0% found this document useful (0 votes)
402 views66 pages

Emerging Tech & Big Data Guide

This document discusses emerging technologies, with a focus on big data. It defines big data and explains its key characteristics: volume, variety, velocity, veracity, and value. Examples are given of how big data is collected from various sources and stored. The benefits of big data are outlined, such as improved customer service, risk management, and decision making. Applications of big data are described in healthcare, education, banking, agriculture, manufacturing, and transportation. Challenges of big data are also noted.

Uploaded by

minemarkos75
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
402 views66 pages

Emerging Tech & Big Data Guide

This document discusses emerging technologies, with a focus on big data. It defines big data and explains its key characteristics: volume, variety, velocity, veracity, and value. Examples are given of how big data is collected from various sources and stored. The benefits of big data are outlined, such as improved customer service, risk management, and decision making. Applications of big data are described in healthcare, education, banking, agriculture, manufacturing, and transportation. Challenges of big data are also noted.

Uploaded by

minemarkos75
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 66

UNIT - 2

EMERGING
TECHNOLOGIES

Prepared By Tsegaye A 1
Learning Outcomes At the end of this unit, students
will be able to:

„ Describe the meaning and use of Bigdata


„ Explain cloud computing and fog computing
„ Apply cloud computing services
„ Explain the Internet of Things (IoT) and its applications

Prepared By Tsegaye A 2
Unit Overview
• Emerging Technology is a term that is commonly used to describe
a new technology, but it can also refer to the evolution of existing
technology.
• It is widely used to describe technologies that are in development
or will be available within the next five to ten years. It is usually
reserved for technologies that are creating or are expected to
create significant social or economic effects. When employed in
different contexts, such as media, business, science, and education,
it might have slightly different meanings.
• You have learned selected emerging technology concepts including
data science, artificial intelligence (AI), virtual reality, and
augmented reality in your grade 11 Information technology (IT)
Prepared By Tsegaye A 3
2.1. Introduction to Bigdata
• We are living in a digital world where a tremendous amount
of data is generated by each digital service we use. The
amount of data generated is increasing in different
dimensions including data sizes.
• This vast amount of generated data is leading us to the
creation of Bigdata.
• Bigdata refers to a collection of data sources that are so
massive and complex that they become challenging to
process using typical data processing software or readily
available database management tools
Prepared By Tsegaye A 4
Big Data

