using sensors to accurately sense the surrounding environment. This
allowed people to control home lighting, garage doors and thermostats all from
their phone.
2014 – The first “smart city” is created as a smart city “testbed”, Smart
Docklands in Dublin provided a platform for innovators to test cutting-edge
technology solutions to local challenges, such as smart bins, sensors monitoring
flood levels and city sound monitoring sensors.
2018 – IoT enters the healthcare and health insurance industries Healthcare
devices represent one of the fastest-growing sectors of the IoT market. The
value of this sector – sometimes called the Internet of Medical Things (IoMT) –
is predicted to reach $176 billion by 2026. IoT technology allows healthcare
professionals to access patient data and improve the quality of wearable
medical devices. Medical IoT solutions include blood glucose and heart rate
monitoring, pacemakers, fall detection, geofencing and location monitoring.
2020 – IoT steps up in response to the COVID-19 crisis
In 2020, heat detection cameras started popping up in all sorts of public spaces
to measure people’s temperature. Using infrared technology, thermal cameras
detect radiating heat from a body. Although these devices were originally not
designed to be used for medical purposes – they are often deployed by
firefighters to track smouldering embers and police to search for out-of-sight
suspects
2021 - FIA creates IoT forum
The FIA IoT Forum provides a great opportunity for FIA members to work with
other members under the banner of the FIA as the industry-leading voice to
enable the fire industry and the customers we serve to benefit from IoT.
2023
The Internet of Things (IoT) has continued to expand its influence across
industries and sectors, transforming the way we live and work. As we move into
the second half of 2023, it’s essential to examine the key trends and
developments that have shaped the IoT landscape so far this year. From
advancements in connectivity to the proliferation of edge computing, let’s delve
into the noteworthy progressions in the world of IoT.
5G Accelerating IoT Adoption The deployment of 5G networks has been a game-
changer for IoT. With its enhanced speed, lower latency, and massive
connectivity, 5G has paved the way for the widespread adoption of IoT devices
and applications. The high bandwidth and increased capacity of 5G networks
have fuelled the growth of connected devices across various domains, including
smart cities, industrial automation, and healthcare.
Edge Computing Takes Centre Stage
Edge computing has emerged as a critical component of the IoT ecosystem. By
processing data closer to the source, at the edge of the network, edge
computing minimises latency, reduces bandwidth usage, and enhances overall
system efficiency. In 2023, we witnessed a surge in edge computing
infrastructure as organisations sought to leverage its benefits for real-time
analytics, AI-driven decision-making, and improved security.
AI and Machine Learning Empowering IoT
The convergence of AI and IoT has continued to reshape industries. AI-powered
analytics and machine learning algorithms enable IoT devices to extract
actionable insights from massive amounts of data. So far 2023, we’ve witnessed
significant advancements in AI-driven IoT applications, such as predictive
maintenance, intelligent energy management, and personalised healthcare.
These innovations have revolutionised business operations, optimising
efficiency and driving cost savings.
Enhanced Security and Privacy Measures
As the number of connected devices continues to rise, ensuring robust security
and privacy measures within the IoT ecosystem has become paramount. In
2023, there has been a significant focus on strengthening IoT security
frameworks. This includes the implementation of end-to-end encryption,
biometric authentication, and block chain technology to safeguard sensitive
data and protect against cyber threats.
The Adoption of eSIM for IoT
eSIM technology for IoT has continued to improve interoperability between
different eSIM-enabled devices and networks, enhanced security measures to
protect IoT devices from cyber threats, and streamlined provisioning processes
for seamless connectivity. Not only this but eSIM for IoT has boosted
developments in remote management capabilities, enabling more efficient
monitoring, updates, and troubleshooting of IoT devices. Sustainability and
Green IoT
With an increased focus on sustainability, IoT has embraced environmentally
conscious practices. The integration of IoT devices in energy management
systems, waste management, and smart grids has enabled efficient resource
allocation and reduced environmental impact. Furthermore, the development
of low-power IoT devices and the utilisation of renewable energy sources have
contributed to the growth of green IoT solutions.
