0% found this document useful (0 votes)
44 views64 pages

Unit I

The document provides an introduction to computer networks and the Internet of Things. It discusses the basic components of a computer network including NICs, hubs, switches, cables, routers, and modems. It also describes the two main types of network architecture - peer-to-peer and client-server networks. Finally, it outlines different types of computer networks based on size, including LAN, PAN, MAN, and WAN networks.

Uploaded by

Pooja k
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
44 views64 pages

Unit I

The document provides an introduction to computer networks and the Internet of Things. It discusses the basic components of a computer network including NICs, hubs, switches, cables, routers, and modems. It also describes the two main types of network architecture - peer-to-peer and client-server networks. Finally, it outlines different types of computer networks based on size, including LAN, PAN, MAN, and WAN networks.

Uploaded by

Pooja k
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 64

Introduction to

Internet of
Things

Course Type: CC
Course Code: MCA106
Credits: 2
Total Hours: 30

UNIT I NOTES
What is a Computer Network?
o Computer Network is a group of computers connected with each other
through wires, optical fibres or optical links so that various devices can interact
with each other through a network.
o The aim of the computer network is the sharing of resources among various
devices.
o In the case of computer network technology, there are several types of networks
that vary from simple to complex level.

Components of Computer Network:

Major components of a computer network are:

1. NIC (National interface card)


NIC is a device that helps the computer to communicate with another device. The
network interface card contains the hardware addresses; the data-link layer protocol
uses this address to identify the system on the network so that it transfers the data to
the correct destination.

There are two types of NIC: wireless NIC and wired NIC.

o Wireless NIC: All the modern laptops use the wireless NIC. In Wireless NIC, a
connection is made using the antenna that employs the radio wave
technology.
o Wired NIC: Cables use the wired NIC to transfer the data over the medium.

2.Hub
Hub is a central device that splits the network connection into multiple devices. When
computer requests for information from a computer, it sends the request to the Hub.
Hub distributes this request to all the interconnected computers.
3.Switches
Switch is a networking device that groups all the devices over the network to transfer
the data to another device. A switch is better than Hub as it does not broadcast the
message over the network, i.e., it sends the message to the device for which it belongs
to. Therefore, we can say that switch sends the message directly from source to the
destination.

4.Cables and connectors


Cable is a transmission media that transmits the communication signals. There are
three types of cables:

o Twisted pair cable: It is a high-speed cable that transmits the data


over 1Gbps or more.
o Coaxial cable: Coaxial cable resembles like a TV installation cable. Coaxial cable
is more expensive than twisted pair cable, but it provides the high data
transmission speed.
o Fibre optic cable: Fibre optic cable is a high-speed cable that transmits the
data using light beams. It provides high data transmission speed as compared
to other cables. It is more expensive as compared to other cables, so it is
installed at the government level.

5.Router
Router is a device that connects the LAN to the internet. The router is mainly used to
connect the distinct networks or connect the internet to multiple computers.

6.Modem
Modem connects the computer to the internet over the existing telephone line. A
modem is not integrated with the computer motherboard. A modem is a separate part
on the PC slot found on the motherboard.

Uses of Computer Network


o Resource sharing: Resource sharing is the sharing of resources such as
programs, printers, and data among the users on the network without the
requirement of the physical location of the resource and user.
o Server-Client model: Computer networking is used in the server-client
model. A server is a central computer used to store the information and
maintained by the system administrator. Clients are the machines used to
access the information stored in the server remotely.
o Communication medium: Computer network behaves as a communication
medium among the users. For example, a company contains more than one
computer has an email system which the employees use for daily
communication.
o E-commerce: Computer network is also important in businesses. We can do
the business over the internet. For example, amazon.com is doing their business
over the internet, i.e., they are doing their business over the internet.

Computer Network Architecture


Computer Network Architecture is defined as the physical and logical design of the
software, hardware, protocols, and media of the transmission of data. Simply we can
say that how computers are organized and how tasks are allocated to the computer.

The two types of network architectures are used:

o Peer-To-Peer network
o Client/Server network

Peer-To-Peer network
o Peer-To-Peer network is a network in which all the computers are linked
together with equal privilege and responsibilities for processing the data.
o Peer-To-Peer network is useful for small environments, usually up to 10
computers.
o Peer-To-Peer network has no dedicated server.
o Special permissions are assigned to each computer for sharing the resources,
but this can lead to a problem if the computer with the resource is down.
Advantages of Peer-To-Peer Network:
o It is less costly as it does not contain any dedicated server.
o If one computer stops working but, other computers will not stop working.
o It is easy to set up and maintain as each computer manages itself.

Disadvantages of Peer-To-Peer Network:


o In the case of Peer-To-Peer network, it does not contain the centralized system.
Therefore, it cannot back up the data as the data is different in different
locations.
o It has a security issue as the device is managed itself.

Client/Server Network
o Client/Server network is a network model designed for the end users called
clients, to access the resources such as songs, video, etc. from a central
computer known as Server.
o The central controller is known as a server while all other computers in the
network are called clients.
o A server performs all the major operations such as security and network
management.
o A server is responsible for managing all the resources such as files, directories,
printer, etc.
o All the clients communicate with each other through a server. For example, if
client1 wants to send some data to client 2, then it first sends the request to the
server for the permission. The server sends the response to the client 1 to initiate
its communication with the client 2.

Advantages of Client/Server network:


o A Client/Server network contains the centralized system. Therefore, we can back
up the data easily.
o A Client/Server network has a dedicated server that improves the overall
performance of the whole system.
o Security is better in Client/Server network as a single server administers the
shared resources.
o It also increases the speed of the sharing resources.

Disadvantages of Client/Server network:


o Client/Server network is expensive as it requires the server with large memory.
o A server has a Network Operating System(NOS) to provide the resources to the
clients, but the cost of NOS is very high.
o It requires a dedicated network administrator to manage all the resources.

Computer Network Types


o A computer network is a group of computers linked to each other that enables
the computer to communicate with another computer and share their
resources, data, and applications.
o A computer network can be categorized by their size. A computer network is
mainly of four types:

o LAN (Local Area Network)


o PAN (Personal Area Network)
o MAN (Metropolitan Area Network)
o WAN (Wide Area Network)

LAN (Local Area Network)


o Local Area Network is a group of computers connected to each other in a small
area such as building, office.
o LAN is used for connecting two or more personal computers through a
communication medium such as twisted pair, coaxial cable, etc.
o It is less costly as it is built with inexpensive hardware such as hubs, network
adapters, and Ethernet cables.
o The data is transferred at an extremely faster rate in Local Area Network.
o Local Area Network provides higher security.

PAN (Personal Area Network)


o Personal Area Network is a network arranged within an individual person,
typically within a range of 10 meters.
o Personal Area Network is used for connecting the computer devices of personal
use is known as Personal Area Network.
o Thomas Zimmerman was the first research scientist to bring the idea of the
Personal Area Network.
o Personal Area Network covers an area of 30 feet.
o Personal computer devices that are used to develop the personal area network
are the laptop, mobile phones, media player and play stations.

There are two types of Personal Area Network:


o Wired Personal Area Network
o Wireless Personal Area Network

Wireless Personal Area Network: Wireless Personal Area Network is developed by


simply using wireless technologies such as Wi-Fi, Bluetooth. It is a low range network.

wired Personal Area Network: Wired Personal Area Network is created by using the
USB.

Examples of Personal Area Network:


o Body Area Network: Body Area Network is a network that moves with a
person. For example, a mobile network moves with a person. Suppose a person
establishes a network connection and then creates a connection with another
device to share the information.
o Offline Network: An offline network can be created inside the home, so it is
also known as a home network. A home network is designed to integrate the
devices such as printers, computer, television but they are not connected to the
internet.
o Small Home Office: It is used to connect a variety of devices to the internet
and to a corporate network using a VPN

MAN (Metropolitan Area Network)


o A metropolitan area network is a network that covers a larger geographic area
by interconnecting a different LAN to form a larger network.
o Government agencies use MAN to connect to the citizens and private industries.
o In MAN, various LANs are connected to each other through a telephone
exchange line.
o The most widely used protocols in MAN are RS-232, Frame Relay, ATM, ISDN,
OC-3, ADSL, etc.
o It has a higher range than Local Area Network(LAN).

Uses of Metropolitan Area Network:


o MAN is used in communication between the banks in a city.
o It can be used in an Airline Reservation.
o It can be used in a college within a city.
o It can also be used for communication in the military.

WAN (Wide Area Network)


o A Wide Area Network is a network that extends over a large geographical area
such as states or countries.
o A Wide Area Network is quite bigger network than the LAN.
o A Wide Area Network is not limited to a single location, but it spans over a large
geographical area through a telephone line, fibre optic cable or satellite links.
o The internet is one of the biggest WAN in the world.
o A Wide Area Network is widely used in the field of Business, government, and
education.

Examples of Wide Area Network:


o Mobile Broadband: A 4G network is widely used across a region or country.
o Last mile: A telecom company is used to provide the internet services to the
customers in hundreds of cities by connecting their home with fibre.
o Private network: A bank provides a private network that connects the 44
offices. This network is made by using the telephone leased line provided by
the telecom company.

Advantages of Wide Area Network:


Following are the advantages of the Wide Area Network:

o Geographical area: A Wide Area Network provides a large geographical area.


Suppose if the branch of our office is in a different city then we can connect
with them through WAN. The internet provides a leased line through which we
can connect with another branch.
o Centralized data: In case of WAN network, data is centralized. Therefore, we
do not need to buy the emails, files or back up servers.
o Get updated files: Software companies work on the live server. Therefore, the
programmers get the updated files within seconds.
o Exchange messages: In a WAN network, messages are transmitted fast. The
web application like Facebook, WhatsApp, Skype allows you to communicate
with friends.
o Sharing of software and resources: In WAN network, we can share the
software and other resources like a hard drive, RAM.
o Global business: We can do the business over the internet globally.
o High bandwidth: If we use the leased lines for our company then this gives the
high bandwidth. The high bandwidth increases the data transfer rate which in
turn increases the productivity of our company.

Disadvantages of Wide Area Network:


The following are the disadvantages of the Wide Area Network:

o Security issue: A WAN network has more security issues as compared to LAN
and MAN network as all the technologies are combined together that creates
the security problem.
o Needs Firewall & antivirus software: The data is transferred on the internet
which can be changed or hacked by the hackers, so the firewall needs to be
used. Some people can inject the virus in our system so antivirus is needed to
protect from such a virus.
o High Setup cost: An installation cost of the WAN network is high as it involves
the purchasing of routers, switches.
o Troubleshooting problems: It covers a large area so fixing the problem is
difficult.

What is Network Topology?


o Topology defines the structure of the network of how all the components are
interconnected to each other. There are two types of topology: physical and
logical topology.