Figure 2.2. Bigdata source to storage


Figure 2.1. Concept of Bigdata Prepared By Tsegaye A 5
Cont’d
vIn Bigdata collection, the range of vIdentifying useful data sources is the
vorganizational sources generating start of the Bigdata collection
data needs to be identified. These process.From there, an organization
sources include business firms must build a pipeline that moves data
producing transactional data such as from generation to enterprise locations
point-of-sale software, endpoint where the data will be stored for
devices within IoT ecosystems and organizational use.
marketing firms, Social media posts vExample – Global companies like
from existing and prospective Google use Bigdata to understand what
customers, multiple additional users want from it based on several
sources like smartphone locational parameters such as search history,
data, surveys that directly ask locations, trends, and many more.
customers for information are also
some of the sources of Bigdata. Prepared By Tsegaye A 6
Characteristics of Bigdata
• Bigdata is characterized by 5V,
namely Volume, Variety, Velocity,
Veracity, and Value as stated by
tectarget.com. It should also be
noted that characteristics of Bigdata
are subjected to additional features
as scientific research and trend
continues in Bigdata analytics.
• The most common characteristics of
Bigdata are discussed by
considering the 5 V’s (Figure 2.3).
Prepared By Tsegaye A 7
Cont’d
• Variety: Variety of Bigdata refers to
the nature of data i.e whether it is
structured, unstructured, and semi-
structured data.
• In the past, data could only be
collected from spreadsheets and
database.
• Today, data comes in an array of forms
such as emails, PDFs, photos, videos,
audio, social media posts, and others.
• Variety is one of the important
characteristics of Bigdata (See Figure
2.4). Prepared By Tsegaye A 8
Cont’d
ØVelocity: Velocity refers to the speed at which data is being created
in realtime.
ØVolume: Volume indicates huge ‘volumes’ of data that are being
generated daily from various sources, like social media platforms,
business processes, machines, networks, human interactions, and
others.
ØValue: Value is the other major issue that we need to concentrate on.
It is not just the amount of data that we store or process. It is the
amount of valuable, reliable, and trustworthy data that needs to be
stored, processed, and analyzed to find insights.
ØVeracity :Veracity means the degree of reliability that the data has
to offer. Bigdata focuses to find an alternatives way to filter the huge
unstructured data to use in business developments.
Prepared By Tsegaye A 9
Benefits of Bigdata
vBigdata projects help us to cure disease and prevent cancer,
maximize crop yields, explore distant planets, predict and
respond to natural and man-made disasters, prevent crimes, and
more. There are plenty of project initiatives in Ethiopia to
benefit from Bigdata.
vSome institutions taking the initiative to use Bigdata to
maximize customer services and properly segment customers
data and among the initiatives Ethiopian Airlines, Ethio Telecom,
Artificial Intelligence Center, and some banks started leverage
its benefits
Prepared By Tsegaye A 10
Cont’d
Bigdata has many advantages. Some of them are discussed as follow.
Consumer data can help the
marketing efforts of companies, which can act on trends to increase
customer satisfaction. For example, personalization engines for
Amazon, Netflix, and Spotify can provide improved customer
experiences and create customer loyalty.
Personalization data from sources
such as past purchases, interaction patterns, and product page
viewing histories can help generate compelling targeted advertising
campaigns for users both on the individual level and on a larger scale.
Prepared By Tsegaye A 11
Cont’d
it allows you to update existing
products/services while innovating new ones..
This minimizes the manual work and reduces
the possibility of any man-made errors.
Bigdata analytics can identify new risks from
data
vpatterns for effective risk management strategies.
v Insights of business users that are
extracted from relevant data can help organizations make quicker
and better decisions.
Prepared By Tsegaye A 12
Application of Bigdata
vBelow are some examples of sectors in which Bigdata can
contribute by generating value:
In the healthcare industry, Bigdata has already begun
to make a significant impact.
vHealthcare analysts use Bigdata to inform health prevention,
intervention, and management using a variety of data analytic
technologies and approaches.
vThese efforts can improve the patient experience, care efficiency,
and quality, and reduce healthcare costs (See Figure 2.5).
Prepared By Tsegaye A 13
Figure 2.5 Health application of Bigdata

Prepared By Tsegaye A 14
Cont’d
Bigdata can also be
utilized to improve education by
providing students with a
balanced learning plan.
• Educators can tailor programs
for learners based on their
grades and attention spans.
Students may also be offered
blended learning, which
combines offline and online
learning possibilities (See
Figure 2.6).
Prepared By Tsegaye A 15
Cont’d
Bigdata solutions can detect
fraudulent behaviors in real-time, such as
credit/debit card usage, inspection track
archiving, and more.
• Bigdata analysis also helps banks in their
compliance verification, auditing, and
reporting processes.
• This simplifies the processes while lowering
overhead costs.
• Nowadays, people provide comments on a
financial institution’s work by phone or on the
website, and they share their thoughts on
social media (See Figure 2.7).

Prepared By Tsegaye A 16
Smart farming and
precision agriculture practices help
farmers to save costs and open new
business opportunities.
• Granular information on rainfall patterns,
water cycles, fertilizer needs, and other
topics is made available to farmers
through big data.
• They can use this information to make
wise choices about when to harvest and
what crops to grow for maximum profit.
• Making the proper choices ultimately
increases agricultural outputs.
Prepared By Tsegaye A 17
In the
manufacturing sector,
Bigdata helps create a
transparent infrastructure,
predicting uncertainties and
incompetence that can
affect the business
adversely (See Figure 2.9).