What is the Architecture of Internet of
Things (IoT)?
Internet of Things (IoT) is a system of interrelated, internet-connected objects
which are able to collect and transfer data over a wireless network without
human intervention.
For example, smart fitness bands or watches, driverless cars or drones, smart
homes that can be unlocked through smartphones and smart cars, etc.
Architecture of IoT
There are different phases in the architecture of IoT but they can vary
according to the situations but generally, there are these four phases in
the architecture of IoT −
Networked Devices
These are the physical devices which include sensors, actuators, and
transducers. These are the actual devices that collect and send the data for
processing. They are capable of receiving real-time data and they can convert
the physical quantities into electrical signals which can be sent through a
network.
Data Aggregation
It is a very important stage as it includes converting the raw data collected by
sensors into meaningful data which can be used to take actions. It also includes
Data Acquisition Systems and Internet Gateways. It converts the Analog
signals provided by sensors into digital signals.
Final Analysis
This is a stage that includes edge IT analytics and the processing of data to
make it more efficient and fully capable of execution. It also includes managing
and locating all the devices correctly
Cloud Analysis
The final data is received here and analysed closely and precisely in data
centres. They process and clean the data to make it free from any kind of
errors and missing values. After this stage, data is ready to be sent back and
executed to perform operations.
1 Sensing Layer − The first stage of IoT includes sensors, devices, actuators etc.
which collect data from the physical environment, processes it and then sends it over the
network.
Data Abstraction
After all the data is collected, some vast data is extracted to get valuable
insights that can benefit businesses. The data abstraction can be done as
follows −
Collecting all information from IoT systems as well as from the non-IoT systems
Making data available from a single location by use of data virtualization
Managing various forms of raw data
Application Layer − The fourth stage of IoT consists of Cloud/Data Centres where
data is managed and used by applications like agriculture, defence, health care etc.
This layer is located in the cloud and generates reports via web
interfaces and email delivery for end users' applications.
Each IoT system has specific aims and objectives to meet business
requirements. Currently, most IoT applications operate on various
technology stacks and at varying levels of sophistication, carrying out
particular duties for organizations.
Advantages
The advantages of IoT are as follows −
Cost Reduction − IOT devices catch any problem very fast as compared to traditional
troubleshooting. It not only saves time but also saves costs of large repairs.
Efficiency and Productivity − An automated PDF conversion and creation tool will
remove the hustle of PDF editing and archiving. Hence, increase in Efficiency and
Productivity.
Business Opportunities − IOT provides advanced analytics, smart utility grids which
help Small Management Businesses to provide more valuable content and things to
their customers.
Customer Experience − Nowadays customer's experience is the most valuable thing
in running a business. IoT has drastically increased the customer's experience. An
example of customer experience is Home Automation. Since everything is connected,
customers need not have to worry about appliances. One can turn off the appliance
through mobile.
Mobility and Agility − With the help of IoT, employees can do their work from any
geographical location, anytime without any restrictions.
Disadvantages
The disadvantages of IoT are as follows −
Security − The data is travelling all over the Internet. So maintaining its privacy is still
a Big Challenge. End-to-end Encryption is a must in IoT.
Compatibility − There is no International Standard for the monitoring of the
equipment.
Complexity − Most of the devices still contain some software bugs. Each device must
be able to seamlessly interact with other devices in the network.
Safety − Suppose a patient is left unattended by a doctor. And some notorious guy
changes the prescription or Health monitoring devices malfunctioned. Then it can
result in the death of the patient.
Policies − Government authorities must take some steps to make
Perception Layer :
This is the first layer of IoT architecture. In the perception layer, number
of sensors and actuators are used to gather useful information like
temperature, moisture content, intruder detection, sounds, etc. The main
function of this layer is to get information from surroundings and to pass
data to another layer so that some actions can be done based on that
information.