Types of Network Topology


o Physical topology is the geometric representation of all the nodes in a network.
There are six types of network topology which are Bus Topology, Ring Topology,
Tree Topology, Star Topology, Mesh Topology, and Hybrid Topology.

o 1) Bus Topology
o The bus topology is designed in such a way that all the stations are connected
through a single cable known as a backbone cable.
o Each node is either connected to the backbone cable by drop cable or directly
connected to the backbone cable.
o When a node wants to send a message over the network, it puts a message over
the network. All the stations available in the network will receive the message
whether it has been addressed or not.
o The bus topology is mainly used in 802.3 (ethernet) and 802.4 standard
networks.
o The configuration of a bus topology is quite simpler as compared to other
topologies.
o The backbone cable is considered as a "single lane" through which the
message is broadcast to all the stations.
o The most common access method of the bus topologies is CSMA (Carrier Sense
Multiple Access).

Advantages of Bus topology:

o Low-cost cable: In bus topology, nodes are directly connected to the cable
without passing through a hub. Therefore, the initial cost of installation is low.
o Moderate data speeds: Coaxial or twisted pair cables are mainly used in bus-
based networks that support up to 10 Mbps.
o Familiar technology: Bus topology is a familiar technology as the installation
and troubleshooting techniques are well known, and hardware components are
easily available.
o Limited failure: A failure in one node will not have any effect on other nodes.

Disadvantages of Bus topology:

o Extensive cabling: A bus topology is quite simpler, but still it requires a lot of
cabling.
o Difficult troubleshooting: It requires specialized test equipment to determine
the cable faults. If any fault occurs in the cable, then it would disrupt the
communication for all the nodes.
o Signal interference: If two nodes send the messages simultaneously, then the
signals of both the nodes collide with each other.
o Reconfiguration difficult: Adding new devices to the network would slow
down the network.
o Attenuation: Attenuation is a loss of signal leads to communication issues.
Repeaters are used to regenerate the signal.
2) Ring Topology

o Ring topology is like a bus topology, but with connected ends.


o The node that receives the message from the previous computer will retransmit
to the next node.
o The data flows in one direction, i.e., it is unidirectional.
o The data flows in a single loop continuously known as an endless loop.
o It has no terminated ends, i.e., each node is connected to other node and having
no termination point.
o The data in a ring topology flow in a clockwise direction.
o The most common access method of the ring topology is token passing.
o Token passing: It is a network access method in which token is passed
from one node to another node.
o Token: It is a frame that circulates around the network.

Working of Token passing


o A token move around the network, and it is passed from computer to computer
until it reaches the destination.
o The sender modifies the token by putting the address along with the data.
o The data is passed from one device to another device until the destination
address matches. Once the token received by the destination device, then it
sends the acknowledgment to the sender.
o In a ring topology, a token is used as a carrier.

Advantages of Ring topology:

o Network Management: Faulty devices can be removed from the network


without bringing the network down.
o Product availability: Many hardware and software tools for network operation
and monitoring are available.
o Cost: Twisted pair cabling is inexpensive and easily available. Therefore, the
installation cost is very low.
o Reliable: It is a more reliable network because the communication system is
not dependent on the single host computer.

Disadvantages of Ring topology:

o Difficult troubleshooting: It requires specialized test equipment to determine


the cable faults. If any fault occurs in the cable, then it would disrupt the
communication for all the nodes.
o Failure: The breakdown in one station leads to the failure of the overall
network.
o Reconfiguration difficult: Adding new devices to the network would slow
down the network.
o Delay: Communication delay is directly proportional to the number of nodes.
Adding new devices increases the communication delay.

3) Star Topology

o Star topology is an arrangement of the network in which every node is


connected to the central hub, switch or a central computer.
o The central computer is known as a server, and the peripheral devices attached
to the server are known as clients.
o Coaxial cable or RJ-45 cables are used to connect the computers.
o Hubs or Switches are mainly used as connection devices in a physical star
topology.
o Star topology is the most popular topology in network implementation.

Advantages of Star topology


o Efficient troubleshooting: Troubleshooting is quite efficient in a star topology
as compared to bus topology. In a bus topology, the manager has to inspect
the kilometres of cable. In a star topology, all the stations are connected to the
centralized network. Therefore, the network administrator has to go to the
single station to troubleshoot the problem.
o Network control: Complex network control features can be easily
implemented in the star topology. Any changes made in the star topology are
automatically accommodated.
o Limited failure: As each station is connected to the central hub with its own
cable, therefore failure in one cable will not affect the entire network.
o Familiar technology: Star topology is a familiar technology as its tools are
cost-effective.
o Easily expandable: It is easily expandable as new stations can be added to the
open ports on the hub.
o Cost effective: Star topology networks are cost-effective as it uses inexpensive
coaxial cable.
o High data speeds: It supports a bandwidth of approx 100Mbps. Ethernet
100BaseT is one of the most popular Star topology networks.

Disadvantages of Star topology

o A Central point of failure: If the central hub or switch goes down, then all the
connected nodes will not be able to communicate with each other.
o Cable: Sometimes cable routing becomes difficult when a significant amount
of routing is required.

4) Tree topology

o Tree topology combines the characteristics of bus topology and star topology.
o A tree topology is a type of structure in which all the computers are connected
with each other in hierarchical fashion.
o The top-most node in tree topology is known as a root node, and all other
nodes are the descendants of the root node.
o There is only one path exists between two nodes for the data transmission. Thus,
it forms a parent-child hierarchy.

Advantages of Tree topology

o Support for broadband transmission: Tree topology is mainly used to provide


broadband transmission, i.e., signals are sent over long distances without being
attenuated.
o Easily expandable: We can add the new device to the existing network.
Therefore, we can say that tree topology is easily expandable.
o Easily manageable: In tree topology, the whole network is divided into
segments known as star networks which can be easily managed and maintained.
o Error detection: Error detection and error correction are very easy in a tree
topology.
o Limited failure: The breakdown in one station does not affect the entire
network.
o Point-to-point wiring: It has point-to-point wiring for individual segments.

Disadvantages of Tree topology

o Difficult troubleshooting: If any fault occurs in the node, then it becomes


difficult to troubleshoot the problem.
o High cost: Devices required for broadband transmission are very costly.
o Failure: A tree topology mainly relies on main bus cable and failure in main bus
cable will damage the overall network.
o Reconfiguration difficult: If new devices are added, then it becomes difficult
to reconfigure.

5) Mesh topology
o Mesh technology is an arrangement of the network in which computers are
interconnected with each other through various redundant connections.
o There are multiple paths from one computer to another computer.
o It does not contain the switch, hub or any central computer which acts as a
central point of communication.
o The Internet is an example of the mesh topology.
o Mesh topology is mainly used for WAN implementations where communication
failures are a critical concern.
o Mesh topology is mainly used for wireless networks.
o Mesh topology can be formed by using the formula:
Number of cables = (n*(n-1))/2;

Where n is the number of nodes that represents the network.

Mesh topology is divided into two categories:

o Fully connected mesh topology


o Partially connected mesh topology

o Full Mesh Topology: In a full mesh topology, each computer is connected to


all the computers available in the network.
o Partial Mesh Topology: In a partial mesh topology, not all but certain
computers are connected to those computers with which they communicate
frequently.

Advantages of Mesh topology:

Reliable: The mesh topology networks are very reliable as if any link breakdown will
not affect the communication between connected computers.

Fast Communication: Communication is very fast between the nodes.

Easier Reconfiguration: Adding new devices would not disrupt the communication
between other devices.
Disadvantages of Mesh topology

o Cost: A mesh topology contains a large number of connected devices such as


a router and more transmission media than other topologies.
o Management: Mesh topology networks are very large and very difficult to
maintain and manage. If the network is not monitored carefully, then the
communication link failure goes undetected.
o Efficiency: In this topology, redundant connections are high that reduces the
efficiency of the network.

6) Hybrid Topology

o The combination of various different topologies is known as Hybrid topology.


o A Hybrid topology is a connection between different links and nodes to transfer
the data.
o When two or more different topologies are combined together is termed as
Hybrid topology and if similar topologies are connected with each other will
not result in Hybrid topology. For example, if there exist a ring topology in one
branch of ICICI bank and bus topology in another branch of ICICI bank,
connecting these two topologies will result in Hybrid topology.

Advantages of Hybrid Topology

o Reliable: If a fault occurs in any part of the network will not affect the
functioning of the rest of the network.
o Scalable: Size of the network can be easily expanded by adding new devices
without affecting the functionality of the existing network.
o Flexible: This topology is very flexible as it can be designed according to the
requirements of the organization.
o Effective: Hybrid topology is very effective as it can be designed in such a way
that the strength of the network is maximized and weakness of the network is
minimized.

Disadvantages of Hybrid topology

o Complex design: The major drawback of the Hybrid topology is the design of
the Hybrid network. It is very difficult to design the architecture of the Hybrid
network.
o Costly Hub: The Hubs used in the Hybrid topology are very expensive as these
hubs are different from usual Hubs used in other topologies.
o Costly infrastructure: The infrastructure cost is very high as a hybrid network
requires a lot of cabling, network devices, etc.

Introduction to IoT
IoT stands for Internet of Things. It refers to the interconnectedness of physical
devices, such as appliances and vehicles, that are embedded with software,
sensors, and connectivity which enables these objects to connect and
exchange data. This technology allows for the collection and sharing of data
from a vast network of devices, creating opportunities for more efficient and
automated systems.
Internet of Things (IoT) is the networking of physical objects that contain
electronics embedded within their architecture in order to communicate and
sense interactions amongst each other or with respect to the external
environment. In the upcoming years, IoT-based technology will offer advanced
levels of services and practically change the way people lead their daily lives.
Advancements in medicine, power, gene therapies, agriculture, smart cities,
and smart homes are just a few of the categorical examples where IoT is
strongly established.
IOT is a system of interrelated things, computing devices, mechanical and
digital machines, objects, animals, or people that are provided with unique
identifiers. And the ability to transfer the data over a network requiring human-
to-human or human-to-computer interaction.
IoT is network of interconnected computing devices which
are embedded in everyday objects, enabling them to send
and receive data.
Over 9 billion ‘Things’ (physical objects) are currently connected to the
Internet, as of now. In the near future, this number is expected to rise to
a whopping 20 billion.