Prepared By Tsegaye A 18
The transportation
business can also benefit greatly from
Bigdata analytics. Both companies and
government-run transportation
corporations employ Bigdata
technologies to optimize route
planning, control traffic, manage road
congestion, and improve services in
countries all over the world. We also
use Bigdata in other industries, such as
media and entertainment, energy and
utilities, government-related activities,
and others (See Figure 2.11).
Prepared By Tsegaye A 19
• Aside from the benefits, Bigdata also has challenges related to data
quality, storage, a shortage of data science experts, validating data,
and gathering data from various sources.
• Even though the challenges of Bigdata and other similar emerging
technologies will change over time due to the dynamic and frequent
advancement of those technologies, below are some of the current
major Bigdata challenges.
• Managing Bigdata Growth- One of the main issues with Bigdata is
how to properly store these large amounts of data. Data centers and
databases used by businesses are constantly storing more data.
Bigdata sets grow quickly over time, making management of them
more difficult Prepared By Tsegaye A 20
Cont’d
• Lack of data professionals- Companies demand skilled data
specialists to manage Bigdata solutions.
These experts consist of data scientists, data analysts, and data
engineers who are skilled at using the tools to manage huge data sets.
Securing Data - One of the major difficulties of Bigdata is keeping
these enormous sets of data secure.
Companies frequently put data security to later phases because they
are so busy in understanding, storing, and analyzing their data sets.
Attentions is required to protect data repositories unless it serve as a
haven for intruders.

Prepared By Tsegaye A 21
Cont’d
• Integrating data from a variety of sources - Data is
obtained from different sources in a business and operations.
• This includes social media pages, company wide software
products, customer log files, financial transaction data, email
communications, presentations, and reports by employees.
• It require to determine which data is most relevant and focus
on that to save organization time and money.

Prepared By Tsegaye A 22
2.2. Cloud Computing

•Why do you think


the name’ cloud’ is
used for cloud
computing?
Prepared By Tsegaye A 23
Introduction to Cloud Computing
• Cloud computing is defined as storing and accessing data and
computing services over the Internet.
• It does not store any data on your personal computer.
• Computing services like servers, data storage, networking,
databases, etc. are all available on-demand.
• The main advantage of cloud computing is it gives access to
many users from single data center which allows users to store
and access their data over the internet without any limitations.

