IOT ReUT
IOT ReUT
unit-1 on IoT
Define Edge, Fog & Cloud Computing
1. Edge Computing
Definition:
Edge computing involves processing data close to the source of its generation (at the "edge" of the
network) rather than relying on a centralized cloud or data center. The goal is to reduce latency and
bandwidth usage by performing computation locally on edge devices or near-edge servers.
Key Features:
Low Latency: Data is processed closer to the user or device, minimizing delays.
Real-Time Processing: Ideal for applications requiring immediate responses, like autonomous
vehicles or IoT devices.
Examples:
Smart home systems (e.g., Alexa or Google Home processing basic commands locally).
Definition:
Fog computing is a decentralized computing infrastructure that extends cloud capabilities to the edge
of the network. It acts as a middle layer between edge devices and the cloud, providing intermediate
computing power, storage, and networking resources.
Key Features:
Pre-Processing: Data is aggregated and pre-processed locally, reducing the burden on cloud
systems.
Scalable: Supports multiple edge nodes by pooling resources at a local or regional level.
Examples:
Smart city applications like traffic management systems using local servers for data
aggregation.
Health monitoring systems aggregating patient data from wearable devices before sending to
the cloud.
3. Cloud Computing
Definition:
Cloud computing refers to delivering computing services (like servers, storage, databases,
networking, software, and analytics) over the internet ("the cloud"). It provides centralized resources
and is typically hosted in large-scale data centers.
Key Features:
Centralized: All processing happens in remote servers accessed via the internet.
Examples:
Running machine learning models on platforms like AWS SageMaker or Google Cloud AI.
Comparison Table
Feature Edge Computing Fog Computing Cloud Computing
Processing
Near the data source Between edge and cloud Centralized data centers
Location
Key Relationships:
Edge and Fog focus on minimizing latency by processing data closer to its source.
Cloud excels at large-scale data processing, long-term storage, and complex analytics but
suffers from latency for time-sensitive tasks.
sql
Copy code
+-------------------+
| User Interface/UI |
+-------------------+
Explanation of Components
1. IoT Devices/Sensors:
o Purpose: Collect data from the environment (e.g., temperature, humidity, motion).
o These devices may also include actuators to perform actions, like turning on lights or
opening doors.
2. Communication Network:
o Examples:
Wired: Ethernet.
3. IoT Gateway/Edge:
o Filters and forwards data to the cloud for storage or further analysis.
4. Cloud/Processing Unit:
o Example platforms: AWS IoT Core, Microsoft Azure IoT, Google Cloud IoT.
o Users can interact with the system (e.g., control devices or view data trends).
This architecture ensures efficient data collection, processing, and actionable outcomes.
1. Sensor and Actuator
Sensor and Actuator work in the opposite principle to each other. A sensor is a device that senses the
physical changes in its environment and produces an electrical or electronic signal. For example, a
temperature sensor senses the temperature across its environment. Similarly, a humidity sensor
senses the humidity.
An actuator is a device that makes physical changes when it gets electrical or electronic signals. For
example, a solenoid valve got opens when it gets an electrical power supply and allows the flow of
any liquid or gas through it.
Sensor and Actuators both are very important elements of the IoT system. They only work at the
physical level or in the IoT implementation area. Rest all the elements only work with signals or data.
2. Controller
An IoT system in a home or production plant has so many sensors or actuators. So all the actuators
and sensors are connected to a controller. The controller controls all those sensors and actuators.
Sensors and actuators are analog devices but IoT system works with digital data, so the controller
also helps to analog-to-digital and digital-to-analog conversion.
3. Processor
It collects data from all sensors through the controller in the form of digital signals and processes
them. The main function of the processor is to collect all data, arrange them, and process them. The
processor also removes the unwanted data to reduce the size of big data. The reduction of the size of
data must be required as it saves transmission costs, storing costs, etc.
4. Gateways
Gateways are responsible for transmitting data of an IoT system through the internet. They modulate
and demodulate the data for transmission. Gateways help to transmit the data from the processor of
the IoT system to the server for storage. Gateways use a standard protocol system(ex: MQTT, XMPP)
for data transmission. Some examples of Gateway devices are Modem, GSM system, Wi-Fi, etc.
5. Cloud Server
Cloud Server is the space for storing data. Cloud server stores all the data of an IoT system and it
serves the users when they request. This cloud server only helps to control devices over the internet.