Network Layer :
As the name suggests, it is the connecting layer between perception and
middleware layer. It gets data from perception layer and passes data to
middleware layer using networking technologies like 3G, 4G, UTMS, Wi-
Fi, infrared, etc. This is also called communication layer because it is
responsible for communication between perception and middleware layer.
All the transfer of data done securely keeping the obtained data
confidential.
Middleware Layer :
Middleware Layer has some advanced features like storage, computation,
processing, action taking capabilities. It stores all data-set and based on
the device address and name it gives appropriate data to that device. It
can also take decisions based on calculations done on data-set obtained
from sensors.
Application Layer :
The application layer manages all application process based on
information obtained from middleware layer. This application involves
sending emails, activating alarm, security system, turn on or off a device,
smartwatch, smart agriculture, etc.
Business Layer :
The success of any device does not depend only on technologies used in
it but also how it is being delivered to its consumers. Business layer does
these tasks for the device. It involves making flowcharts, graphs, analysis
of results, and how device can be improved, etc.
WSN can be used for processing, analysis, storage, and mining of the data.
Applications of WSN:
1. Quality of Service
2. Security Issue
3. Energy Efficiency
4. Network Throughput
5. Performance
6. Ability to cope with node failure
7. Cross layer optimisation
8. Scalability to large scale of deployment
A modern Wireless Sensor Network (WSN) faces several challenges,
including:
Limited power and energy: WSNs are typically composed of battery-
powered sensors that have limited energy resources. This makes it
challenging to ensure that the network can function for
long periods of time without the need for frequent battery replacements.
Limited processing and storage capabilities: Sensor nodes in a WSN
are typically small and have limited processing and storage capabilities.
This makes it difficult to perform complex tasks or store large amounts of
data.
Heterogeneity: WSNs often consist of a variety of different sensor types
and nodes with different capabilities. This makes it challenging to ensure
that the network can function effectively and
efficiently.
Security: WSNs are vulnerable to various types of attacks, such as
eavesdropping, jamming, and spoofing. Ensuring the security of the
network and the data it collects is a major challenge.
Scalability: WSNs often need to be able to support a large number of
sensor nodes and handle large amounts of data. Ensuring that the
network can scale to meet these demands is a significant
challenge.
Interference: WSNs are often deployed in environments where there is a
lot of interference from other wireless devices. This can make it difficult to
ensure reliable communication between sensor nodes.
Reliability: WSNs are often used in critical applications, such as
monitoring the environment or controlling industrial processes. Ensuring
that the network is reliable and able to function correctly
in all conditions is a major challenge.
Components of WSN:
1. Sensors:
Sensors in WSN are used to capture the environmental variables and
which is used for data acquisition. Sensor signals are converted into
electrical signals.
2. Radio Nodes:
It is used to receive the data produced by the Sensors and sends it to the
WLAN access point. It consists of a microcontroller, transceiver, external
memory, and power source.
3. WLAN Access Point:
It receives the data which is sent by the Radio nodes wirelessly, generally
through the internet.
4. Evaluation Software:
The data received by the WLAN Access Point is processed by a software
called as Evaluation Software for presenting the report to the users for
further processing of the data which can be used for processing, analysis,
storage, and mining of the data.
Advantages of Wireless Sensor Networks (WSN):
Low cost: WSNs consist of small, low-cost sensors that are easy to deploy,
making them a cost-effective solution for many applications.
Wireless communication: WSNs eliminate the need for wired connections,
which can be costly and difficult to install. Wireless communication also
enables flexible deployment and reconfiguration of the network.
Energy efficiency: WSNs use low-power devices and protocols to conserve
energy, enabling long-term operation without the need for frequent battery
replacements.