Prepared By Tsegaye A 24
• The goal of cloud computing is
to provide easy and flexible
access to computing resources
and IT services, various which
hardware and software
components are required for the
proper use of a cloud computing
model.
• Examples of cloud-based
services includes but not limited
to: Gmail, Google Maps,
Amazon, Netflix, PayPal, Spotify,
Adobe Creative Cloud, Kindle,
etc.
Figure 2.12. Cloud Computing Basics
Prepared By Tsegaye A 25
Benefits of Cloud Computing
• Accessibility and mobility- Users may access their tools from
anywhere, at any time, and from any type of devices as long as they
are connected to the Internet, which is one of the most significant
benefits of the Cloud.
• The ease of access to data in the cloud enables users to rapidly store
and retrieve resources from distant servers, work from any location
with an internet connection, and communicate with peers without
being physically present in the same space.
• Users do not lose any data if their services fail because the Cloud
service provider backs up their data (See Figure2.13).
Prepared By Tsegaye A 26
Cont’d
• This greatly helps the
implementation of inclusive
education which is schools for
everybody through support
learning and respond to
individual needs.
• Cloud based services support to
include inclusive technologies
like voice recognition, mind
mapping, word prediction, text
to speech for editing etc. to
accommodate special needs Figure 2.13. Accessibility and mobility
learners.
Prepared By Tsegaye A 27
Cont’d
• Flexibility- Services become
entirely adaptable and can be
changed at any time to meet
users’ needs and commercial
requirements. User can restrict or
enhance the available resources
while paying only for what is
used. Another benefit is that
resources can be shared, allowing
users to collaborate in real-time
on the same content in all domain
and work environments (See
Figure 2.14). Prepared By Tsegaye A Figure 2.14. Flexibility 28
Cont’d
• Optimized security- When
compared to traditional and
internal infrastructures, Cloud
Computing provides enhanced
security.
• Companies are finding it
increasingly difficult to
effectively secure their own IT
systems due to a lack of time,
expertise, and budget
(Figure 2.15).
Figure 2.15. Optimized Security
Prepared By Tsegaye A 29
Cont’d
• Controlled costs- The other advantage is that Cloud Computing
allows for greater control of costs IT infrastructure.
• We can adjust the resources allocated to its infrastructure depending
on its needs by increasing or decreasing the resources available.
By subscribing to Cloud Computing services, users or companies pay
only for what they used (Pay as you go model).
This helps users to no longer deal with costs relating to maintenance
and renew computer equipment (servers, computers, etc.) Companies
and users can reduce their IT investments and optimize their
operational and business costs (Figure 2.16)
Prepared By Tsegaye A 30
Cont’d
• Example- Let’s think that you plan to
publish your designed website activity.
• Now you want to host your website and
make it public. Thus, here you have two
possible options
• Option 1- Buying physical server and
hosting it in your data room by getting a
public Internet Protocol (IP) address from
your service provider.
• Option 2. In Cloud-based services like
website hosting, you do not need to buy new
server hardware of your own rather you can
borrow it for any time as long as you get at
less price, which can save both money and Figure 2.16. Controlled Cost different
time. Prepared By Tsegaye A users getting different services 31
Limitations of Cloud Computing
• Below are some of the limitations of cloud computing:
- Server downtime – No cloud provider can guarantee that you will not have
service interruptions, which will prevent you from accessing your data or files.
Because cloud computing is dependent on an Internet connection, if it goes down,
so will your cloud services.
- Security and privacy issues – When it comes to handling sensitive data,
companies are always concerned about how safe and private it is. There isstill a
risk of intruders, even though a cloud provider would have security processes in
place to ensure that your data is maintained and protected properly.
Intruders are constantly attempting to find new ways to break into cloud
providers’ systems in today’s digital world.
Therefore, cloud computing services are not completely safe.
Prepared By Tsegaye A 32
Cont’d
ØData ownership and transparency – Companies may think that there
is a lack of transparency concerning data ownership. Does data that is
uploaded to a cloud computing system become the cloud provider’s
property? Another concern is lack of data openness.
• Companies may be concerned about how their data is managed and
whether it is being compromised or not.
ØInflexibility – Some cloud computing providers may take a
corporation
off guard by requiring the usage of their applications and formats.

Prepared By Tsegaye A 33
Cont’d
ØLack of support – Cloud-based services, in comparison to other
hosting services and providers, provide minimal to no customer
assistance.
• Customers who are unable to contact cloud providers by phone or
email frequently turn to Internet forums for answers to their
questions.
ØCost – Another disadvantage of this service is the unknown fees.
Although cloud hosting eliminates the need for on-site infrastructure,
it is often necessary to ensure that you are paying for all of the
features that your organization needs to get the most out of the
service.
A cloud computing service can become costly in this regard.
Prepared By Tsegaye A 34
Types of Cloud Computing