Internet of Things refers to the network of physical devices, vehicles, home


appliances, and other items embedded with electronics, software, sensors,
and network connectivity, allowing them to collect and exchange data. The IoT
enables these devices to interact with each other and with the environment
and enables the creation of smart systems and services.
Some examples of IoT devices include:
 Smart home devices such as thermostats, lighting systems, and security
systems.
 Wearables such as fitness trackers and smartwatches.
 Healthcare devices such as patient monitoring systems and wearable
medical devices.
 Industrial systems such as predictive maintenance systems and supply
chain management systems.
 Transportation systems such as connected cars and autonomous vehicles.
The IoT is transforming various industries, from healthcare and manufacturing
to transportation and energy. IoT devices generate vast amounts of data,
which can be analysed to improve operations, drive innovation, and create
new business opportunities.
IoT systems are typically composed of several components, including IoT
devices, communication networks, gateways, and cloud-based data
processing and storage systems. IoT devices use sensors and other
technologies to collect data, and then send that data to the cloud for analysis
and storage. The cloud also provides a centralized platform for managing and
controlling IoT devices and networks.
IoT development involves a wide range of technologies, including wireless
communication protocols, cloud computing, big data analytics, machine
learning, and security technologies.
Overall, the IoT is a rapidly growing and evolving field that has the potential to
revolutionize a wide range of industries and transform the way we live and
work. As IoT devices and systems become increasingly widespread, the
opportunities for innovation and growth in this field will continue to expand.
According to the definition of IoT, it is the way to interconnect with the help of
internet devices that can be embedded to implement the functionality in
everyday objects by enabling them to send and receive data. Today data is
everything and everywhere. Hence, IoT can also be defined as the analysis of
the data that generates a meaningful action, triggered subsequently after the
interchange of data. IoT can be used to build applications for agriculture,
assets tracking, energy sector, safety and security sector, defence, embedded
applications, education, waste management, healthcare product,
telemedicine, smart city applications, etc.
What are the characteristics of Internet of
Things(IoT)?
IoT connects devices, helps in collecting data from various sources, exchanges
data, analyses the information from sensors and multiple devices, and gives
perfect results in a short period.

With the help of IoT, we can handle outdoor things, household work, and
gadgets. Using it, you can control your ACs or any other electrical appliances.
It has spread worldwide because of its low cost and rapid growth and
productivity.

The Internet of things is beneficial technology that has not only made the world
advanced and updated but has also reduced laborious work. But how does it
work?

The important thing is the data. Once collected from different sources, the data
can be easily exchanged through the network and connection established. The
connection is established through mobiles or any other connected device via
the Internet and wireless connections.

But what makes this IoT so popular globally? For this, let's study the
characteristics of IoT.

10 Must-Know Characteristics of IoT


1. Connectivity
Connectivity is an essential feature of IoT. IoT lets you connect mobile phones,
laptops, and other internet devices. Any person can get information about
anything at any time and place.

IoT can connect through several wireless devices, like sensors, mobile phones,
trackers, etc. This way, the person will not have to wait for an internet
connection to operate a device.

2. Identity of Things
The collaboration of name and number gives an identity to an internet device.
Giving an identity to the device is an essential aspect of loT. Identity helps to
differentiate between various internet devices and select the device we want
to send the command.

Every device needs a different controlling power based on the type of data
provided. It is essential to give a unique identity to every device so that we
can set up passwords or other security means. For example, fingerprints, face
recognition IP addresses, and Face lock systems are several means of security
given to the different identified devices to protect them.

3. Intelligence
The intelligence of IoT devices depends on the sensors' intelligence. The
sensors send the data to the user for further analysis.

We need to update the IoT devices regularly to get the smart work done. It
adds to their features and makes them smarter.

4. Dynamic
We need to create IoT devices in a way that they can adapt to the environment.
For example, an AC should have a sensor that can send a signal to the cloud
and adjust it to the premises of the place. Similarly, the camera can easily
click photographs by adjusting to light situations, like day and night.

5. Scalability
Scalability means the amount of data one can handle efficiently. The IoT has
created a setup to handle enormous data and generate useful analysis.

6. Self-Upgradation
As we saw above, updating the software regularly is important. But who has
the time to remember to do that? Thus, with its artificial intelligence, IoT
upgrades itself without human help. It also allows the set up of a network for
the addition of any new IoT devices. Thus, the technology can quickly start
working without delay if the setup has already been done.

7. Architecture
The architecture of IoT is designed in a way that it is capable of supporting
various devices, technologies, and protocols. Its main work is to confirm
whether each connected device does not interfere with the other. This way,
the safety and security of each device's data are maintained.

8. Security
With the increasing number of IoT devices, issues regarding the security of
personal data have arisen. There might be a chance of data leakage as a large
amount of data is collected, exchanged, and generated. There is a chance of
personal data being transferred without approval, which is a matter of concern.
To overcome this challenge, IoT has created networks, systems, and devices
wherein privacy is well maintained. Maintaining safety and security is a big
dare for IoT. However, it still handles it without any disruption.

9. Network
With the increasing number of IoT devices in a network, it becomes difficult to
maintain communication for proper functioning. However, cloud service and
gateway are a few methods that can solve such problems.

Often, one device can use the connectivity of another device to establish
network connectivity even if the second device is not connected to a network.
Because IoT devices can communicate with one another, it is more effective
and adaptable than other current technologies.

10. Data
The data gathered from IoT devices are analysed for future prediction. For
example, a calorie meter. It helps to regulate the number of calories each day.
We also have fitness data, thermostats, and various devices that monitor our
health. Therefore, we can use the data collected through these devices.

Evolution of IoT
Over the Years with the rising adoption of the Internet of Things (IoT), the
modern world is becoming broader and faster in terms of connectivity. As we
know, IoT refers to the millions of physical devices that are connected to the
internet and provides a platform for every industry to foster innovation and
productivity. Although the technology is in its infant stage, the potential it holds
for businesses is massive and it represents the next evolution of the connected
world where it won’t be remiss to say that – “Interconnectedness is the new
normal.”
1982 – Students invent a connected Coke machine. Students at Carnegie Mellon
University connected the department vending machine to the main computer
via the local network, enabling them to check if drinks were available and cold.
Not everyone liked Coke, but they all loved this invention.
1989 – The World Wide Web is invented British scientist Tim Berners-Lee
invented the World Wide Web (WWW) while working at CERN. The
Governmental system of satellites was complemented by privately held ones,
providing future IoT systems with communications. The first website that
Berners-Lee brought online from the Swiss Alps is still available.
1990-1993 – World’s first IoT device invented in 1990, John Romkey created the
first IOT device – a toaster that could be turned on and off over the Internet. By
1991, he had automated the entire process by adding a crane system that
inserted the bread as well. Then in 1993, the world's first webcam prototype,
the Trojan Room Coffee Pot, was installed at the University of Cambridge to
monitor the amount of coffee remaining in the brewing machine.
1998 – Mark Weiser creates a connected water fountain Father of ubiquitous
computing Mark Weiser created a fountain outside his office. The flow and the
height of the water mimicked the price trends and volume of the stock market
in real-time. The 2008 crisis would have been a spectacular sight.
1999 – “The Internet of Thing” is coined Kevin Ashton, the founder of Auto-ID,
titled a presentation he made at Procter & Gamble “The Internet of Things”.
Ashton linked the ideas of RFID (radio-frequency identification) and the Internet,
which impressed the listeners with its innovativeness. While his idea of RFID-
based device connectivity differs from today’s IP-based (Internet Protocol) IoT,
Ashton’s breakthrough played an essential role in IoT history and technological
development overall.
2005 – The first smart home device is created Originally released in June 2005,
the Nabaztag – an early version of smart home devices like Alexa and Google
Home – was an ambient electronic device shaped like a rabbit, able to alert its
owner and speak to them about the weather, stock market changes, RSS feeds,
etc. In 2019, the iconic bunny made a comeback for a limited time with a new
Raspberry Pi brain.
2008-2009 – IoT is born According to Cisco IBSG*, IoT was conceived between
2008 and 2009, when the number of connected machines surpassed the number
of humans on the planet. Currently, there are about 21.5 billion connected
devices in the world – almost three times the number of people on the planet
2011 – IoT added to the hype-cycle for emerging technologies in 2011, Gartner,
the market research company that invented the famous “hype-cycle for
emerging technologies”, included “The Internet of Things” on their list. This
year, Gartner named Vodafone as a Leader in its 2021 Magic Quadrant for
Managed IoT Connectivity Services for the seventh time in a row.
2013-2014 – IoT devices start using sensors Thermostats and home lighting
started using sensors to accurately sense the surrounding environment. This
allowed people to control home lighting, garage doors and thermostats all from
their phone.
2014 – The first “smart city” is created as a smart city “testbed”, Smart
Docklands in Dublin provided a platform for innovators to test cutting-edge
technology solutions to local challenges, such as smart bins, sensors monitoring
flood levels and city sound monitoring sensors.
2018 – IoT enters the healthcare and health insurance industries Healthcare
devices represent one of the fastest-growing sectors of the IoT market. The
value of this sector – sometimes called the Internet of Medical Things (IoMT) –
is predicted to reach $176 billion by 2026. IoT technology allows healthcare
professionals to access patient data and improve the quality of wearable
medical devices. Medical IoT solutions include blood glucose and heart rate
monitoring, pacemakers, fall detection, geofencing and location monitoring.
2020 – IoT steps up in response to the COVID-19 crisis
In 2020, heat detection cameras started popping up in all sorts of public spaces
to measure people’s temperature. Using infrared technology, thermal cameras
detect radiating heat from a body. Although these devices were originally not
designed to be used for medical purposes – they are often deployed by
firefighters to track smouldering embers and police to search for out-of-sight
suspects
2021 - FIA creates IoT forum
The FIA IoT Forum provides a great opportunity for FIA members to work with
other members under the banner of the FIA as the industry-leading voice to
enable the fire industry and the customers we serve to benefit from IoT.

2023
The Internet of Things (IoT) has continued to expand its influence across
industries and sectors, transforming the way we live and work. As we move into
the second half of 2023, it’s essential to examine the key trends and
developments that have shaped the IoT landscape so far this year. From
advancements in connectivity to the proliferation of edge computing, let’s delve
into the noteworthy progressions in the world of IoT.
5G Accelerating IoT Adoption The deployment of 5G networks has been a game-
changer for IoT. With its enhanced speed, lower latency, and massive
connectivity, 5G has paved the way for the widespread adoption of IoT devices
and applications. The high bandwidth and increased capacity of 5G networks
have fuelled the growth of connected devices across various domains, including
smart cities, industrial automation, and healthcare.
Edge Computing Takes Centre Stage
Edge computing has emerged as a critical component of the IoT ecosystem. By
processing data closer to the source, at the edge of the network, edge
computing minimises latency, reduces bandwidth usage, and enhances overall
system efficiency. In 2023, we witnessed a surge in edge computing
infrastructure as organisations sought to leverage its benefits for real-time
analytics, AI-driven decision-making, and improved security.
AI and Machine Learning Empowering IoT
The convergence of AI and IoT has continued to reshape industries. AI-powered
analytics and machine learning algorithms enable IoT devices to extract
actionable insights from massive amounts of data. So far 2023, we’ve witnessed
significant advancements in AI-driven IoT applications, such as predictive
maintenance, intelligent energy management, and personalised healthcare.
These innovations have revolutionised business operations, optimising
efficiency and driving cost savings.
Enhanced Security and Privacy Measures
As the number of connected devices continues to rise, ensuring robust security
and privacy measures within the IoT ecosystem has become paramount. In
2023, there has been a significant focus on strengthening IoT security
frameworks. This includes the implementation of end-to-end encryption,
biometric authentication, and block chain technology to safeguard sensitive
data and protect against cyber threats.
The Adoption of eSIM for IoT
eSIM technology for IoT has continued to improve interoperability between
different eSIM-enabled devices and networks, enhanced security measures to
protect IoT devices from cyber threats, and streamlined provisioning processes
for seamless connectivity. Not only this but eSIM for IoT has boosted
developments in remote management capabilities, enabling more efficient
monitoring, updates, and troubleshooting of IoT devices. Sustainability and
Green IoT
With an increased focus on sustainability, IoT has embraced environmentally
conscious practices. The integration of IoT devices in energy management
systems, waste management, and smart grids has enabled efficient resource
allocation and reduced environmental impact. Furthermore, the development
of low-power IoT devices and the utilisation of renewable energy sources have
contributed to the growth of green IoT solutions.
What is the Architecture of Internet of
Things (IoT)?
Internet of Things (IoT) is a system of interrelated, internet-connected objects
which are able to collect and transfer data over a wireless network without
human intervention.