Scalability: WSNs can be scaled up or down easily by adding or removing
sensors, making them suitable for a range of applications
and environments.
Real-time monitoring: WSNs enable real-time monitoring of physical
phenomena in the environment, providing timely information for decision
making and control.
Disadvantages of Wireless Sensor Networks (WSN):
Limited range: The range of wireless communication in WSNs is limited,
which can be a challenge for large-scale deployments or in environments
with obstacles that obstruct radio signals.
Limited processing power: WSNs use low-power devices, which may have
limited processing power and memory, making it difficult to perform complex
computations or support advanced applications.
Data security: WSNs are vulnerable to security threats, such as
eavesdropping, tampering, and denial of service attacks, which can
compromise the confidentiality, integrity, and availability of data.
Interference: Wireless communication in WSNs can be susceptible to
interference from other wireless devices or radio signals, which can degrade
the quality of data transmission.
Deployment challenges: Deploying WSNs can be challenging due to the
need for proper sensor placement, power management, and network
configuration, which can require significant time and resources.
while WSNs offer many benefits, they also have limitations and challenges
that must be considered when deploying and using them in real-world
applications.
There are the following operations that we can do using cloud computing:
In that server room, there should be a database server, mail server, networking,
firewalls, routers, modem, switches, QPS (Query Per Second means how much queries
or load will be handled by the server), configurable system, high net speed, and the
maintenance engineers.
1) Agility
The availability of servers is high and more reliable because the chances of
infrastructure failure are minimum.
3) High Scalability
4) Multi-Sharing
With the help of cloud computing, multiple users and applications can work more
efficiently with cost reductions by sharing common infrastructure.
Cloud computing enables the users to access systems using a web browser regardless
of their location or what device they use e.g. PC, mobile phone, etc. As infrastructure
is off-site (typically provided by a third-party) and accessed via the Internet, users
can connect from anywhere.
6) Maintenance
7) Low Cost
By using cloud computing, the cost will be reduced because to take the services of
cloud computing, IT company need not to set its own infrastructure and pay-as-
per usage of resources.
Application Programming Interfaces (APIs) are provided to the users so that they
can access services on the cloud by using these APIs and pay the charges as per
the usage of services.
Types of Cloud
Cloud computing is a revolutionary technology transforming how we store, access, and
process data. It simply refers to delivering computing resources, such as servers,
storage, databases, software, and applications, over the Internet. Cloud computing
uses a network of remote computer systems housed on the net to save and process
data rather than relying on physical infrastructure.
Cloud service companies use advanced security techniques, which include encryption,
firewalls, and access restrictions, to secure your data from unauthorized access.
Moreover, because your information is saved in the cloud, it is secure even if your
nearby devices are damaged, misplaced, or stolen. Redundancy and cloud backups
guarantee that your data may be restored promptly and effectively in case of any
unexpected situations.
Types of Cloud
There are the following 5 types of cloud that you can deploy according to the
organization's needs-
Public Cloud
Public cloud is open to all to store and access information via the Internet using the
pay-per-usage method.
n public cloud, computing resources are managed and operated by the Cloud Service
Provider (CSP). The CSP looks after the supporting infrastructure and ensures that the
resources are accessible to and scalable for the users.
Due to its open architecture, anyone with an internet connection may use the public
cloud, regardless of location or company size. Users can use the CSP's numerous
services, store their data, and run apps. By using a pay-per-usage strategy, customers
can be assured that they will only be charged for the resources they actually use, which
is a smart financial choice.
Example: Amazon elastic compute cloud (EC2), IBM Smart Cloud Enterprise, Microsoft,
Google App Engine, Windows Azure Services Platform.