Prepared By Tsegaye A 35
Public cloud
• It is a standard cloud computing
model where a service provider’s
resources are shared across different
clients (See Figure 2.19).
• For example, if you rent 10GB of
public cloud storage, you will get the
requested capacity of a disk from a
bigger chunk of a single storage
device that is logically divided into
small parts and distributed to multiple
users isolated to make it private
across different clients.
Prepared By Tsegaye A 36
Private cloud
– As the name indicates, the private
cloud has all resources dedicated to
your application. It can be either
from a cloud service provider or
your company’s data center. It gives
complete control over data security
and privacy.
• The private cloud provides an
additional layer of protection to
process sensitive and confidential
information(Figure2.20).
Prepared By Tsegaye A 37
Hybrid cloud
• It is the combination of public
cloud and private cloud.
• You canhost your public service
in the public cloud, and
confidential and data-related
services in the private cloud.
• It offers a very flexible and
comprehensive benefit of both
models (See Figure 2.21).
Prepared By Tsegaye A 38
Community cloud
• It is a collaborative, multi-tenant
platform used by several distinct
organizations to share the same
applications.
• The users are typically operating
within the same industry or field
and share common concerns in
terms of security, compliance,
and performance (See
Figure2.22).
Prepared By Tsegaye A 39
Cont’d
• In essence, a community cloud is a private cloud that
functions much like a public cloud. The platform itself
is managed privately, either in a data center or on-
premises. Governmental institutions, healthcare
facilities, financial services companies, and other
professional communities frequently use this solutions.

Prepared By Tsegaye A 40
Cloud Computing Services
• There are several cloud computing services. The three
major cloud computing services are:

Prepared By Tsegaye A 41
Figure 2.23. Cloud Computing Services

Prepared By Tsegaye A 42
Software as a Service (SaaS)
- SaaS is a software distribution model in which applications are
hosted by a vendor or service provider and made available to
customers over a network or the Internet. SaaS is becoming an
increasingly prevalent delivery model as underlying technologies
supports of web services.
• Through the Internet, this service is available to users anywhere in
the world.
• Traditionally, software applications needed to be purchased upfront
and then installed onto your computer.
• SaaS users on the other hand, , subscribe to it, usually on a monthly
or yearly basis using the Internet.
Prepared By Tsegaye A 43
Cont’d
• SaaS is compatible with all
Internet-enabled devices. Many
important tasks like accounting,
sales, invoicing, and planning
can be performed using SaaS
• Examples of SaaS - are Google
Workspace, Dropbox, Microsoft
Office 365, Slack, Cisco WebEx,
Concur, GoToMeeting, and many
more
Prepared By Tsegaye A 44
Platform as a Service (PaaS)
• Similarly, PaaS provides a platform
• PaaS - provides a platform and to support application development
environment to allow developers to (See Figure 2.25). It includes
build applications and services. software support and management
This service is hosted in the cloud and services, storage, networking,
accessed by the users via the Internet. deploying, testing, collaborating,
hosting, and maintaining
To understand this, let us compare it applications.
with painting a picture, where you are
provided with paint colors, different • Examples of PaaS – are Windows
painting brushes, and paper by your Azure, Heroku, Force.com, Google
school teacher, and you just have to App Engine, Apache Stratos,
draw a beautiful picture using those OpenShift, and many more.
tools. Prepared By Tsegaye A 45
Figure 2.25. Platform as a Service (PaaS)

Prepared By Tsegaye A 46
Infrastructure as a Service (IaaS)
- IaaS is one of the fundamental service
models of cloud computing, alongside PaaS.
It provides access to computing resources in a
virtualized environment- “the cloud”- on the
Internet (See Figure 2.26).
• IaaS is a complete package for computing.
For small-scale businesses that are looking
for cutting costs on IT infrastructure, IaaS
is one of the solutions.
• - Examples of IaaS are - Amazon Web
Services (AWS), Cisco Metapod,
Microsoft Azure, Google Compute Engine
(GCE), and many more.
Prepared By Tsegaye A 47
Fog Computing
• Fog computing is an extension of the cloud.
• Cloud Computing relies heavily on the bandwidth made available,
which depends on the capacity of the network service provider.
• With billions of users processing, sending, and receiving data in
and out of the cloud, the system becomes increasingly congested.
• Fog computing uses the concept of ‘fog nodes’ which are located
closer to the data source and have a higher processing and storage
capability.
• Fog provides the missing link for what data needs to be pushed to
the cloud, and that can be analyzed locally, at the edge.
• This makes fog nodes to process data quicker than sending the
request to the cloud for centralized processing.
Prepared By Tsegaye A 48
Cont’d
• What distinguishes fog computing from cloud computing is its closer
proximity to small end-users, its wider consumer reach, and better
mobility.
• Rather than requiring devices to go through the network backbone
infrastructure, fog computing permits devices to connect directly with
their destination with ease and allows them to handle their connections
and tasks in any way they see fit.
• As a result, fog computing improves the quality of service, reduces
latency, and enhance user experience.
• Fog computing smoothly supports the emerging Internet of Things (IoT)
physical things (vehicles, home appliances, and even clothes) that are
embedded with sensors to enable them to send/receive data.
Prepared By Tsegaye A 49
Cont’d
• This advantage makes it easier to
run a real-time, Big-Data operation
with the ability to support billions of
nodes in highly dynamic and diverse
environments.
• For example – we can apply fog
computing in video surveillance,
where continuous streams of
videos are large and cumbersome
to transfer across networks.