For example, smart fitness bands or watches, driverless cars or drones, smart
homes that can be unlocked through smartphones and smart cars, etc.

Architecture of IoT
There are different phases in the architecture of IoT but they can vary
according to the situations but generally, there are these four phases in
the architecture of IoT −

Networked Devices
These are the physical devices which include sensors, actuators, and
transducers. These are the actual devices that collect and send the data for
processing. They are capable of receiving real-time data and they can convert
the physical quantities into electrical signals which can be sent through a
network.

Data Aggregation
It is a very important stage as it includes converting the raw data collected by
sensors into meaningful data which can be used to take actions. It also includes
Data Acquisition Systems and Internet Gateways. It converts the Analog
signals provided by sensors into digital signals.

Final Analysis
This is a stage that includes edge IT analytics and the processing of data to
make it more efficient and fully capable of execution. It also includes managing
and locating all the devices correctly

Cloud Analysis
The final data is received here and analysed closely and precisely in data
centres. They process and clean the data to make it free from any kind of
errors and missing values. After this stage, data is ready to be sent back and
executed to perform operations.
1 Sensing Layer − The first stage of IoT includes sensors, devices, actuators etc.
which collect data from the physical environment, processes it and then sends it over the
network.

The Sensor layer contains sensors and actuators, including some


other devices. The sensors and actuators process the received data
and transmit it over the network. The physical characteristics in the
real world are captured by sensors that are part of the IoT
architecture's fundamental level. Temperature, smoke, air, moisture,
and other factors are examples of parameters.

2 Network Layer /Transport/Connectivity Layer


The second stage of the IoT consists of Network Gateways and Data
Acquisition Systems. DAS converts the analogue data (collected from
Sensors) into Digital Data. It also performs malware detection and
data management.
The Connectivity layer is the second layer between the
physical devices and IoT architecture. The purpose of this
layer is to transport the data from devices to the internet
using gateways or edge devices. The communication could
either be done using direct TCP or UDP communications, or
it could be done using gateways which can work as a link
between LAN and WAN.

3.Data Processing Layer − The third stage of IoT is the most


important stage. Here, data is pre-processed on its variety and
separated accordingly. After this, it is sent to Data Centres. Here
Edge IT comes into use.
IoT systems are made to gather, store, and process data for this layer's
higher requirements. There are two main phases in the processing layer.
Data Accumulation
Millions of data streams are sent across the IoT network by every device.
Different formats, rates, and sizes of data are present here. Professionals
must emphasize separating the crucial data from these massive streams
as their top priority in this tier. Unstructured data in its raw forms,
including photo and video streams, can be pretty large; therefore,
gathering intelligence for the business requires efficiency. Professionals
must have a solid understanding of corporate practices to accurately
identify data requirements and certain future advantages.

Data Abstraction
After all the data is collected, some vast data is extracted to get valuable
insights that can benefit businesses. The data abstraction can be done as
follows −

 Collecting all information from IoT systems as well as from the non-IoT systems
 Making data available from a single location by use of data virtualization
 Managing various forms of raw data

In the processor layer, device and architectural interoperability are critical.


Once the data has been accumulated and abstracted, it is simple for data
analysts to use their business acumen to find intelligence elements.

Application Layer − The fourth stage of IoT consists of Cloud/Data Centres where
data is managed and used by applications like agriculture, defence, health care etc.

This layer is located in the cloud and generates reports via web
interfaces and email delivery for end users' applications.

Each IoT system has specific aims and objectives to meet business
requirements. Currently, most IoT applications operate on various
technology stacks and at varying levels of sophistication, carrying out
particular duties for organizations.

Advantages
The advantages of IoT are as follows −

 Cost Reduction − IOT devices catch any problem very fast as compared to traditional
troubleshooting. It not only saves time but also saves costs of large repairs.
 Efficiency and Productivity − An automated PDF conversion and creation tool will
remove the hustle of PDF editing and archiving. Hence, increase in Efficiency and
Productivity.
 Business Opportunities − IOT provides advanced analytics, smart utility grids which
help Small Management Businesses to provide more valuable content and things to
their customers.
 Customer Experience − Nowadays customer's experience is the most valuable thing
in running a business. IoT has drastically increased the customer's experience. An
example of customer experience is Home Automation. Since everything is connected,
customers need not have to worry about appliances. One can turn off the appliance
through mobile.
 Mobility and Agility − With the help of IoT, employees can do their work from any
geographical location, anytime without any restrictions.

Disadvantages
The disadvantages of IoT are as follows −

 Security − The data is travelling all over the Internet. So maintaining its privacy is still
a Big Challenge. End-to-end Encryption is a must in IoT.
 Compatibility − There is no International Standard for the monitoring of the
equipment.
 Complexity − Most of the devices still contain some software bugs. Each device must
be able to seamlessly interact with other devices in the network.
 Safety − Suppose a patient is left unattended by a doctor. And some notorious guy
changes the prescription or Health monitoring devices malfunctioned. Then it can
result in the death of the patient.
Policies − Government authorities must take some steps to make

Internet of Things (IoT) includes large number of smart devices connected to


a broad internet network with the help of various networking technologies.
Mostly these technologies are wireless in manner. This makes the structure
more complex and difficult to manage. Therefore, architecture is required.
An architecture is structure for specification of network’s physical
components and their functional organization and configuration, its
operational principles and procedures, as well as data formats used in its
operation.
The development of IoT depends on the technologies used, application
areas, and business aspects. There are various IoT architectures are
available for IoT devices. However, the “5 Layer Architecture is considered
as the best-proposed architecture of IoT.”
5 Layer Architecture of IoT :
When project work is done with various cutting edge technologies and broad
application area, 5 layer architecture is considered as best. 5 Layer model
can be considered as an extension to the basic architecture of IoT because it
has two additional layers to the basic model.
5 Layer Architecture of Internet of Things

 Perception Layer :
This is the first layer of IoT architecture. In the perception layer, number
of sensors and actuators are used to gather useful information like
temperature, moisture content, intruder detection, sounds, etc. The main
function of this layer is to get information from surroundings and to pass
data to another layer so that some actions can be done based on that
information.
 Network Layer :
As the name suggests, it is the connecting layer between perception and
middleware layer. It gets data from perception layer and passes data to
middleware layer using networking technologies like 3G, 4G, UTMS, Wi-
Fi, infrared, etc. This is also called communication layer because it is
responsible for communication between perception and middleware layer.
All the transfer of data done securely keeping the obtained data
confidential.
 Middleware Layer :
Middleware Layer has some advanced features like storage, computation,
processing, action taking capabilities. It stores all data-set and based on
the device address and name it gives appropriate data to that device. It
can also take decisions based on calculations done on data-set obtained
from sensors.
 Application Layer :
The application layer manages all application process based on
information obtained from middleware layer. This application involves
sending emails, activating alarm, security system, turn on or off a device,
smartwatch, smart agriculture, etc.
 Business Layer :
The success of any device does not depend only on technologies used in
it but also how it is being delivered to its consumers. Business layer does
these tasks for the device. It involves making flowcharts, graphs, analysis
of results, and how device can be improved, etc.

IoT (internet of things) enabling technologies are


1. Wireless Sensor Network
2. Cloud Computing
3. Big Data Analytics
4. Communications Protocols
5. Embedded System
1. Wireless Sensor Network(WSN) :
A WSN comprises distributed devices with sensors which are used to
monitor the environmental and physical conditions. A wireless sensor
network consists of end nodes, routers and coordinators. End nodes have
several sensors attached to them where the data is passed to a coordinator
with the help of routers. The coordinator also acts as the gateway that
connects WSN to the internet.
Example –
 Weather monitoring system
 Indoor air quality monitoring system
 Soil moisture monitoring system
 Surveillance system
 Health monitoring system
 Wireless Sensor Network (WSN) is an infrastructure-less wireless
network that is deployed in a large number of wireless sensors in an
ad-hoc manner that is used to monitor the system, physical or
environmental conditions.
 Sensor nodes are used in WSN with the on-board processor that
manages and monitors the environment in a particular area. They are
connected to the Base Station which acts as a processing unit in the
WSN System.
Base Station in a WSN System is connected through the Internet to
share data.


WSN can be used for processing, analysis, storage, and mining of the data.
Applications of WSN:

1. Internet of Things (IoT)


2. Surveillance and Monitoring for security, threat detection
3. Environmental temperature, humidity, and air pressure
4. Noise Level of the surrounding
5. Medical applications like patient monitoring
6. Agriculture
7. Landslide Detection
Challenges of WSN:

1. Quality of Service
2. Security Issue
3. Energy Efficiency
4. Network Throughput
5. Performance
6. Ability to cope with node failure
7. Cross layer optimisation
8. Scalability to large scale of deployment
A modern Wireless Sensor Network (WSN) faces several challenges,
including:
 Limited power and energy: WSNs are typically composed of battery-
powered sensors that have limited energy resources. This makes it
challenging to ensure that the network can function for
long periods of time without the need for frequent battery replacements.
 Limited processing and storage capabilities: Sensor nodes in a WSN
are typically small and have limited processing and storage capabilities.
This makes it difficult to perform complex tasks or store large amounts of
data.
 Heterogeneity: WSNs often consist of a variety of different sensor types
and nodes with different capabilities. This makes it challenging to ensure
that the network can function effectively and
efficiently.
 Security: WSNs are vulnerable to various types of attacks, such as
eavesdropping, jamming, and spoofing. Ensuring the security of the
network and the data it collects is a major challenge.
 Scalability: WSNs often need to be able to support a large number of
sensor nodes and handle large amounts of data. Ensuring that the
network can scale to meet these demands is a significant
challenge.
 Interference: WSNs are often deployed in environments where there is a
lot of interference from other wireless devices. This can make it difficult to
ensure reliable communication between sensor nodes.
 Reliability: WSNs are often used in critical applications, such as
monitoring the environment or controlling industrial processes. Ensuring
that the network is reliable and able to function correctly
in all conditions is a major challenge.
Components of WSN:
1. Sensors:
Sensors in WSN are used to capture the environmental variables and
which is used for data acquisition. Sensor signals are converted into
electrical signals.
2. Radio Nodes:
It is used to receive the data produced by the Sensors and sends it to the
WLAN access point. It consists of a microcontroller, transceiver, external
memory, and power source.
3. WLAN Access Point:
It receives the data which is sent by the Radio nodes wirelessly, generally
through the internet.
4. Evaluation Software:
The data received by the WLAN Access Point is processed by a software
called as Evaluation Software for presenting the report to the users for
further processing of the data which can be used for processing, analysis,
storage, and mining of the data.
Advantages of Wireless Sensor Networks (WSN):
Low cost: WSNs consist of small, low-cost sensors that are easy to deploy,
making them a cost-effective solution for many applications.
Wireless communication: WSNs eliminate the need for wired connections,
which can be costly and difficult to install. Wireless communication also
enables flexible deployment and reconfiguration of the network.
Energy efficiency: WSNs use low-power devices and protocols to conserve
energy, enabling long-term operation without the need for frequent battery
replacements.
Scalability: WSNs can be scaled up or down easily by adding or removing
sensors, making them suitable for a range of applications
and environments.
Real-time monitoring: WSNs enable real-time monitoring of physical
phenomena in the environment, providing timely information for decision
making and control.
Disadvantages of Wireless Sensor Networks (WSN):
Limited range: The range of wireless communication in WSNs is limited,
which can be a challenge for large-scale deployments or in environments
with obstacles that obstruct radio signals.
Limited processing power: WSNs use low-power devices, which may have
limited processing power and memory, making it difficult to perform complex
computations or support advanced applications.
Data security: WSNs are vulnerable to security threats, such as
eavesdropping, tampering, and denial of service attacks, which can
compromise the confidentiality, integrity, and availability of data.
Interference: Wireless communication in WSNs can be susceptible to
interference from other wireless devices or radio signals, which can degrade
the quality of data transmission.
Deployment challenges: Deploying WSNs can be challenging due to the
need for proper sensor placement, power management, and network
configuration, which can require significant time and resources.
while WSNs offer many benefits, they also have limitations and challenges
that must be considered when deploying and using them in real-world
applications.