Characteristics of Public Cloud
The public cloud has the following key characteristics:
o Public cloud is owned at a lower cost than the private and hybrid cloud.
o Public cloud is maintained by the cloud service provider, so do not need to
worry about the maintenance.
o Public cloud is easier to integrate. Hence it offers a better flexibility approach
to consumers.
o Public cloud is location independent because its services are delivered through
the internet.
o Public cloud is highly scalable as per the requirement of computing resources.
o It is accessible by the general public, so there is no limit to the number of users.
o Rapid deployment of services and applications.
o Reduced time and effort in hardware procurement and setup.
o The cloud provider offers a range of services and resources that you can avail
of.
o Built-in redundancy and resilience for enhanced reliability.
Private Cloud
Private cloud is also known as an internal cloud or corporate cloud. It is used by
organizations to build and manage their own data centres internally or by the third
party. It can be deployed using Open source tools such as Open stack and Eucalyptus.
Compared to public cloud options, both on premise and external private clouds give
businesses more control over their data, apps, and security. Private clouds are
particularly suitable for organizations with strict compliance requirements, sensitive
data, or specialized workloads that demand high levels of customization and security.
o Private cloud provides a high level of security and privacy to the users.
o Private cloud offers better performance with improved speed and space
capacity.
o It allows the IT team to quickly allocate and deliver on-demand IT resources.
o The organization has full control over the cloud because it is managed by the
organization itself. So, there is no need for the organization to depends on
anybody.
o It is suitable for organizations that require a separate cloud for their personal
use and data security is the first priority.
o Customizable to meet specific business needs and compliance regulations.
o Higher reliability and uptime compared to public cloud environments.
o Seamless integration with existing on-premises systems and applications.
o Better compliance and governance capabilities for industry-specific regulations.
o Enhanced flexibility in resource allocation and application deployment.
Hybrid Cloud
o Hybrid Cloud is a combination of the public cloud and the private cloud. we can
say:
o
o Hybrid Cloud = Public Cloud + Private Cloud
o Hybrid cloud is partially secure because the services which are running on the
public cloud can be accessed by anyone, while the services which are running
on a private cloud can be accessed only by the organization's users. In a hybrid
cloud setup, organizations can leverage the benefits of both public and private
clouds to create a flexible and scalable computing environment. The public
cloud portion allows using cloud services provided by third-party providers,
accessible over the Internet.
Example: Google Application Suite (Gmail, Google Apps, and Google Drive), Office
365 (MS Office on the Web and One Drive), Amazon Web Services.
o Hybrid cloud is suitable for organizations that require more security than the
public cloud.
o Hybrid cloud helps you to deliver new products and services more quickly.
o Hybrid cloud provides an excellent way to reduce the risk.
o Hybrid cloud offers flexible resources because of the public cloud and secure
resources because of the private cloud.
o Hybrid facilitates seamless integration between on-premises infrastructure and
cloud environments.
o Hybrid provides greater control over sensitive data and compliance
requirements.
o Hybrid enables efficient workload distribution based on specific needs and
performance requirements.
o Hybrid offers cost optimization by allowing organizations to choose the most
suitable cloud platform for different workloads.
o Hybrid enhances business continuity and disaster recovery capabilities with
private and public cloud resources.
o Hybrid supports hybrid cloud architecture, allowing applications and data to be
deployed across multiple cloud environments based on their unique
requirements.
In traditional hosting services, IT infrastructure was rented out for a specific period of
time, with pre-determined hardware configuration. The client paid for the
configuration and time, regardless of the actual use. With the help of the IaaS cloud
computing platform layer, clients can dynamically scale the configuration to meet
changing requirements and are billed only for the services actually used.
IaaS cloud computing platform layer eliminates the need for every organization to
maintain the IT infrastructure.
IaaS is offered in three models: public, private, and hybrid cloud. The private cloud
implies that the infrastructure resides at the customer-premise. In the case of public
cloud, it is located at the cloud computing platform vendor's data center, and the
hybrid cloud is a combination of the two in which the customer selects the best of
both public cloud or private cloud.
1. Shared infrastructure
IaaS allows multiple users to share the same physical infrastructure.