Prepared By Tsegaye A 50
Internet of Things (IoT)
• The Internet was created in the late
1990s and is now more than 30 years • The term has recently been
old, with over 2 billion people using added to the Oxford dictionary
computers, cellphones, and tablets to and is defined as: “The
access it. interconnection via the Internet
of computing devices embedded
• As per the definition of Oracle.com,
Internet of Things (IoT) is a network in everyday objects, enabling
of physical objects or people them to send and receive data”.
referred to as “things” that are
equipped with software, electronics,
networks, and sensors to collect and
exchange data (Figure2.28).
Prepared By Tsegaye A 51
Figure 2.28. Internet of Things
Prepared By Tsegaye A 52
Cont’d
• IoT aims at extending Internet connectivity beyond computers and
smartphones to other devices people use at home, or for business.
The technology allows devices to be controlled across a network
infrastructure remotely.
• As a result, it cuts down human effort and paves the way for
accessing connected devices easily. With remote control, the devices
can be used without involving human interaction.
• IoT makes things virtually smart through Artificial Intelligence
algorithms, data collection, and networks to enhance our lives.

Prepared By Tsegaye A 53
Cont’d
• The thing in IoT can also be a
person with a diabetes monitor
• implant, an animal with tracking
devices, etc. Some examples of
IoT are animal
• tracking devices, diabetes
monitors, AC sensors to adjust
the temperature based on
• the outside temperature, and
smart wearables (See Figure
2.29).
Prepared By Tsegaye A 54
Cont’d
• When something connects with • For example : Just a few years
the Internet, it has both the ago, when you wanted to listen to
capabilities of sending and/or your favorite songs on your
receiving information and mobile phone, you had to
making it smart. download each song. Nowadays,
• IoT is creating lots of you can listen to any music you
opportunities by linking want without downloading it. All
computer systems with the real, you need to do is access it where
and physical world. it is stored on the Internet.

Prepared By Tsegaye A 55
Major advantages of IoT
• Efficiency- We can gather trustworthy • Technical optimization- You
and secure real-time data thanks to IoT, no longer have to operate
and we can then translate it into really multiple devices for each task
useful information for enterprises.
manually if you use an IoT
• This helps to reduce the consumption of
resources to improve our efficiency and
system because it allows you to
productivity. control everything using a single
• For example, if you want to find the device like your smartphone.
answer to a question, instead of browsing • You can easily control Television
on your phone or turning your computer
on, you can just ask a voice assistant such (TV) volumes, thermostats, and
as Siri, Alexa, Google Home, Cortana, and dim your lights, etc.
more.
Prepared By Tsegaye A 56
Cont’d
• Convenience- IoT can provide quick and quality solution by improving
customer experience.
• Improved customer experience - As you can offer your targeted
customers what they need, you can understand their pain points, and provide
quick and quality solutions. This improves the customer experience.
• Conservation- IoT helps to conserve the environment by monitoring traffic,
water/electricity usage, air quality, etc..Smart cities are developing and it also
assists city planners and residents in finding solutions to problems.
• Personalization- As IoT devices can collect your data, they can learn your
preferences, likes, and dislikes quickly. As a result, they trigger more
personalized services based on your choices.

