Unit-5
Unit-5
Introduction
The Internet of Things (IoT) refers to the interconnectivity of physical devices,
vehicles, home appliances, and other items embedded with electronics,
software, sensors, and connectivity which enables these objects to connect and
exchange data. The IoT concept involves extending Internet connectivity
beyond traditional devices like desktop and laptop computers, smartphones and
tablets to a diverse range of devices and everyday things. The ultimate goal of
IoT is to offer advanced connectivity of devices, systems, and services that goes
beyond machine-to-machine communications and covers a variety of protocols,
domains, and applications.
The Internet of Things (IoT) has fast grown to be a large part of how human
beings live, communicate and do business. All across the world, web-enabled
devices are turning our global rights into a greater switched-on area to live in.
There are various types of challenges in front of IoT.
Security challenges in IoT :
1. Lack of encryption –
Although encryption is a great way to prevent hackers from accessing data,
it is also one of the leading IoT security challenges.
These drives like the storage and processing capabilities that would be
found on a traditional computer.
The result is an increase in attacks where hackers can easily manipulate the
algorithms that were designed for protection.
2. Insufficient testing and updating –
With the increase in the number of IoT(internet of things) devices, IoT
manufacturers are more eager to produce and deliver their device as fast as
they can without giving security too much of although.
Most of these devices and IoT products do not get enough testing and
updates and are prone to hackers and other security issues.
3. Brute forcing and the risk of default passwords –
Weak credentials and login details leave nearly all IoT devices vulnerable to
password hacking and brute force.
1
Any company that uses factory default credentials on their devices is placing
both their business and its assets and the customer and their valuable
information at risk of being susceptible to a brute force attack.
4. IoT Malware and ransomware –
Increases with increase in devices.
Ransomware uses encryption to effectively lock out users from various
devices and platforms and still use a user’s valuable data and info.
Example –
A hacker can hijack a computer camera and take pictures.
By using malware access points, the hackers can demand ransom to unlock
the device and return the data.
5. IoT botnet aiming at cryptocurrency –
IoT botnet workers can manipulate data privacy, which could be massive
risks for an open Crypto market. The exact value and creation of
cryptocurrencies code face danger from mal-intentioned hackers.
The blockchain companies are trying to boost security. Blockchain
technology itself is not particularly vulnerable, but the app development
process is.
6. Inadequate device security: Inadequate device security refers to the lack of
proper measures to protect electronic devices such as computers,
smartphones, and IoT devices from cyber-attacks, hacking, data theft, and
unauthorized access. This can happen due to outdated software, weak
passwords, unpatched vulnerabilities, lack of encryption, and other security
risks. It is important to regularly update the software and implement strong
security measures to ensure the security and privacy of sensitive information
stored on these devices. Many IoT devices have weak security features and
can be easily hacked.
7. Lack of standardization: Lack of standardization refers to the absence of
agreed-upon specifications or protocols in a particular field or industry. This
can result in different systems, products, or processes being incompatible
with each other, leading to confusion, inefficiency, and decreased
interoperability. For example, in the context of technology, a lack of
standardization can cause difficulties in communication and data exchange
between different devices and systems. Establishing standards and protocols
can help overcome this and ensure uniformity and compatibility. There is a
lack of standardization in IoT devices, making it difficult to secure them
consistently.
8. Vulnerability to network attacks: Vulnerability to network attacks refers
to the susceptibility of a network, system or device to being compromised or
exploited by cyber criminals. This can happen due to weaknesses in the
network infrastructure, unpatched software, poor password management, or
a lack of appropriate security measures. Network attacks can result in data
theft, loss of privacy, disruption of services, and financial loss. To reduce
2
vulnerability to network attacks, it’s important to implement strong security
measures such as firewalls, encryption, and regular software updates, as well
as educate users on safe internet practices. IoT devices rely on networks,
making them vulnerable to attacks like denial-of-service (DoS) attacks.
9. Unsecured data transmission: Unsecured data transmission refers to the
transfer of data over a network or the internet without adequate protection.
This can leave the data vulnerable to interception, tampering, or theft by
malicious actors. Unsecured data transmission can occur when data is
transmitted over an unencrypted network connection or when insecure
protocols are used. To protect sensitive data during transmission, it is
important to use secure protocols such as SSL/TLS or VPN, and to encrypt
the data before sending it. This can help to ensure the confidentiality and
integrity of the data, even if it is intercepted during transmission. IoT devices
often transmit sensitive data, which may be vulnerable to eavesdropping or
tampering if not properly secured.