They serve the data with users located anywhere in the world. Actually, IoT works in almost the same
principle as other digital control systems like SCADA, PLC, etc just difference is that the IoT system
works through the internet.
6. User Device
It is the device actually where the data are used to observe the status, analytics, and control the
devices of the IoT system. For example, a production plant implemented with IoT. So the manager of
the plant can observe production status from anywhere in the world on his smartphone or computer
through the Analytics application.
IoT also gives the facility to control devices from anywhere. For example, your home is implemented
with an IoT system, so you can turn on/off lights, and fans, from anywhere using your smartphone.
Let's understand it with an example. Suppose you have an embedded IOT system in your home. So
you can easily see the temperature of your room and can turn on/off the Air conditioner with your
smartphone from anywhere.
Suppose you reach your office and remember that you may forget to turn off the AC. So you can
check on your smartphone, how much the room temperature. When you check your room
temperature on your smartphone then the data will flow as per the below diagram. Here the sensor
is a temperature sensor and the user device is your smartphone.
Now you want to turn off the Air conditioner and give a command from your smartphone. Now data
will flow as per the below diagram. Here sensor does no work, the actuator comes into action. This
actuator may be a Relay or contactor.
1. Scalability:
o New nodes can be added easily without significant changes to the network
configuration.
o Ideal for growing networks like smart cities and industrial IoT.
o Multiple paths exist for data transmission. If one node fails, data can reroute through
alternative nodes.
3. Improved Coverage:
4. Decentralized Architecture:
6. Self-Healing:
o Reduces the need for centralized infrastructure like routers or access points.
8. Enhanced Security:
o Data passes through multiple nodes, making it harder for attackers to intercept or
compromise the system.
9. Flexibility:
Use Cases
Smart Homes and Cities: IoT devices communicate seamlessly over a wide area.
While mesh networks have significant advantages, they also come with challenges like increased
complexity, power consumption in wireless nodes, and potential latency due to multiple hops.
However, their benefits often outweigh the drawbacks in appropriate use cases.
1. Stateless Communication:
o Each request from a client to a server contains all the necessary information (e.g.,
authentication, parameters) for the server to process it.
2. Uniform Interface: REST APIs use a consistent set of methods and conventions:
o HTTP Methods:
o URI Naming:
3. Client-Server Architecture:
o Separation of concerns: The client handles the user interface, and the server
manages data storage and processing.
4. Statelessness:
5. Resource-Based:
o Every entity (e.g., user, product, order) is considered a resource and is represented
by a URI.
6. Representation:
o Resources can be represented in various formats like JSON, XML, or plain text. JSON
is the most common due to its lightweight nature.
7. Cacheable:
4. Body (Optional): Contains data for the request (e.g., JSON payload for POST or PUT
requests).
2. Flexibility: Supports multiple data formats, allowing integration with a wide range of
applications.
4. Simplicity: Uses standard HTTP methods and protocols, making it easy to implement and
debug.
o Response (JSON):
"id": 123,
"email": "johndoe@example.com"
REST-based APIs are widely used in modern applications for enabling efficient, scalable, and
platform-independent communication.
Z-Wave is a mesh network technology, meaning devices can communicate directly with one another
or relay signals through other Z-Wave-enabled devices, extending the network range.
Key Features of Z-Wave
2. Mesh Networking:
o Devices can route communication through other nodes in the network, enhancing
coverage and reliability.
3. Interoperability:
4. Range:
5. Secure Communication:
6. Scalability:
o Supports up to 232 devices in a single network, making it suitable for complex IoT
setups.
1. Smart Homes:
o Appliance Control: Energy monitoring and control of devices like smart plugs and
outlets.
2. Building Automation:
3. Healthcare:
o Monitoring devices for elderly care, such as wearable health trackers and fall
detection sensors.
4. Energy Management:
Reliable Communication: Mesh networking ensures messages reach their destination, even
if some devices fail.
o Indicates the position of the first byte of data in the current segment within the
overall stream.
o If the ACK flag is set, this field contains the next sequence number the sender
expects to receive.
o Specifies the size of the TCP header in 32-bit words (minimum value: 5 = 20 bytes).
6. Reserved (3 bits):
o Reserved for future use.
o Always set to 0.
7. Flags (9 bits):
o Calculated over the entire segment, including the pseudo-header, header, and data.
o Points to the last urgent data byte if the URG flag is set.