3. Pay-as-per-use model
IaaS providers provide services based on the pay-as-per-use basis. The users are
required to pay for what they have used.
5. On-demand scalability
On-demand scalability is one of the biggest advantages of IaaS. Using IaaS, users do
not worry about to upgrade software and troubleshoot the issues related to hardware
components.
1. Programming languages
PaaS providers provide various programming languages for the developers to develop
the applications. Some popular programming languages provided by PaaS providers
are Java, PHP, Ruby, Perl, and Go.
2. Application frameworks
PaaS providers provide application frameworks to easily understand the application
development. Some popular application frameworks provided by PaaS providers are
Node.js, Drupal, Joomla, WordPress, Spring, Play, Rack, and Zend.
3. Databases
PaaS providers provide various databases such as ClearDB, PostgreSQL, MongoDB,
and Redis to communicate with the applications.
4. Other tools
PaaS providers provide various other tools that are required to develop, test, and
deploy the applications.
Advantages of PaaS
There are the following advantages of PaaS -
1) Simplified Development
PaaS allows developers to focus on development and innovation without worrying
about infrastructure management.
2) Lower risk
No need for up-front investment in hardware and software. Developers only need a
PC and an internet connection to start building applications.
3) Prebuilt business functionality
Some PaaS vendors also provide already defined business functionality so that users
can avoid building everything from very scratch and hence can directly start the
projects only.
4) Instant community
PaaS vendors frequently provide online communities where the developer can get the
ideas to share experiences and seek advice from others.
5) Scalability
Applications deployed can scale from one to thousands of users without any changes
to the applications.
Social Networks - As we all know, social networking sites are used by the general public,
so social networking service providers use SaaS for their convenience and handle the general
public's information.
Mail Services - To handle the unpredictable number of users and load on e-mail services,
many e-mail providers offering their services using SaaS.
The benefit to having an expansive data set is its potential to hold hidden patterns or
trends that are only visible in a set that large. Additionally, it enables a full-picture
view.
However, due to the magnitude and complexity of big data, the value comes from
being able to analyse this data -- not the data itself -- which can prove to be a
challenge. Big data is so large and complex that identifying business value from so
much information can’t be done through traditional methods for processing and
analysing information.
The IoT enables companies unprecedented visibility into what is happening across
their connected devices in real time. A vast amount of real-time data points is
collected from connected IoT devices and transferred across the internet for storage
and analysis.
However, they were developed independently of one another. As the volume of IoT-
generated data increased to the point that conventional storage and analysis
methods became inefficient, big data and IoT become more and more interrelated.
In the current environment, the complex data and information gathered by IoT
devices can be considered a big data set being gathered in real time. Big data
storage and analytics currently help to make sense of the plethora of those real-time
data points and provide helpful insights.
Big data analytics can provide different types of insights when used with the IoT;
namely, descriptive analytics, diagnostic analytics, predictive analytics, and
prescriptive analytics. Descriptive analytics gives insights into how a connected
device is performing in real time. It can be used for anything from locating a
connected device, to understanding how that device is used by costumers, to
identifying anomalies.
Diagnostic analytics gives insights into the “why” behind descriptive analytics. For a
particular connected device, it can help organization understand why it is running in
a certain way or why it is producing certain outputs.
A very applicable use of big data in IoT is in predictive analytics. This type of analytics
utilizes machine learning by analyzing past data and producing probabilities for how
the device will function in the future. This is especially beneficial when it comes to
the servicing of IoT devices. Using this technology, organizations can anticipate
failures or servicing needs before the device stops working.
Lastly, big data is used in IoT for prescriptive analytics. This type of analysis gives
insights into how to impact things that have been observed or predicted.
IoT and Big Data help companies in different sectors to make efficient and well-informed
decisions and thus offer better services/products. IoT with Big data helps companies to
Examine data
Reveal data trends
Find unseen data patterns
Find hidden data correlations
Reveal new information
IoT in Big Data analytics helps businesses to extract information to get better business
insights. Better business insights help in taking better decisions that result in high ROI.