What is Cloud Computing


The term cloud refers to a network or the internet. It is a technology that uses remote
servers on the internet to store, manage, and access data online rather than local
drives. The data can be anything such as files, images, documents, audio, video, and
more.

There are the following operations that we can do using cloud computing:

o Developing new applications and services


o Storage, back up, and recovery of data
o Hosting blogs and websites
o Delivery of software on demand
o Analysis of data
o Streaming videos and audios

Why Cloud Computing?


Small as well as large IT companies, follow the traditional methods to provide the IT
infrastructure. That means for any IT company, we need a Server Room that is the
basic need of IT companies.

In that server room, there should be a database server, mail server, networking,
firewalls, routers, modem, switches, QPS (Query Per Second means how much queries
or load will be handled by the server), configurable system, high net speed, and the
maintenance engineers.

To establish such IT infrastructure, we need to spend lots of money. To overcome all


these problems and to reduce the IT infrastructure cost, Cloud Computing comes into
existence.
Characteristics of Cloud Computing
The characteristics of cloud computing are given below:

1) Agility

The cloud works in a distributed computing environment. It shares resources


among users and works very fast.

2) High availability and reliability

The availability of servers is high and more reliable because the chances of
infrastructure failure are minimum.

3) High Scalability

Cloud offers "on-demand" provisioning of resources on a large scale, without


having engineers for peak loads.

4) Multi-Sharing

With the help of cloud computing, multiple users and applications can work more
efficiently with cost reductions by sharing common infrastructure.

5) Device and Location Independence

Cloud computing enables the users to access systems using a web browser regardless
of their location or what device they use e.g. PC, mobile phone, etc. As infrastructure
is off-site (typically provided by a third-party) and accessed via the Internet, users
can connect from anywhere.

6) Maintenance

Maintenance of cloud computing applications is easier, since they do not need to be


installed on each user's computer and can be accessed from different places. So,
it reduces the cost also.

7) Low Cost

By using cloud computing, the cost will be reduced because to take the services of
cloud computing, IT company need not to set its own infrastructure and pay-as-
per usage of resources.

8) Services in the pay-per-use mode

Application Programming Interfaces (APIs) are provided to the users so that they
can access services on the cloud by using these APIs and pay the charges as per
the usage of services.

Types of Cloud
Cloud computing is a revolutionary technology transforming how we store, access, and
process data. It simply refers to delivering computing resources, such as servers,
storage, databases, software, and applications, over the Internet. Cloud computing
uses a network of remote computer systems housed on the net to save and process
data rather than relying on physical infrastructure.

Cloud service companies use advanced security techniques, which include encryption,
firewalls, and access restrictions, to secure your data from unauthorized access.
Moreover, because your information is saved in the cloud, it is secure even if your
nearby devices are damaged, misplaced, or stolen. Redundancy and cloud backups
guarantee that your data may be restored promptly and effectively in case of any
unexpected situations.

Types of Cloud
There are the following 5 types of cloud that you can deploy according to the
organization's needs-
Public Cloud
Public cloud is open to all to store and access information via the Internet using the
pay-per-usage method.

n public cloud, computing resources are managed and operated by the Cloud Service
Provider (CSP). The CSP looks after the supporting infrastructure and ensures that the
resources are accessible to and scalable for the users.

Due to its open architecture, anyone with an internet connection may use the public
cloud, regardless of location or company size. Users can use the CSP's numerous
services, store their data, and run apps. By using a pay-per-usage strategy, customers
can be assured that they will only be charged for the resources they actually use, which
is a smart financial choice.

Example: Amazon elastic compute cloud (EC2), IBM Smart Cloud Enterprise, Microsoft,
Google App Engine, Windows Azure Services Platform.
Characteristics of Public Cloud
The public cloud has the following key characteristics:

o Accessibility: Public cloud services are available to anyone with an internet


connection. Users can access their data and programs at any time and from
anywhere.
o Shared Infrastructure: Several users share the infrastructure in public cloud
settings. Cost reductions and effective resource use are made possible by this.
o Scalability: By using the public cloud, users can easily adjust the resources they
need based on their requirements, allowing for quick scaling up or down.
o Pay-per-Usage: When using the public cloud, payment is based on usage, so
users only pay for the resources they actually use. This helps optimize costs and
eliminates the need for upfront investments.
o Managed by Service Providers: Cloud service providers manage and maintain
public cloud infrastructure. They handle hardware maintenance, software
updates, and security tasks, relieving users of these responsibilities.
o Reliability and Redundancy: Public cloud providers ensure high reliability by
implementing redundant systems and multiple data centres. By doing this, the
probability of losing data and experiencing service disruptions is reduced.
o Security Measures: Public cloud providers implement robust security
measures to protect user data. These include encryption, access controls, and
regular security audits.

Advantages of Public Cloud


There are the following advantages of Public Cloud -

o Public cloud is owned at a lower cost than the private and hybrid cloud.
o Public cloud is maintained by the cloud service provider, so do not need to
worry about the maintenance.
o Public cloud is easier to integrate. Hence it offers a better flexibility approach
to consumers.
o Public cloud is location independent because its services are delivered through
the internet.
o Public cloud is highly scalable as per the requirement of computing resources.
o It is accessible by the general public, so there is no limit to the number of users.
o Rapid deployment of services and applications.
o Reduced time and effort in hardware procurement and setup.
o The cloud provider offers a range of services and resources that you can avail
of.
o Built-in redundancy and resilience for enhanced reliability.

Disadvantages of Public Cloud


o Public Cloud is less secure because resources are shared publicly.
o Performance depends upon the high-speed internet network link to the cloud
provider.
o The data is not under the control of the client.
o Dependency on the cloud service provider for availability and service level
agreements.
o Compliance challenges in meeting industry-specific regulations and standards.
o Risk of vendor lock-in and limited portability of applications and data.
o Concerns about data privacy and confidentiality.
o Potential for unexpected costs with usage-based pricing models.
o Lack of customization options and flexibility compared to private or hybrid
cloud environments.
o Reliance to the cloud provider's support and responsiveness for issue
resolution.

Private Cloud
Private cloud is also known as an internal cloud or corporate cloud. It is used by
organizations to build and manage their own data centres internally or by the third
party. It can be deployed using Open source tools such as Open stack and Eucalyptus.

Examples: VMware vSphere, OpenStack, Microsoft Azure Stack, Oracle Cloud at


Customer, and IBM Cloud Private.

Based on the location and management, National Institute of Standards and


Technology (NIST) divide private cloud into the following two parts-
o On-premise private cloud: An on premise private cloud is situated within the
physical infrastructure of the organization. It involves setting up and running a
specific data center that offers cloud services just for internal usage by the
company. The infrastructure is still completely under the hands of the
organization, which gives them the freedom to modify and set it up in any way
they see fit. Organizations can successfully manage security and compliance
issues with this degree of control. However, on premise private cloud setup and
management necessitate significant hardware, software, and IT knowledge
expenditures.
o Outsourced private cloud: An outsourced private cloud involves partnering
with a third-party service provider to host and manage the cloud infrastructure
on behalf of the organization. The provider may operate the private cloud in
their data centre or a colocation facility. In this arrangement, the organization
benefits from the expertise and resources of the service provider, alleviating the
burden of infrastructure management. The outsourced private cloud model
offers scalability, as the provider can adjust resources based on the
organization's needs. Due to its flexibility, it is a desirable choice for businesses
that desire the advantages of a private cloud deployment without the initial
capital outlay and ongoing maintenance expenses involved with an on premise
implementation.

Compared to public cloud options, both on premise and external private clouds give
businesses more control over their data, apps, and security. Private clouds are
particularly suitable for organizations with strict compliance requirements, sensitive
data, or specialized workloads that demand high levels of customization and security.

Characteristics of Private Cloud


The private cloud has the following key characteristics:

o Exclusive Use: Private cloud is dedicated to a single organization, ensuring the


resources and services are tailored to its needs. It is like having a personal cloud
environment exclusively for that organization.
o Control and Security: Private cloud offers organizations higher control and
security than public cloud options. Organizations have more control over data
governance, access controls, and security measures.
o Customization and Flexibility: Private cloud allows organizations to
customize the infrastructure according to their specific requirements. They can
configure resources, networks, and storage to optimize performance and
efficiency.
o Scalability and Resource Allocation: The private cloud can scale and allocate
resources. According to demand, businesses may scale up or down their
infrastructure, effectively using their resources.
o Performance and dependability: Private clouds give businesses more control
over the infrastructure at the foundation, improving performance and
dependability.
o Compliance and Regulatory Requirements: Organizations may more easily
fulfill certain compliance and regulatory standards using the private cloud. It
provides the freedom to put in place strong security measures, follow data
residency laws, and follow industry-specific norms.
o Hybrid Cloud Integration: Private cloud can be integrated with public cloud
services, forming a hybrid cloud infrastructure. This integration allows
organizations to leverage the benefits of both private and public clouds.

Advantages of Private Cloud


There are the following advantages of the Private Cloud -

o Private cloud provides a high level of security and privacy to the users.
o Private cloud offers better performance with improved speed and space
capacity.
o It allows the IT team to quickly allocate and deliver on-demand IT resources.
o The organization has full control over the cloud because it is managed by the
organization itself. So, there is no need for the organization to depends on
anybody.
o It is suitable for organizations that require a separate cloud for their personal
use and data security is the first priority.
o Customizable to meet specific business needs and compliance regulations.
o Higher reliability and uptime compared to public cloud environments.
o Seamless integration with existing on-premises systems and applications.
o Better compliance and governance capabilities for industry-specific regulations.
o Enhanced flexibility in resource allocation and application deployment.

