Identify the list of protocoll used across various
industries/sectors
Industrial and Automation Protocols:
1. Modbus (RTU, TCP)
Industry: Manufacturing, Power, HVAC
Use: Communication between devices like PLCs
and sensors
Pros: Simple, open protocol; widely adopted
Cons: Limited security, slower data rates
2. OPC-UA (Open Platform Communications
-Unified Architecture)
Industry: Industrial automation, oil & gas,
manufacturing
Use: Secure, scalable data exchange between
machines and systems
Pros: Platform-independent, secure, supports
complex data models
Cons: More complex implementation
3. PROFIBUS / PROFINET
Industry: Factory and process automation
Use: Real-time communication between field
devices
Pros: High-speed, real-time control
Cons: Vendor-specific (Siemens), less flexible than
newer standards
4. EtherNet/IP
Industry: Industrial automation
Use: Ethernet-based protocol for control and data
sharing
Pros: Integrates with standard IT infrastructure
Cons: Requires robust network infrastructure
IoT and Cloud Communication Protocols:
5. MQTT (Message Queuing Telemetry Transport)
Industry: IoT, Smart Buildings, Energy
Use: Lightweight messaging between devices and
cloud
Pros: Low bandwidth, ideal for remote/low-power
devices
Cons: Not inherently secure (must be used with
TLS)
6. CoAP (Constrained Application Protocol)
Industry: Smart energy, smart city, home automation
Use: Web-like protocol for constrained devices
Pros: Lightweight, optimized for low-power
environments
Cons: Limited functionality compared to HTTP
Cloude service Model's - lnforcture Service
(IaaS)Models, software as a Service (SaaS)
Model and flatform as a Service (PaaS)
What is Cloud Computing?
Cloud computing is the delivery of computing
services—including servers, storage, databases,
networking, software, analytics, and
intelligence—over the internet ("the cloud") to offer
faster innovation, flexible resources, and economies
of scale.
Importance of Cloud Service Models:Cloud
service models are the foundation for deploying
applications and services. Each model provides a
different level of control, flexibility, and management,
suited to various business and technical needs.
Overview of the Three Main Models
Infrastructure as a Service (IaaS): Provides
virtualized physical computing resources over the
internet.
Platform as a Service (PaaS): Offers hardware and
software tools (e.g., for application development) via
the cloud.
Software as a Service (SaaS): Delivers software
applications over the internet, on demand and
typically by subscription.
Comparison Table:
●Feature ,IaaMinimal
●SaaS
●User Controls Network, OS, storageApps and
data Only application settings
●Customization High MediumLow
●Management OverheadHigh Medium Low
●Technical Expertise Required Moderate Minimal
Amazon web service Aurora
What is AWS?
Amazon Web Services (AWS) is a comprehensive
and widely adopted cloud platform offered by
Amazon. Launched in 2006, AWS provides
on-demand cloud computing platforms and APIs to
individuals, companies, and governments, offering a
broad set of global cloud-based products.
Core Features:
●On-demand scalability
●Pay-as-you-go pricing
●Global infrastructure with availability zones
●Security and compliance standards
Key Services:
●Compute: Amazon EC2, Lambda
●Storage: Amazon S3, EBS, Glacier
●Database: RDS, DynamoDB, Aurora
Benefits of AWS
●Elasticity and Flexibility: Scale resources up or
down as needed
●Cost-Effective: Pay only for what you use
●Global Availability: Data centers in 30+ regions
worldwide
●Broad Ecosystem: Thousands of integrated
services and totools
Security and Compliance
●Data Encryption: Both in-transit and at-rest
●Identity and Access Management (IAM):
Fine-grained access control
●Compliance Certifications: ISO, SOC, GDPR,
HIPAA, etc.
●Dedicated Security Services: AWS WAF, Shield,
GuardDuty, Inspector
Thingspeek IOT analysties
flatform-intruduction,features demonstration
What is ThingSpeak?
ThingSpeak is an open-source Internet of Things
(IoT) platform that allows users to collect, store,
analyze, and visualize sensor data in the cloud.
Developed by MathWorks (the creators of MATLAB),
it’s popular with makers, researchers, and hobbyists
who want a simple way to build data-driven IoT
projects.
Key Features & Capabilities:
● Real-Time Data Collection & Visualization
●Create Channels with up to 8 fields to receive
data from devices (via HTTP, MQTT, or REST
APIs).