Due to an increase in demand for data storage, companies are switching to big data
cloud storage which lowers the implementation cost.
The features of Big Data in IoT are reshaping the upcoming generation of the e-health
care system and developing an innovative solution in the healthcare field. Big data will
now lead to data-driven research instead of hypothesis-driven research. IoT will control
and analyse the connection between sensors and existing big data.
This data will help to find out which equipment is working properly and which requires
repair. Hence, a business will never fall short of products.
Installing IoT sensors in vehicles provide data regarding fuel efficiency, tracking the
location of the vehicle, delivery routes, and other information that helps in improving
organizational productivity.
weather Forecast
With the help of IoT, we can collect big data from weather and satellites to know about
the amount of wind and sunlight we can expect within a particular time period. Due to
these predictive analytics and machine learning advances, we are capable of predicting
weather conditions and taking actions according to that to meet the demand.
Big data is used to generate findings of power grid components such as input-output
curves of transformers that help companies to take action at the right time and prevent
load intervention in the power grid.
In this section, we will discuss in-depth how these distinct components help in the
functioning of the IoT system.
Data visualization is an important aspect of IoT analysis, aiding in the ability to identify
key trends. Data visualization is needed to properly identify and convey the best data
insights that can be used to drive business decisions. The data generated by IoT
devices is heterogeneous, meaning it comes in a variety of formats: structured,
unstructured, and semi structured. While in theory visualizations of data should make
it easier to understand trends, when the data comes in so many different formats, a
method of visualization becomes more difficult.
Big data continues to grow at an exponentially high rate. As they are today, big data
storage systems have a limited amount of space, so it is becoming a significant
challenge to manage and store such a large amount of data.
c. Z-Wave
Z-Wave is a low-power RF communications IoT technology that primarily design
for home automation for products such as lamp controllers and sensors among
many other devices.
A Z-Wave uses a simpler protocol than some others, which can enable faster and
simpler development, but the only maker of chips is Sigma Designs compared to
multiple sources for other wireless technologies such as ZigBee and others.
f. NFC
NFC (Near Field Communication) is an IoT technology. It enables simple and safe
communications between electronic devices, and specifically for smartphones,
allowing consumers to perform transactions in which one does not have to be
physically present.
It helps the user to access digital content and connect electronic devices.
Essentially it extends the capability of contactless card technology and
enables devices to share information at a distance that is less than 4cm.
g. LoRaWAN
LoRaWAN is one of popular IoT Technology, targets wide-area network (WAN)
applications. The LoRaWAN design to provide low-power WANs with features
specifically needed to support low-cost mobile secure communication in IoT,
smart city, and industrial applications.
Specifically meets requirements for low-power consumption and supports large
networks with millions and millions of devices, data rates range from 0.3 kbps to
50 kbps.
So, this was all about IoT Technology Tutorial. Hope you like our
explanation of IoT Communication Protocols.
While embedded systems in IoT offer a host of benefits, they also face several
challenges that can affect their performance and functionality. In this write-up, we will
explore some of the possible challenges of embedded systems in IoT.
1. Power consumption: One of the most significant challenges of embedded
systems in IoT is power consumption. Many of these systems are designed to
operate on battery power, making energy efficiency a critical factor in their
design. The system must be optimized to consume minimal power while still
performing its required functions. Additionally, as the number of devices in an IoT
network increases, the power consumption also increases, creating a significant
challenge for the design of the overall IoT ecosystem.
2. Security: Embedded systems in IoT are also vulnerable to security threats.
These systems often collect sensitive data and communicate with other devices,
making them an attractive target for hackers. Ensuring the security of embedded
systems requires implementing robust encryption, authentication, and access
control mechanisms. However, as the number of devices in an IoT network
grows, managing the security of each device becomes increasingly complex.