Disadvantages of Private Cloud


o Skilled people are required to manage and operate cloud services.
o Private cloud is accessible within the organization, so the area of operations is
limited.
o Private cloud is not suitable for organizations that have a high user base, and
organizations that do not have the prebuilt infrastructure, sufficient manpower
to maintain and manage the cloud.
o Higher upfront costs and ongoing maintenance expenses.
o Scaling resources can be challenging compared to public or hybrid cloud
options.
o Relies on internal IT staff for management and troubleshooting.
o Slower deployment timelines and implementation compared to public cloud
solutions.
o Limited access to the latest advancements and innovations offered by public
cloud providers.
o Reduced flexibility and agility compared to public cloud options.
o Challenges in keeping up with hardware and software upgrades and
compatibility.
o Higher risks of technology becoming outdated and the need for regular
infrastructure updates.

Hybrid Cloud
o Hybrid Cloud is a combination of the public cloud and the private cloud. we can
say:

o
o Hybrid Cloud = Public Cloud + Private Cloud
o Hybrid cloud is partially secure because the services which are running on the
public cloud can be accessed by anyone, while the services which are running
on a private cloud can be accessed only by the organization's users. In a hybrid
cloud setup, organizations can leverage the benefits of both public and private
clouds to create a flexible and scalable computing environment. The public
cloud portion allows using cloud services provided by third-party providers,
accessible over the Internet.

Example: Google Application Suite (Gmail, Google Apps, and Google Drive), Office
365 (MS Office on the Web and One Drive), Amazon Web Services.

Characteristics of Hybrid Cloud


o Integration of Public and Private Clouds: Hybrid cloud seamlessly integrates
public and private clouds, allowing organizations to leverage both advantages.
It provides a unified platform where workloads and data can be deployed and
managed across both environments.
o Flexibility and Scalability: Hybrid cloud offers resource allocation and
scalability flexibility. Organizations can dynamically scale their infrastructure by
utilizing additional resources from the public cloud while maintaining control
over critical workloads on the private cloud.
o Enhanced Security and Control: Hybrid cloud allows organizations to
maintain higher security and control over their sensitive data and critical
applications. Private cloud components provide a secure and dedicated
environment, while public cloud resources can be used for non-sensitive tasks,
ensuring a balanced approach to data protection.
o Cost Optimization: Hybrid cloud enables organizations to optimize costs by
utilizing the cost-effective public cloud for non-sensitive workloads while
keeping mission-critical applications and data on the more cost-efficient private
cloud. This approach allows for efficient resource allocation and cost
management.
o Data and Application Portability: Organizations can move workloads and
data between public and private clouds as needed with a hybrid cloud. This
portability offers agility and the ability to adapt to changing business
requirements, ensuring optimal performance and responsiveness.
o Compliance and Regulatory Compliance: Hybrid cloud helps organizations
address compliance and regulatory requirements more effectively. Sensitive
data and applications can be kept within the private cloud, ensuring compliance
with industry-specific regulations while leveraging the public cloud for other
non-sensitive operations.
o Disaster Recovery and Business Continuity: Hybrid cloud facilitates robust
disaster recovery and business continuity strategies. Organizations can replicate
critical data and applications between the private and public clouds, ensuring
redundancy and minimizing the risk of data loss or service disruptions.

Advantages of Hybrid Cloud


There are the following advantages of Hybrid Cloud -

o Hybrid cloud is suitable for organizations that require more security than the
public cloud.
o Hybrid cloud helps you to deliver new products and services more quickly.
o Hybrid cloud provides an excellent way to reduce the risk.
o Hybrid cloud offers flexible resources because of the public cloud and secure
resources because of the private cloud.
o Hybrid facilitates seamless integration between on-premises infrastructure and
cloud environments.
o Hybrid provides greater control over sensitive data and compliance
requirements.
o Hybrid enables efficient workload distribution based on specific needs and
performance requirements.
o Hybrid offers cost optimization by allowing organizations to choose the most
suitable cloud platform for different workloads.
o Hybrid enhances business continuity and disaster recovery capabilities with
private and public cloud resources.
o Hybrid supports hybrid cloud architecture, allowing applications and data to be
deployed across multiple cloud environments based on their unique
requirements.

Disadvantages of Hybrid Cloud


o In Hybrid Cloud, security feature is not as good as the private cloud.
o Managing a hybrid cloud is complex because it is difficult to manage more than
one type of deployment model.
o In the hybrid cloud, the reliability of the services depends on cloud service
providers.
o Potential challenges in data integration and ensuring seamless connectivity
between different cloud platforms.
o Higher costs due to the need for managing and integrating multiple cloud
environments.
o Increased complexity in data governance and compliance management across
different cloud providers.
o Dependency on stable and high-bandwidth internet connections for efficient
hybrid cloud operations.
o Potential compatibility issues between various cloud platforms and
applications.
o Risk of vendor lock-in and limited portability of applications and data across
different cloud providers.
o Requires skilled IT staff with expertise in managing hybrid cloud environments.

Cloud Service Models


There are the following three types of cloud service models -

1. Infrastructure as a Service (IaaS)


2. Platform as a Service (PaaS)
3. Software as a Service (SaaS)
Infrastructure as a Service | IaaS
Iaas is also known as Hardware as a Service (HaaS). It is one of the layers of the cloud
computing platform. It allows customers to outsource their IT infrastructures such as
servers, networking, processing, storage, virtual machines, and other resources.
Customers access these resources on the Internet using a pay-as-per use model.

In traditional hosting services, IT infrastructure was rented out for a specific period of
time, with pre-determined hardware configuration. The client paid for the
configuration and time, regardless of the actual use. With the help of the IaaS cloud
computing platform layer, clients can dynamically scale the configuration to meet
changing requirements and are billed only for the services actually used.

IaaS cloud computing platform layer eliminates the need for every organization to
maintain the IT infrastructure.

IaaS is offered in three models: public, private, and hybrid cloud. The private cloud
implies that the infrastructure resides at the customer-premise. In the case of public
cloud, it is located at the cloud computing platform vendor's data center, and the
hybrid cloud is a combination of the two in which the customer selects the best of
both public cloud or private cloud.

IaaS provider provides the following services -

1. Compute: Computing as a Service includes virtual central processing units and


virtual main memory for the Vms that is provisioned to the end- users.
2. Storage: IaaS provider provides back-end storage for storing files.
3. Network: Network as a Service (NaaS) provides networking components such
as routers, switches, and bridges for the Vms.
4. Load balancers: It provides load balancing capability at the infrastructure layer.
Advantages of IaaS cloud computing layer
There are the following advantages of IaaS computing layer -

1. Shared infrastructure
IaaS allows multiple users to share the same physical infrastructure.

2. Web access to the resources


Iaas allows IT users to access resources over the internet.

3. Pay-as-per-use model
IaaS providers provide services based on the pay-as-per-use basis. The users are
required to pay for what they have used.

4. Focus on the core business


IaaS providers focus on the organization's core business rather than on IT
infrastructure.

5. On-demand scalability
On-demand scalability is one of the biggest advantages of IaaS. Using IaaS, users do
not worry about to upgrade software and troubleshoot the issues related to hardware
components.

Disadvantages of IaaS cloud computing layer


1. Security
Security is one of the biggest issues in IaaS. Most of the IaaS providers are not able to
provide 100% security.
2. Maintenance & Upgrade
Although IaaS service providers maintain the software, but they do not upgrade the
software for some organizations.
3. Interoperability issues
It is difficult to migrate VM from one IaaS provider to the other, so the customers
might face problem related to vendor lock-in.
Platform as a Service | PaaS
Platform as a Service (PaaS) provides a runtime environment. It allows programmers
to easily create, test, run, and deploy web applications. You can purchase these
applications from a cloud service provider on a pay-as-per use basis and access them
using the Internet connection. In PaaS, back end scalability is managed by the cloud
service provider, so end- users do not need to worry about managing the
infrastructure.

PaaS includes infrastructure (servers, storage, and networking) and platform


(middleware, development tools, database management systems, business
intelligence, and more) to support the web application life cycle.

Example: Google App Engine, Force.com, Joyent, Azure.

PaaS providers provide the Programming languages, Application frameworks,


Databases, and Other tools:

1. Programming languages
PaaS providers provide various programming languages for the developers to develop
the applications. Some popular programming languages provided by PaaS providers
are Java, PHP, Ruby, Perl, and Go.
2. Application frameworks
PaaS providers provide application frameworks to easily understand the application
development. Some popular application frameworks provided by PaaS providers are
Node.js, Drupal, Joomla, WordPress, Spring, Play, Rack, and Zend.
3. Databases
PaaS providers provide various databases such as ClearDB, PostgreSQL, MongoDB,
and Redis to communicate with the applications.
4. Other tools
PaaS providers provide various other tools that are required to develop, test, and
deploy the applications.
Advantages of PaaS
There are the following advantages of PaaS -

1) Simplified Development
PaaS allows developers to focus on development and innovation without worrying
about infrastructure management.
2) Lower risk
No need for up-front investment in hardware and software. Developers only need a
PC and an internet connection to start building applications.
3) Prebuilt business functionality
Some PaaS vendors also provide already defined business functionality so that users
can avoid building everything from very scratch and hence can directly start the
projects only.
4) Instant community
PaaS vendors frequently provide online communities where the developer can get the
ideas to share experiences and seek advice from others.
5) Scalability
Applications deployed can scale from one to thousands of users without any changes
to the applications.

Disadvantages of PaaS cloud computing layer


1) Vendor lock-in
One has to write the applications according to the platform provided by the PaaS
vendor, so the migration of an application to another PaaS vendor would be a problem.
2) Data Privacy
Corporate data, whether it can be critical or not, will be private, so if it is not located
within the walls of the company, there can be a risk in terms of privacy of data.
3) Integration with the rest of the systems applications
It may happen that some applications are local, and some are in the cloud. So there
will be chances of increased complexity when we want to use data which in the cloud
with the local data.

Software as a Service | SaaS


SaaS is also known as "On-Demand Software". It is a software distribution model in
which services are hosted by a cloud service provider. These services are available to
end-users over the internet so, the end-users do not need to install any software on
their devices to access these services.

There are the following services provided by SaaS providers -


Business Services - SaaS Provider provides various business services to start-up the
business. The SaaS business services include ERP (Enterprise Resource
Planning), CRM (Customer Relationship Management), billing, and sales.

Document Management - SaaS document management is a software application


offered by a third party (SaaS providers) to create, manage, and track electronic
documents.

Example: Slack, Samepage, Box, and Zoho Forms.

Social Networks - As we all know, social networking sites are used by the general public,
so social networking service providers use SaaS for their convenience and handle the general
public's information.