●Live plots and charts update in real-time as data
is received.
●Supports timestamps, GPS coordinates, and
status messages
Built-in Analytics & MATLAB Integration:
●Use MATLAB Analysis to run scripts on your
channel data for
●Trend detection
●Predictive analysis
●Data cleaning / filtering
●Perform automatic analysis using MATLAB
Visualization and customizable plots.
Triggers & Alerts:
●Automatically react to your data using
ThingSpeak React
●Set threshold conditions (e.g.,
temperature > 30 °C).Trigger email
alerts, Twitter updates, HTTP
webhooks, etc..
Do’s and Dont’s genral prections to be taken
while using the internet :syber security peocess
protection againest syber thret’s
A) General Do’s & Don’ts While Using the
Internet
Do’s:
●Use strong, unique passwords: Combine
uppercase, lowercase, numbers, and symbols.
●Enable two-factor authentication (2FA): Adds an
extra layer of login security.
●Keep software updated: Regularly update your
OS, browsers, antivirus, and apps.
🔒
●Browse on secure (HTTPS) websites: Look for
the or “https://” in the URL.
●Be cautious with emails & links: Verify the
sender before clicking anything.
Don’ts:
●Don’t reuse passwords across sites: If one gets
breached, others become vulnerable.
●Don’t download files from untrusted sources:
They might contain malware.
●Don’t use public Wi-Fi for sensitive transactions:
Avoid banking/shopping on open networks.
●Don’t ignore browser/antivirus warnings: They
alert you for a reason.
●Don’t overshare on social media: Cybercriminals
can use your personal info.
B) Cybersecurity Processes – Protection Against
Cyber Threats
1. Technical Protections:
Firewall: Blocks unauthorized access to or from
private networks.
Antivirus/Antimalware: Detects and removes
malicious files and software.
Encryption: Protects sensitive data in storage and
during transmission.
Intrusion Detection & Prevention Systems
(IDS/IPS): Monitors networks for suspicious activity.
2. Best-Practice Processes:
Access control: Provide system access only to
authorized users (principle of least privilege).
Regular patching: Fix security vulnerabilities by
updating OS, firmware,
applications.
Data backup & recovery planning: Maintain copies
to restore after ransomware or system failures.
Incident response plan: Steps to detect, respond
to, and recover from cyberattacks quickly.
Security audits & penetration testing: Regularly
assess your systems for weaknesses.
Awareness training: Educate users about phishing,
social engineering, and secure behavior.
Cloud security process for any application
1. Planning & Risk Assessment:
●Identify assets, data sensitivity, and compliance
requirements (e.g., GDPR, HIPAA).
●Perform threat modeling and risk assessment for
cloud-based threats.
2. Secure Architecture & Design:
●Choose the right cloud service model: IaaS,
PaaS, or SaaS.
●Adopt a secure architecture pattern (e.g.,
multi-tier, microservices).
●Follow Zero Trust and least privilege principles
from the start.
3. Identity & Access Management (IAM):
●Define users, roles, and permissions.
●Use strong authentication (MFA / SSO).
●Enforce least-privilege access controls and
periodic access reviews.
4. Data Security:
●Encryption in transit (TLS/SSL).
●Encryption at rest using built-in cloud KMS (Key
Management Service).
●Data classification and masking for sensitive
data.
5. Network & Perimeter Protection:
●Use Security Groups, Firewalls, and Network
ACLs to control traffic.
●Segment networks (e.g., public vs. private
subnets).
●Configure VPNs/VPC peering
● secure connectivity.
7. Monitoring, Logging & Detection:
●Enable centralized logging (CloudTrail,
Stackdriver, etc.).
●Monitor for anomalies using SIEM or
cloud-based security tools.
●Set up alerts for suspicious activities or policy
violations.
IOT implimantation in agriculture and live stock
monitoring
IoT in Smart Agriculture (Crop Farming):
Key Sensors & Devices
●Soil sensors — measure moisture, nutrients,
temperature, pH
●Weather stations — track rainfall, humidity,
sunlight, wind speed
●Drones / camera systems — capture crop health
images (NDVI) from above
●Smart irrigation systems — valves, pumps
controlled automatically
●Pest detection traps — send alerts when pest
count increases
Applications:
●Precision irrigation Water supplied based on
real-time soil moisture readings
●Fertilizer optimization Nutrient dosing
controlled via sensor feedback
●Automation of operations Automated pumps,
sprayers, greenhouse fans, etc.