Prepared By Tsegaye A 57
Some Limitations of IoT
• Security and privacy - IoT devices are evolving and becoming more widely used,
making it difficult to keep the data they collect and transmit secure. IoT devices are being
used in more sensitive industries, like healthcare and banking, which raises concerns about
data protection.
• Connectivity and power dependence - For many devices to operate successfully,
the internet and constant power are required. When either goes down, everything
connected to it and the device also do.
• Complexity and Integration - IoT is an advanced technology whose design is quite
complicated. Plus, maintenance and deployment are also not easy for some IoT solutions.
IoT protocols and standards are still subject to discussion, therefore devices made by
various manufacturers may not be compatible with current hardware.
• Higher Cost - IoT device deployment frequently requires a significant time and
financial investment. There are numerous devices that need to be purchased, setup, and
installed by professionals. This causes a subsequent exponential increase in cost.
Prepared By Tsegaye A 58
How Does IoT Work?
• A complete IoT system integrates four component.
1. Sensors/devices- First, sensors or devices collect data from their
environment. Multiple sensors can be bundled together or sensors can
be part of a device that does more than just sense things.
Examples includes temperature sensors, proximity sensors,
humidity sensors, smoke sensors, water quality sensors, infrared
sensors, motion sensors etc.
2. Connectivity- The collected data is sent to the cloud through a
variety of
methods including cellular, satellite, Wi-Fi, Bluetooth, or connecting
di rectly to the Internet via Ethernet. Choosing which connectivity
option as sociated to the specific IoT application required.
Prepared By Tsegaye A 59
Cont’d
3. Data Processing- The software processes the data after it is transferred to
the cloud. This could be very simple, like making sure the temperature reading is
within permissible limits, or highly complicated, like utilizing computer vision to
detect things in the video (like intruders in your house).
• But what happens if the temperature gets too high or if someone breaks into
your home? The users might steps in at this point as required.
4. User Interface- Next, the information is made available to the end-user
through an alert to the user (email, text, notification, etc.). Depending on the IoT
application, the user may also perform an action and affect the system. For
example, the user might remotely adjust the temperature in the cloud storage via
an app on their phone, or system could take actions automatically based on
predefined rules.
Prepared By Tsegaye A 60
Figure 2.30. IoT components
Prepared By Tsegaye A 61
Application of Internet of Things
• Technology-based innovations like IoT are going to have a vital
role in areas such as healthcare, economy, marketing, finance and
banking, and government sectors.
• It uses advanced levels of automation, connectivity, and
customization.
• It uses advanced levels of automation, connectivity, and
customization. See below for some of the common IoT
application areas and their respective examples.
• Make further online research to understand the details of
mentioned applications as required.
Prepared By Tsegaye A 62
Cont’d
•Smart Home-
Smoke detector, light
bulbs, appliances,
door and window
locks, pet monitoring
camera, smart
thermostat. (See
Figure 2.31).
Prepared By Tsegaye A 63
Cont’d

•Smart City-
Traffic Management,
Waste management,
and Water
Distribution (Fig
2.32).

Prepared By Tsegaye A 64
Cont’d
• Supply chain- Real-time goods tracking and getting inventory
information.
• Connect Health- Patient care, calorie expenditure, heart rate
pattern, temperature, activity levels, etc.
• Connected cars- Automobile companies can automatically
perform billing, insurance, parking, and more.
• Smart outlets- turning a device on/off remotely, tracking the
energy levels of a device, etc.

Prepared By Tsegaye A 65
Cont’d
• Generally, IoT affects
many areas of day-to-
day life and many
social and technical
issues can be solved
by using the
applications of IoT
(See figure 2.33).

Prepared By Tsegaye A 66

You might also like