1. Reliable Communication:
o Sequence and acknowledgment numbers ensure data is transmitted and
reassembled correctly.
2. Flow Control:
o Window size helps regulate the flow of data to avoid overwhelming the receiver.
3. Error Checking:
4. Connection Management:
o SYN, ACK, and FIN flags help establish, maintain, and terminate connections.
This structure ensures reliable, ordered, and error-checked delivery of data, making TCP suitable for
applications like web browsing, email, and file transfers. Would you like to explore any specific field
or feature in detail?
o Handles the transmission and reception of raw bitstreams over the physical medium.
o Key Functions:
o Manages access to the radio channel and ensures reliable communication between
nodes.
o Key Functions:
o Key Functions:
4. Application Layer:
2. Application Framework:
o Key Functions:
1. Star:
2. Mesh:
o All nodes are interconnected, allowing data to be relayed through multiple paths.
3. Tree:
1. Coordinator (ZC):
2. Router (ZR):
2. Scalability:
3. Robust Communication:
4. Interoperability:
5. Security:
Applications of Zigbee
Zigbee's architecture is well-suited for IoT applications requiring low power, scalability, and robust
communication in dynamic environments.
Actuators are often paired with sensors in IoT to form a closed-loop system where sensors collect
data, and actuators act based on commands derived from that data.
Actuators are essential components in IoT systems as they enable IoT devices to interact with their
environment. Below are their specific roles:
1. Executing Actions:
o Actuators take commands from IoT controllers or applications and execute them
physically, such as turning a valve, moving a robotic arm, or adjusting a thermostat.
2. Automation:
A smart irrigation system uses sensors to detect soil moisture levels and
actuators to open or close water valves.
3. Feedback Loops:
o In conjunction with sensors, actuators complete the feedback loop for smart
systems. For instance:
4. Energy Management:
o Actuators optimize energy usage by controlling devices like smart lights, HVAC
systems, or motorized blinds.
5. Physical Interaction:
o Facilitates interaction with the physical world, crucial for robotics, industrial
automation, and smart home applications.
Types of Actuators
1. Based on Motion:
Linear Actuators:
Rotary Actuators:
Electric Actuators:
Pneumatic Actuators:
Hydraulic Actuators:
1. Smart Home:
o Door Locks: Electric actuators for locking and unlocking doors remotely.
2. Industrial Automation:
3. Healthcare:
4. Agriculture:
5. Transportation:
Sensors: Collect data from the environment (e.g., temperature, pressure, position).
For example:
A smart system processes the data and commands the actuator to turn on/off a heater.
UDP is defined by the IETF RFC 768 and is a core part of the Internet Protocol Suite, working
alongside TCP. Unlike TCP, UDP does not guarantee delivery, order, or error correction, making it
faster but less reliable.
Key Features of UDP
1. Connectionless Protocol:
2. Low Overhead:
3. Unreliable Delivery:
4. Broadcasting/Multicasting Support:
5. Stateless Communication:
4. Checksum (16 bits): Used for error-checking of the header and data. Checksum is 2 Bytes
long field. It is the 16-bit one’s complement of the one’s complement sum of the UDP
header, the pseudo-header of information from the IP header, and the data, padded with
zero octets at the end (if necessary) to make a multiple of two octets.
Usage of UDP
UDP is used in scenarios where speed and efficiency are prioritized over reliability. It is particularly
suited for time-sensitive applications where packet loss is acceptable.
1. Real-Time Communication
Video/Audio Streaming: Applications like YouTube, Netflix, and live video broadcasting use
UDP for smooth, continuous data transfer.
Voice over IP (VoIP): Protocols like SIP and RTP rely on UDP to transmit voice packets in real-
time.
Online Gaming: Fast data exchange with low latency, even at the cost of occasional packet
loss.
DNS (Domain Name System): UDP allows quick query and response without requiring a
connection.
Routing Protocols: RIP (Routing Information Protocol) and OSPF (Open Shortest Path First)
use UDP.
4. File Transfer
Protocols like TFTP (Trivial File Transfer Protocol) use UDP for small and simple file transfers.
Multiplayer online games use UDP to transmit game state data quickly.