IoT in Livestock Monitoring:
●Wearable Devices & Sensors
●Smart collars / ear tags — track location,
temperature, heart rate, activity
●Rumination sensors — for monitoring eating &
cud-chewing patterns (health indicator)
●Smart weighing platforms — record animal
growth
●Environmental sensors — temperature,
ammonia, humidity inside barns/sheds
Benefits:
●Early disease detection → reduces veterinary
costs
●Prevents losses due to missing/sick animals
●Improves breeding & milk/meat production
efficiency
●Saves time and manpower
Write and implementation of simple ladder logic program using timer
ON DELAY TIMER
AIM OF THE EXPERIMENT:
To study the ON Delay Timer operation using PLC Software.
APPARATUS REQUIRED:
PLC Trainer kit
Personal Computer Installed with PLC Software
Ethernet cable
Patch chords
THEORY:
ON Delay Timer is used to make the Delay operation in processes.
It can control the inputs and outputs of the field instruments.
PROCEDURE:
1. Click PLC-1 in the project tree ''1'' then click program block ''2'' and click main OB1 ''3'' as
shown in the below image.
2. Now the (Object Block1) OB1 is created.
3. Now select the On Delay Timer goes to instructions tab and click the Basic Instructions
and select the Timer operations tab and then double click the TON block.
4. Now the call options block is displayed. Then change the data block name. And click the
automatic option finally select the ok button.
5. Now the Timer block is created in network is shown below the diagram. And also that one
input and one output coil is created in same network for testing the timer block.
6. The input can be connected with IN of the Timer block. Then output coil connected with Q
of the Timer block.
7. Then given the addresses for input and outputs. And finally given the preset time for the
Timer goes to double click the PT in timer block and write the values in sec.
8. Then save the program and download after that goes to online mode. And monitoring the
program can be displayed in following images.
9. Then given the addresses for input and outputs. And finally given the preset time for the
Timer goes to double click the PT in timer block and write the values in sec.
10. Then save the program and download after that goes to online mode and monitor the
program.
11. When the status of the SWITCH 1(I0.0) changes from 0 to 1 the timer instruction will be
executed and it will activate the MOTOR 1(Q0.0) after 10s delay.
LADDER LOGIC PROGRAM:-
CONCLUSION:
Thus the ladder logic program of ON Timer was written and implemented successfully using PLC
Software.
OFF DELAY TIMER
AIM OF THE EXPERIMENT:
To study the OFF Delay Timer operation using PLC Software.
APPARATUS REQUIRED:
PLC Trainer kit
Personal Computer Installed with PLC Software
Ethernet cable
Patch chords
THEORY:
OFF Delay Timer is used to make the Delay operation in processes.
It can be control the inputs and outputs of the field instruments.
PROCEDURE:
1. Click PLC-1 in the project tree ''1'' then click program block ''2'' and click main OB1 ''3'' as
shown in the below image
2. Now the below image shows (Object Block1) OB1 is created.
3. Now select the OFF Delay Timer goes to instructions tab and click the Basic Instructions and
select the Timer operations tab and then double click the TOF block.
4. Now the call options block is displayed. Then change the data block name. And click the
automatic option finally select the ok button.
5. Now the Timer block is created in network. And also that one input and one output coil is
created in same network for testing the timer block.
6. The input can be connected with IN of the Timer block. Then output coil is connected with Q
of the Timer block.
7. Then given the addresses for input and outputs. And finally given the preset time for the
Timer goes to double click the PT in timer block and write the values in seconds.
8. Then save the program and download after that goes to online mode and monitor the
program.
9. When the status of the SWITCH 2(I0.1) changes from 0 to 1 the timer instruction will be
executed and it will activate the MOTOR 2(Q0.1) immediately.
10. When the SWITCH 2(I0.1) status changes back to 0 then programmed time (PT) will start and
after time MOTOR 2(Q0.1) will be OFF.
LADDER LOGIC PROGRAM:
CONCLUSION:
Thus the ladder logic program of OFF Timer was written and implemented successfully
using PLC Software.
RETENTIVE TIMER
AIM OF THE EXPERIMENT:
Write and implement a simple ladder logic program using Retentive timer.