3. Interoperability: Embedded systems in IoT must be interoperable with other
devices and systems. However, achieving interoperability is challenging due to
the heterogeneity of devices and communication protocols used in IoT networks.
As a result, developing an interoperable IoT ecosystem requires careful
consideration of the devices and protocols used.
4. Scalability: Another significant challenge for embedded systems in IoT is
scalability. As the number of devices in an IoT network grows, the embedded
systems must be designed to scale up to support the increased demand. This
requires careful consideration of the hardware and software architecture used in
the system, as well as the communication protocols and data management
mechanisms.
5. Real-time performance: Many embedded systems in IoT must perform real-time
functions, such as controlling and monitoring devices. Achieving real-time
performance requires designing the system with low-latency communication and
processing mechanisms. However, as the number of devices in an IoT network
grows, ensuring real-time performance becomes increasingly challenging.
Embedded systems in IoT offer tremendous potential for improving the way we interact
with devices and the environment. However, they also face several challenges that must
be carefully considered in their design and implementation. These challenges include
power consumption, security, interoperability, scalability, and real-time performance. By
addressing these challenges, embedded systems in IoT can continue to drive innovation
and improve our lives.
6LoWPAN uses reduced transmission time (typically short time pulses) and thus
saves energy.
2. Gateway
IoT Gateway manages the bidirectional data traffic between different networks and
protocols. Another function of the gateway is to translate different network protocols
and make sure interoperability of the connected devices and sensors.
Gateways can be configured to perform pre-processing of the collected data from
thousands of sensors locally before transmitting it to the next stage. In some
scenarios, it would be necessary due to the compatibility of the TCP/IP protocol.
IoT gateway offers a certain level of security for the network and transmitted data
with higher-order encryption techniques. It acts as a middle layer between devices
and the cloud to protect the system from malicious attacks and unauthorized access.
3. Cloud
The Internet of Things creates massive data from devices, applications, and users,
which has to be managed in an efficient way. IoT cloud offers tools to collect,
process, manage and store huge amounts of data in real time. Industries and services
can easily access these data remotely and make critical decisions when necessary.
Basically, the IoT cloud is a sophisticated, high-performance network of servers
optimized to perform high-speed data processing of billions of devices, traffic
management, and deliver accurate analytics. Distributed database management
systems are one of the most important components of the IoT cloud.
Cloud system integrates billions of devices, sensors, gateways, protocols, and data
storage and provides predictive analytics. Companies use these analytics data to
improve products and services, preventive measures for certain steps, and build their
new business model accurately.
4. Analytics
Analytics is the process of converting analogy data from billions of smart devices and
sensors into useful insights which can be interpreted and used for detailed analysis.
Smart analytics solutions are inevitable for IoT systems for the management and
improvement of the entire system.
One of the major advantages of an efficient IoT system is real-time smart analytics
which helps engineers to find out irregularities in the collected data and act fast to
prevent an undesired scenario. Service providers can prepare for further steps if the
information is collected accurately at the right time.
Big enterprises use the massive data collected from IoT devices and utilize the
insights for their future business opportunities. Careful analysis will help
organizations to predict trends in the market and plan ahead for a successful
implementation.
Information is very significant in any business model, and predictive analysis ensures
success in the concerned area of the business line.
5. User interface
User interfaces are the visible, tangible part of the IoT system which users can access.
Designers will have to make sure of a well-designed user interface for minimum
effort for users and encourage more interactions.
Modern technology offers much interactive design to ease complex tasks into simple
touch panel controls. Multicolour touch panels have replaced hard switches in our
household appliances, and the trend is increasing for almost every smart home
device.
The user interface design has higher significance in today’s competitive market; it
often determines the user whether to choose a particular device or appliance. Users
will be interested in buying new devices or smart gadgets if it is very user-friendly
and compatible with common wireless standards.