Mail Services - To handle the unpredictable number of users and load on e-mail services,
many e-mail providers offering their services using SaaS.

Advantages of SaaS cloud computing layer


1) SaaS is easy to buy
SaaS pricing is based on a monthly fee or annual fee subscription, so it allows
organizations to access business functionality at a low cost, which is less than licensed
applications.
Unlike traditional software, which is sold as a licensed based with an up-front cost (and
often an optional ongoing support fee), SaaS providers are generally pricing the
applications using a subscription fee, most commonly a monthly or annually fee.
2. One to Many
SaaS services are offered as a one-to-many model means a single instance of the application
is shared by multiple users.
3. Less hardware required for SaaS
The software is hosted remotely, so organizations do not need to invest in additional
hardware.
4. Low maintenance required for SaaS
Software as a service removes the need for installation, set-up, and daily maintenance for the
organizations. The initial set-up cost for SaaS is typically less than the enterprise software.
SaaS vendors are pricing their applications based on some usage parameters, such as a
number of users using the application. So SaaS does easy to monitor and automatic updates.
5. No special software or hardware versions required
All users will have the same version of the software and typically access it
through the web browser. SaaS reduces IT support costs by outsourcing
hardware and software maintenance and support to the IaaS provider.
6. Multiservice support
SaaS services can be accessed from any device such as desktops, laptops,
tablets, phones, and thin clients.
7. API Integration
SaaS services easily integrate with other software or services through standard APIs.
8. No client-side installation
SaaS services are accessed directly from the service provider using the internet
connection, so do not need to require any software installation.

Disadvantages of SaaS cloud computing layer


1) Security
Actually, data is stored in the cloud, so security may be an issue for some users.
However, cloud computing is not more secure than in-house deployment.
2) Latency issue
Since data and applications are stored in the cloud at a variable distance from the end-
user, there is a possibility that there may be greater latency when interacting with the
application compared to local deployment. Therefore, the SaaS model is not suitable
for applications whose demand response time is in milliseconds.
3) Total Dependency on Internet
Without an internet connection, most SaaS applications are not usable.
4) Switching between SaaS vendors is difficult
Switching SaaS vendors involves the difficult and slow task of transferring the very
large data files over the internet and then converting and importing them into another
SaaS also.

What is big data?


Big data has been an evolving concept since the start of the digital age. Used to
describe a huge data set that is defined by three characteristics, known as the three
Vs— volume, velocity, and variety—big data differs from other data sets by the size
(volume), rate of growth/change (velocity) and the variety of structured, unstructured,
and semi structured data within the set.

The benefit to having an expansive data set is its potential to hold hidden patterns or
trends that are only visible in a set that large. Additionally, it enables a full-picture
view.

However, due to the magnitude and complexity of big data, the value comes from
being able to analyse this data -- not the data itself -- which can prove to be a
challenge. Big data is so large and complex that identifying business value from so
much information can’t be done through traditional methods for processing and
analysing information.

Historically, organizations would have had to dedicate enormous amounts of time,


money, and resources to analysing the data if they wanted to gain any valuable
insights from it. Fortunately, due to advancements in computing, big data analytics
now makes it possible to combine big data sets with high- powered analytics. The
result? Previously unwieldy data sets can now reveal actionable insights. Big data
analytics packages huge data sets into a comprehensible format that allows
organizations to use them. Additionally, by incorporating technologies like artificial
intelligence (AI) and machine learning, more applicable insights can come to light.
There are many sources of big data, one of those being data from the Internet of
Things (IoT).

What is IoT data?


The Internet of Things (IoT) refers to physical objects connected through shared
networks. A variety of sensors gather information and share it across systems that
can store, manage, filter, and analyse the data. An IoT device can refer to everything
from wearables to medical devices to industrial equipment.

The IoT enables companies unprecedented visibility into what is happening across
their connected devices in real time. A vast amount of real-time data points is
collected from connected IoT devices and transferred across the internet for storage
and analysis.

What is the relationship between IoT and big data?


IoT and big data have many overlapping components, and IoT is considered a major
source of big data.

However, they were developed independently of one another. As the volume of IoT-
generated data increased to the point that conventional storage and analysis
methods became inefficient, big data and IoT become more and more interrelated.

In the current environment, the complex data and information gathered by IoT
devices can be considered a big data set being gathered in real time. Big data
storage and analytics currently help to make sense of the plethora of those real-time
data points and provide helpful insights.

To sum up the relationship at a high level: A network of devices equipped with


electronics and sensors (connected devices) send real-time information to the
internet (IoT), where it is compiled and stored into vast data sets (big data) and
analyzed to find useful patterns (big data analytics).
How is big data used in IoT?
Big data analytics help to make sense of the data and information that is gathered by
IoT devices. These solutions take the vast, unstructured data that’s been collected,
and identify ways to organize it into smaller data sets that can give companies
insights into how their processes are working, as well as improve decision-making.

Big data analytics can provide different types of insights when used with the IoT;
namely, descriptive analytics, diagnostic analytics, predictive analytics, and
prescriptive analytics. Descriptive analytics gives insights into how a connected
device is performing in real time. It can be used for anything from locating a
connected device, to understanding how that device is used by costumers, to
identifying anomalies.

Diagnostic analytics gives insights into the “why” behind descriptive analytics. For a
particular connected device, it can help organization understand why it is running in
a certain way or why it is producing certain outputs.

A very applicable use of big data in IoT is in predictive analytics. This type of analytics
utilizes machine learning by analyzing past data and producing probabilities for how
the device will function in the future. This is especially beneficial when it comes to
the servicing of IoT devices. Using this technology, organizations can anticipate
failures or servicing needs before the device stops working.

Lastly, big data is used in IoT for prescriptive analytics. This type of analysis gives
insights into how to impact things that have been observed or predicted.

Role of Big Data in IoT


Companies make use of IoT devices to collect data. Since the data stored by IoT
devices are in unstructured form, Big Data processes this collected data on a real-time
basis and also stores them using several storage technologies. Therefore, the need to
get big data in IoT is compelling.

IoT big data processing occurs in four sequential steps

1. A Group of unstructured data is generated by IoT devices and stored in the


big data system.
2. A big data system is a shared distributed database where a huge amount of
data is stored.
3. Stored data is analysed using analytic tools like Hadoop Map Reduce or
Spark
4. Then, Generate the reports of analysed data.
Advantages:

IoT and Big Data help companies in different sectors to make efficient and well-informed
decisions and thus offer better services/products. IoT with Big data helps companies to

 Examine data
 Reveal data trends
 Find unseen data patterns
 Find hidden data correlations
 Reveal new information

Helps to increase the ROI for the companies

IoT in Big Data analytics helps businesses to extract information to get better business
insights. Better business insights help in taking better decisions that result in high ROI.
Due to an increase in demand for data storage, companies are switching to big data
cloud storage which lowers the implementation cost.

Reshapes the future of the e-health system

The features of Big Data in IoT are reshaping the upcoming generation of the e-health
care system and developing an innovative solution in the healthcare field. Big data will
now lead to data-driven research instead of hypothesis-driven research. IoT will control
and analyse the connection between sensors and existing big data.

Revolution in Manufacturing Companies

In manufacturing companies, due to improper working of equipment and machines, they


may end up producing fewer products as they used to do earlier. Installing IoT sensors
in the equipment can collect operation data on the machine.

This data will help to find out which equipment is working properly and which requires
repair. Hence, a business will never fall short of products.

Benefits in the Transportation Industry

Installing IoT sensors in vehicles provide data regarding fuel efficiency, tracking the
location of the vehicle, delivery routes, and other information that helps in improving
organizational productivity.

weather Forecast

With the help of IoT, we can collect big data from weather and satellites to know about
the amount of wind and sunlight we can expect within a particular time period. Due to
these predictive analytics and machine learning advances, we are capable of predicting
weather conditions and taking actions according to that to meet the demand.

Facilitate the Energy Revolution


For grid operators, intelligent sensors constantly check the temperature of underground
cables which helps in taking immediate countermeasures if the cable temperature rises
up.

Big data is used to generate findings of power grid components such as input-output
curves of transformers that help companies to take action at the right time and prevent
load intervention in the power grid.

In this section, we will discuss in-depth how these distinct components help in the
functioning of the IoT system.

Challenges in IoT with big data analytics


Data visualization

Data visualization is an important aspect of IoT analysis, aiding in the ability to identify
key trends. Data visualization is needed to properly identify and convey the best data
insights that can be used to drive business decisions. The data generated by IoT
devices is heterogeneous, meaning it comes in a variety of formats: structured,
unstructured, and semi structured. While in theory visualizations of data should make
it easier to understand trends, when the data comes in so many different formats, a
method of visualization becomes more difficult.

Data storage and management

Big data continues to grow at an exponentially high rate. As they are today, big data
storage systems have a limited amount of space, so it is becoming a significant
challenge to manage and store such a large amount of data.

Several Communication Protocols and Technology used in the internet of Things.


Some of the major IoT technology and protocol (IoT Communication Protocols)
are Bluetooth, Wi-Fi, Radio Protocols, LTE-A, and Wi-Fi-Direct.
These IoT communication protocols cater to and meet the specific functional
requirement of an IoT system.
There are 6 IoT Communication Protocols/ Technology
a. Bluetooth
An important short-range IoT communications Protocols / Technology. Bluetooth,
which has become very important in computing and many consumer product
markets. It is expected to be key for wearable products in particular, again
connecting to the IoT albeit probably via a smartphone in many cases.

The new Bluetooth Low-Energy (BLE) – or Bluetooth Smart, as it is now


branded – is a significant protocol for IoT applications. Importantly, while
it offers a similar range to Bluetooth it has been designed to offer
significantly reduced power consumption.
b. ZigBee
ZigBee is similar to Bluetooth and is majorly used in industrial settings. It has
some significant advantages in complex systems offering low-power operation,
high security, robustness and high and is well positioned to take advantage of
wireless control and sensor networks in IoT applications.
The latest version of ZigBee is the recently launched 3.0, which is essentially the
unification of the various ZigBee wireless standards into a single standard.

c. Z-Wave
Z-Wave is a low-power RF communications IoT technology that primarily design
for home automation for products such as lamp controllers and sensors among
many other devices.
A Z-Wave uses a simpler protocol than some others, which can enable faster and
simpler development, but the only maker of chips is Sigma Designs compared to
multiple sources for other wireless technologies such as ZigBee and others.

Iot Technology – Z-Wave


d. Wi-Fi
Wi-Fi connectivity is one of the most popular IoT communication protocol, often
an obvious choice for many developers, especially given the availability of WiFi
within the home environment within LANs.
There is a wide existing infrastructure as well as offering fast data transfer and the
ability to handle high quantities of data.
Currently, the most common Wi-Fi standard used in homes and many businesses
is 802.11n, which offers range of hundreds of megabit per second, which is fine
for file transfers but may be too power-consuming for many IoT applications.
e. Cellular
Any IoT application that requires operation over longer distances can take
advantage of GSM/3G/4G cellular communication capabilities. While cellular is
clearly capable of sending high quantities of data, especially for 4G, the cost and
also power consumption will be too high for many applications.
But it can be ideal for sensor-based low-bandwidth-data projects that will send
very low amounts of data over the Internet.