APPARATUS REQUIRED:
PLC Trainer kit
Personal Computer Installed with PLC Software
Ethernet cable
Patch chords
THEORY:
Counts time base intervals when the instruction is true and retains the accumulated
value when the instruction goes false or when power cycle occurs.
The Retentive Timer instruction is a retentive instruction that begins to count time
base intervals when rung conditions become true.
The Retentive Timer instruction retains its accumulated value when any of the
following occurs:
Rung conditions become false.
The processor loses power while battery backup is still maintained. And a fault occurs.
PROCEDURE:
1. Click PLC-1 in the project tree ''1'' then click program block ''2'' and click main OB1 ''3'' as
shown in the below image
2. Now the below image shows (Object Block1) OB1 is created.
3. Now select the Accumulator timer goes to instructions tab and click the Basic Instructions
and select the Timer operations tab and then double click the TONR block.
4. Now the call options block is displayed. Then change the data block name. And click the
automatic option finally select the ok button.
5. Now the Timer block is created in network. And also that one input and one output coil is
created in same network for testing the timer block.
6. The input can be connected with IN of the Timer block. Then output coil is connected with Q
of the Timer block.
7. Then given the addresses for input and outputs. And finally given the preset time for the
Timer goes to double click the PT in timer block and write the values in seconds.
8. Then save the program and download after that goes to online mode and monitor the
program.
9. When the status of the SWITCH 4(I0.3) changes from 0 to 1 the timer instruction will be
executed and MOTOR 4(Q0.3) will start after 10s.
10. The MOTOR 4(Q0.2) will remain ON, even when the input status changes back to 0.The
Reset (I0.4) is necessary to reset the timer or accumulated time.
LADDER LOGIC PROGRAM-
CONCLUSION:
Thus the ladder logic program of Accumulator Timer was written and implemented
successfully using PLC software.
Write and implementation of simple ladder logic program using counter
UP COUNTER
AIM OF THE EXPERIMENT:
To study about the UP Counter operation using PLC Software.
APPARATUS REQUIRED:
PLC Trainer kit
Personal Computer Installed with PLC Software
Ethernet cable
Patch chords
THEORY:
The counters are mainly used for counting the values from the field equipment. The UP
counters can be used to counting the values in upward manner. It can be performing the
incremental purpose.
PROCEDURE:
1. Click PLC-1 in the project tree ''1'' then click program block ''2'' and click main OB1 ''3''.
2. Now the below image shows (Object Block1) OB1 is created.
3. To select the UP Counter block in plc goes to Instructions Tab and click the Basic
Instructions then select the CTU block for UP Counter operation.
4. Now the UP Counter call options block can be opened. Then change the data block name in
that Name block. And then click the ok button.
5. The following details can be entered into the UP Counter block is given below.
CU - Make the counter Input
Q- Counter Output
R - Reset input
CV - Count Value
PV - Preset value (Set Value)
6. Then save the program and goes to online mode and monitoring the counter values before
and after enabling the counter block.
7. After Resetting the Counter Block
CONCLUSION:
Thus the UP Counter operation was successfully performed using PLC software.
DOWN COUNTER
AIM OF THE EXPERIMENT:
To study about the Down Counter operation using PLC Software.
APPARATUS REQUIRED:
PLC Trainer kit
Personal Computer Installed with PLC Software
Ethernet cable
Patch chords
THEORY:
The counters are mainly used for counting the values from the field equipment. The DOWN
Counters can be used to counting the values in down ward manner. It can be performing the
decremental purpose.
PROCEDURE:
1. Click PLC-1 in the project tree ''1'' then click program block ''2'' and click main OB1 ''3''.
2. Now the below image shows (Object Block1) OB1 is created.
3. To select the DOWN Counter block in plc goes to Instructions Tab and click the Basic
Instructions then select the CTD block for DOWN Counter operation.
4. Now the DOWN Counter call options block can be opened. Then change the data block
name in that Name block. And then click the ok button.
5. Now the DOWN Counter block is created in network.
6. The following details can be entered into the UP Counter block is given below.
CD - Make the counter Input
Q- Counter Output
LD - load Preset value (After reach the value of 0)
CV - Count Value
PV - Preset value (Set Value)
7. Then save the program and goes to online mode and monitoring the counter values before
and after enabling the counter block.
8.
CONCLUSION:
Thus the DOWN Counter operation was performed successfully using PLC software.