Advantages of UDP
1. Speed:
2. Efficiency:
Disadvantages of UDP
1. Unreliable:
2. No Congestion Control:
An edge device is a hardware component that is located at the "edge" of a network, close to the
source of data generation. These devices are designed to collect, process, and sometimes store data
locally, before sending it to a central server or cloud for further processing if needed. Edge devices
are key components of Edge Computing, as they help reduce latency and bandwidth usage by
performing computations locally.
Smartphones: Process data such as location tracking or voice recognition locally before
sending it to the cloud.
IoT Sensors: Devices like temperature or humidity sensors in a factory or home environment.
Cameras: Security cameras that perform local motion detection and image analysis.
Wearable Devices: Smartwatches or health trackers that process sensor data (e.g., heart
rate, steps) locally.
Industrial Equipment: Machines in a manufacturing plant that monitor their own status and
perform basic analysis without needing to send all the data to the cloud.
Autonomous Vehicles: Vehicles with sensors and computing systems that process data (e.g.,
LIDAR, camera images) locally for real-time decision-making.
1. Data Collection:
o Edge devices gather data from sensors or user interactions. For example, an IoT
sensor collects temperature data, or a smart camera records video.
2. Local Processing:
o Edge devices are capable of performing basic computations on the data they collect.
This can include simple calculations, signal processing, or even machine learning
inference. For example, a smart thermostat adjusts settings based on local
temperature readings.
o By processing data locally, edge devices can make immediate decisions without
relying on cloud servers, reducing latency. For example, a security camera with
motion detection can trigger an alarm instantly without needing to communicate
with a cloud server.
o Edge devices can filter or aggregate data before sending it to the cloud or central
servers, reducing the amount of raw data transmitted and improving efficiency. For
example, a wearable fitness tracker might only send data to the cloud if there’s a
significant change in activity levels.
5. Autonomy:
o Many edge devices can operate autonomously for a period of time, even without
constant connectivity to a central server or the cloud. For example, an autonomous
car can drive safely by relying on its local processing and sensors.
o While edge devices process data locally, they also communicate with central systems
(cloud or on-premises servers) to send updates, alerts, or aggregate data for long-
term storage or further analysis.
Advantages of Edge Devices:
1. Reduced Latency:
o By processing data closer to the source, edge devices minimize the delay between
data capture and action, crucial for time-sensitive applications.
o Local processing reduces the need to send large amounts of raw data to the cloud,
saving bandwidth and reducing network congestion.
o Sensitive data can be processed locally, reducing the risk of exposing private
information when transmitted to external servers.
4. Enhanced Reliability:
o Edge devices can continue operating even when there is limited or no internet
connectivity, ensuring system reliability in remote locations or in case of network
failure.
Conclusion:
Edge devices play a crucial role in the Edge Computing paradigm by performing local data processing,
real-time decision-making, and reducing reliance on centralized systems. They are especially valuable
in applications requiring low latency, real-time responses, and efficient bandwidth usage.
1. Low Latency:
Processing data closer to the source (e.g., IoT devices) reduces latency.
2. Bandwidth Efficiency:
Not all data needs to be sent to the cloud; fog nodes process and filter data locally.
Reduces the volume of data transmitted over the network, saving bandwidth.
3. Real-Time Analytics:
Fog nodes analyze data locally, enabling immediate action without waiting for cloud-based
processing.
4. Improved Reliability:
Fog nodes can continue to operate even if the cloud connection is lost.
Ensures that mission-critical applications (e.g., traffic control systems) remain functional.
5. Enhanced Security and Privacy:
Data is processed locally rather than being transmitted to a centralized cloud, reducing
exposure to potential cyberattacks.
Sensitive data (e.g., personal health records) can be filtered locally before being sent to the
cloud.
Ideal for IoT ecosystems with numerous devices distributed across a large area.
7. Cost Efficiency:
By processing locally, operational costs for cloud bandwidth and storage are minimized.
8. Scalability:
9. Supports Mobility:
Especially useful in scenarios where devices are mobile (e.g., drones, vehicles) and constantly
change their location.
Reduces energy consumption by minimizing the amount of data transmitted to distant data
centers.
Optimizes resource usage locally, which is especially important for battery-operated IoT
devices.
Key Applications
Healthcare: Wearable devices that process patient data locally for immediate alerts.
Smart Cities: Traffic management, public safety monitoring, and energy optimization.
Fog computing complements cloud computing, creating a hybrid model where time-critical tasks are
handled locally, and non-critical data is sent to the cloud for long-term storage and analysis.