IoT Communication Protocols – Cellular

f. NFC
NFC (Near Field Communication) is an IoT technology. It enables simple and safe
communications between electronic devices, and specifically for smartphones,
allowing consumers to perform transactions in which one does not have to be
physically present.
It helps the user to access digital content and connect electronic devices.
Essentially it extends the capability of contactless card technology and
enables devices to share information at a distance that is less than 4cm.
g. LoRaWAN
LoRaWAN is one of popular IoT Technology, targets wide-area network (WAN)
applications. The LoRaWAN design to provide low-power WANs with features
specifically needed to support low-cost mobile secure communication in IoT,
smart city, and industrial applications.
Specifically meets requirements for low-power consumption and supports large
networks with millions and millions of devices, data rates range from 0.3 kbps to
50 kbps.

So, this was all about IoT Technology Tutorial. Hope you like our
explanation of IoT Communication Protocols.

What are Embedded Systems?


Embedded systems are computer systems that are integrated into other devices, such
as appliances, vehicles, and medical equipment. These systems are designed to
perform specific tasks and are optimized for efficiency, reliability, and cost-effectiveness.
Embedded systems typically consist of a microcontroller, sensors, actuators, and
software. The microcontroller is the brain of the system and controls the input and output
of data.
The Role of Embedded Systems in the IoT:
Embedded systems are at the heart of the Internet of Things. They provide the
intelligence that enables devices to communicate with each other and with the cloud.
The role of embedded systems in the IoT can be summarized as follows:
 Sensor Integration:
Embedded systems are responsible for integrating sensors into devices. Sensors are
used to detect and measure physical properties such as temperature, pressure, and
humidity. These sensors generate data that is processed by the embedded system and
transmitted to other devices or the cloud.
1. Communication:
Embedded systems are responsible for communication between devices. This
communication can be wireless or wired, and can use a variety of protocols such as Wi-
Fi, Bluetooth, and ZigBee. Embedded systems also handle the routing of data between
devices.
 Data Processing:
Embedded systems are responsible for processing the data generated by sensors. This
processing can include filtering, normalization, and aggregation. The processed data is
then transmitted to other devices or the cloud.
1. Security:
Embedded systems are responsible for the security of devices in the IoT. This includes
securing data transmission, securing access to devices, and protecting against cyber-
attacks.
 Power Management:
Embedded systems are responsible for managing the power consumption of devices in
the IoT. This includes managing the power supply, optimizing power usage, and
managing battery life.

Applications of Embedded Systems in IoT


Embedded systems in IoT are responsible for collecting, processing, and transmitting
data between various devices and systems, and they play a crucial role in the overall
functionality of IoT systems. Here are some of the applications of embedded systems in
IoT:
 Smart Homes: Embedded systems in IoT are used in smart home applications to
automate various functions such as lighting, temperature control, security, and
entertainment. These systems are designed to be energy-efficient and cost-effective,
and they can be controlled remotely using a smartphone or other internet-enabled
devices.
 Industrial Automation: In industrial settings, embedded systems in IoT are used to
monitor and control various machines and equipment. These systems enable real-time
monitoring of production processes, ensuring that they run smoothly and efficiently. They
can also detect and report any anomalies, reducing downtime and improving
productivity.
 Healthcare: Embedded systems in IoT are used in healthcare applications to monitor
vital signs, track medication schedules, and manage chronic conditions. These systems
can transmit data to healthcare providers in real-time, allowing for timely intervention in
case of emergencies.
 Agriculture: Embedded systems in IoT are used in precision agriculture to monitor soil
moisture, temperature, and other environmental factors that affect crop growth. These
systems enable farmers to optimize irrigation and fertilization, resulting in higher yields
and reduced water usage.
 Transportation: Embedded systems in IoT are used in transportation applications to
monitor vehicle performance, track routes, and manage logistics. These systems can
also be used to monitor traffic conditions and optimize routes, reducing travel time and
fuel consumption.
Embedded systems in IoT are essential for enabling various applications across different
industries. As IoT continues to evolve, embedded systems will play an even more critical
role in creating smart and connected systems that can improve efficiency, productivity,
and quality of life.

Examples of Embedded Systems in the IoT:


There are many examples of embedded systems in the IoT. Some examples include:
 Smart Home Devices:
Embedded systems are used in smart home devices such as thermostats, lighting
systems, and security systems. These devices are capable of communicating with each
other and with the cloud, and can be controlled by a smartphone or other device.
 Medical Devices:
Embedded systems are used in medical devices such as pacemakers, insulin pumps,
and blood glucose monitors. These devices are capable of monitoring the patient’s
condition and transmitting data to healthcare providers.
 Industrial Automation:
Embedded systems are used in industrial automation systems such as assembly lines,
robotics, and process control systems. These systems are capable of monitoring and
controlling industrial processes, improving efficiency and productivity.
Embedded systems are essential to the functioning of the Internet of Things. They
provide the intelligence that enables devices to communicate with each other and with
the cloud. Embedded systems are responsible for sensor integration, communication,
data processing, security, and power management. Examples of embedded systems in
the IoT include smart home devices, medical devices, and industrial automation
systems. As the IoT continues to grow, the role of embedded systems will become
increasingly important.

Some Possible Challenges of Embedded Systems in IoT

While embedded systems in IoT offer a host of benefits, they also face several
challenges that can affect their performance and functionality. In this write-up, we will
explore some of the possible challenges of embedded systems in IoT.
1. Power consumption: One of the most significant challenges of embedded
systems in IoT is power consumption. Many of these systems are designed to
operate on battery power, making energy efficiency a critical factor in their
design. The system must be optimized to consume minimal power while still
performing its required functions. Additionally, as the number of devices in an IoT
network increases, the power consumption also increases, creating a significant
challenge for the design of the overall IoT ecosystem.
2. Security: Embedded systems in IoT are also vulnerable to security threats.
These systems often collect sensitive data and communicate with other devices,
making them an attractive target for hackers. Ensuring the security of embedded
systems requires implementing robust encryption, authentication, and access
control mechanisms. However, as the number of devices in an IoT network
grows, managing the security of each device becomes increasingly complex.
3. Interoperability: Embedded systems in IoT must be interoperable with other
devices and systems. However, achieving interoperability is challenging due to
the heterogeneity of devices and communication protocols used in IoT networks.
As a result, developing an interoperable IoT ecosystem requires careful
consideration of the devices and protocols used.
4. Scalability: Another significant challenge for embedded systems in IoT is
scalability. As the number of devices in an IoT network grows, the embedded
systems must be designed to scale up to support the increased demand. This
requires careful consideration of the hardware and software architecture used in
the system, as well as the communication protocols and data management
mechanisms.
5. Real-time performance: Many embedded systems in IoT must perform real-time
functions, such as controlling and monitoring devices. Achieving real-time
performance requires designing the system with low-latency communication and
processing mechanisms. However, as the number of devices in an IoT network
grows, ensuring real-time performance becomes increasingly challenging.
Embedded systems in IoT offer tremendous potential for improving the way we interact
with devices and the environment. However, they also face several challenges that must
be carefully considered in their design and implementation. These challenges include
power consumption, security, interoperability, scalability, and real-time performance. By
addressing these challenges, embedded systems in IoT can continue to drive innovation
and improve our lives.

What are the major components of


Internet of Things?

1. Smart devices and sensors – Device


connectivity
Devices and sensors are the components of the device connectivity layer. These
smart sensors are continuously collecting data from the environment and transmit
the information to the next layer.
The latest techniques in semiconductor technology are capable of producing micro
smart sensors for various applications.

Common sensors are:

 Temperature sensors and thermostats


 Pressure sensors
 Humidity / Moisture level
 Light intensity detectors
 Moisture sensors
 Proximity detection
 RFID tags

How are the devices connected?


Most modern smart devices and sensors can be connected to low-power wireless
networks like Wi-Fi, ZigBee, Bluetooth, Z-wave, LoRAWAN, etc. Each of these wireless
technologies has its pros and cons in terms of power, data transfer rate, and overall
efficiency.

Developments in low-power, low-cost wireless transmitting devices are promising in


the area of IoT due to their long battery life and efficiency. Many companies have
adopted the latest protocols like 6LoWPAN- IPv6 over Low Power Wireless Personal
Area Networks to implement energy-efficient data transmission for IoT networks.

6LoWPAN uses reduced transmission time (typically short time pulses) and thus
saves energy.

2. Gateway

IoT Gateway manages the bidirectional data traffic between different networks and
protocols. Another function of the gateway is to translate different network protocols
and make sure interoperability of the connected devices and sensors.
Gateways can be configured to perform pre-processing of the collected data from
thousands of sensors locally before transmitting it to the next stage. In some
scenarios, it would be necessary due to the compatibility of the TCP/IP protocol.

IoT gateway offers a certain level of security for the network and transmitted data
with higher-order encryption techniques. It acts as a middle layer between devices
and the cloud to protect the system from malicious attacks and unauthorized access.

3. Cloud

The Internet of Things creates massive data from devices, applications, and users,
which has to be managed in an efficient way. IoT cloud offers tools to collect,
process, manage and store huge amounts of data in real time. Industries and services
can easily access these data remotely and make critical decisions when necessary.
Basically, the IoT cloud is a sophisticated, high-performance network of servers
optimized to perform high-speed data processing of billions of devices, traffic
management, and deliver accurate analytics. Distributed database management
systems are one of the most important components of the IoT cloud.

Cloud system integrates billions of devices, sensors, gateways, protocols, and data
storage and provides predictive analytics. Companies use these analytics data to
improve products and services, preventive measures for certain steps, and build their
new business model accurately.

4. Analytics

Analytics is the process of converting analogy data from billions of smart devices and
sensors into useful insights which can be interpreted and used for detailed analysis.
Smart analytics solutions are inevitable for IoT systems for the management and
improvement of the entire system.

One of the major advantages of an efficient IoT system is real-time smart analytics
which helps engineers to find out irregularities in the collected data and act fast to
prevent an undesired scenario. Service providers can prepare for further steps if the
information is collected accurately at the right time.

Big enterprises use the massive data collected from IoT devices and utilize the
insights for their future business opportunities. Careful analysis will help
organizations to predict trends in the market and plan ahead for a successful
implementation.
Information is very significant in any business model, and predictive analysis ensures
success in the concerned area of the business line.

5. User interface

User interfaces are the visible, tangible part of the IoT system which users can access.
Designers will have to make sure of a well-designed user interface for minimum
effort for users and encourage more interactions.

Modern technology offers much interactive design to ease complex tasks into simple
touch panel controls. Multicolour touch panels have replaced hard switches in our
household appliances, and the trend is increasing for almost every smart home
device.

The user interface design has higher significance in today’s competitive market; it
often determines the user whether to choose a particular device or appliance. Users
will be interested in buying new devices or smart gadgets if it is very user-friendly
and compatible with common wireless standards.

You might also like