Unit 2 Notes
Unit 2 Notes
Scale
Security
Data
Most IoT sensors are designed for a single job, and they
are typically small and inexpensive. This means they often
have limited power, CPU, and memory, and they transmit
only when there is something important.
For ex :
Imagine a smart city with a few hundred thousand smart
streetlights, all connected through an IoT network.
For ex :
A factory may replace machines only once every 20 years—or
perhaps even longer!
i. Applications layer
Their
primary function is generating data and being
capable of being queried and/or controlled over a
network.
Layer 2: Connectivity Layer
the focus is on connectivity.
3. Internet of Things-Architecture(IoT-A)
A SIMPLIFIED IOT ARCHITECTURE
Figure 2.10 : Range Versus Throughput for Four WHAN to WLAN Technologies
Figure 2.11 combines cost, range, power consumption, and typical
available bandwidth for common IoT access technologies.
1.Point-to-point topologies:
These topologies allow one point to communicate with
another point.
several technologies are referred to as “point-to-point”
when each object establishes an individual session
with the gateway
2. Point-to-multipoint topologies:
Thesetopologies allow one point to
communicate with more than one other point.
peer-to-peer
point-to-point
(UDP).
IOT NETWORK MANAGEMENT SUBLAYER
Analytics Application
Control Application
Analytics Application
The display can be about any aspect of the IoT network, from
historical reports, statistics, or trends to individual system
states.
Control Application
Data analytics:
This type of analytics processes the data collected by
smart objects and combines it to provide an intelligent
view related to the IoT system.
Network analytics:
Most IoT systems are built around smart objects
connected to the network
A loss or degradation in connectivity is likely to affect
the efficiency of the system. Such a loss can have
dramatic effects.
IOT DATA MANAGEMENT AND COMPUTE STACK
1. Minimizing latency
2. Conserving network bandwidth
3. Increasing local efficiency
• Data management in traditional IT systems is very simple.
Geographic distribution:
In sharp contrast to the more centralized cloud, the
services and applications targeted by the fog nodes
demand widely distributed deployments.
93
Wireless communication between the fog and the IoT
endpoint:
94
EDGE COMPUTING
advantage of hierarchy
response to events from resources close to the end
device is fast and can result in immediate benefits
resources available in the cloud when necessary.
• Figure 2.16 illustrates the hierarchical nature of edge,
fog, and cloud computing across an IoT system.