10.Privacy concerns: Privacy concerns refer to issues related to the collection,
storage, use, and sharing of personal information. This can include concerns
about who has access to personal information, how it is being used, and
whether it is being protected from unauthorized access or misuse. In the
digital age, privacy concerns have become increasingly important as
personal information is being collected and stored on an unprecedented scale.
To address privacy concerns, individuals and organizations need to
implement appropriate security measures to protect personal information, be
transparent about how it is being used, and respect individuals’ rights to
control their own information. Additionally, privacy laws and regulations
have been established to provide guidelines and protections for individuals’
personal information. The vast amount of data generated by IoT devices
raises privacy concerns, as personal information could be collected and used
without consent.
11.Software vulnerabilities: Software vulnerabilities are weaknesses or flaws
in software code that can be exploited by attackers to gain unauthorized
access, steal sensitive information, or carry out malicious activities. Software
vulnerabilities can arise from errors or mistakes made during the
development process, or from the use of outdated or unsupported software.
Attackers can exploit these vulnerabilities to gain control over a system,
install malware, or steal sensitive information. To reduce the risk of software
vulnerabilities, it is important for software developers to follow secure
coding practices and for users to keep their software up-to-date and properly
configured. Additionally, organizations and individuals should implement
robust security measures, such as firewalls, antivirus software, and intrusion
detection systems, to protect against potential threats. IoT devices often have
software vulnerabilities, which can be exploited by attackers to gain access
to devices and networks.
3
12.Insider threats: Insider threats refer to security risks that come from within
an organization, rather than from external sources such as hackers or cyber
criminals. These threats can take many forms, such as employees who
intentionally or unintentionally cause harm to the organization, contractors
who misuse their access privileges, or insiders who are coerced into
compromising the security of the organization. Insider threats can result in
data breaches, theft of intellectual property, and damage to the reputation of
the organization. To mitigate the risk of insider threats, organizations should
implement strict access controls, monitor employee activity, and provide
regular training on security and privacy policies. Additionally, organizations
should have a plan in place to detect, respond to, and recover from security
incidents involving insiders. Employees or contractors with access to IoT
systems can pose a security risk if they intentionally or unintentionally cause
harm.
To address these challenges, it is important to implement security measures such
as encryption, secure authentication, and software updates to ensure the safe and
secure operation of IoT devices and systems.
Design challenge in IoT :
Design challenges in IoT (Internet of Things) refer to the technical difficulties
and trade-offs involved in creating connected devices that are both functional
and secure. Some of the key design challenges in IoT include:
Interoperability: Interoperability refers to the ability of different systems,
devices, or components to work together seamlessly and exchange data
effectively. In the context of the Internet of Things (IoT), interoperability is
a critical challenge, as a large number of diverse devices are being connected
to the internet. The lack of standardization in the IoT can lead to difficulties
in communication and data exchange between devices, resulting in an
fragmented and inefficient system. To overcome this challenge,
organizations and industry groups are working to establish standards and
protocols to ensure interoperability between IoT devices. This includes the
development of common communication protocols, data formats, and
security standards. Interoperability is important for enabling the full potential
of the IoT and allowing connected devices to work together effectively and
efficiently. Ensuring that different IoT devices can work together seamlessly
and exchange data effectively.
Security: Security is a critical concern in the Internet of Things (IoT) as it
involves the protection of sensitive data and systems from unauthorized
access, theft, or damage. IoT devices are often vulnerable to cyber attacks
due to their increased exposure to the internet and their limited computing
resources. Some of the security challenges in IoT include:
1. Device security: Ensuring that IoT devices are protected from malware and
unauthorized access.
4
2. Network security: Protecting the communication between IoT devices and
the network from cyber attacks.
3. Data security: Securing the data collected and transmitted by IoT devices
from unauthorized access or tampering.
4. Privacy: Protecting the privacy of individuals whose personal information is
collected and transmitted by IoT devices. To address these security
challenges, organizations should implement robust security measures such
as encryption, firewalls, and regular software updates. Additionally, they
should conduct regular security audits and assessments to identify and
address potential security risks. By prioritizing security, organizations can
help to protect the sensitive data and systems involved in IoT and reduce the
risk of cyber attacks.Protecting IoT devices and the sensitive data they
collect and transmit from cyber threats and unauthorized access.
Scalability: Scalability refers to the ability of a system to handle increasing
workloads or numbers of users without a significant decline in performance.
In the context of the Internet of Things (IoT), scalability is a major challenge
as the number of connected devices is rapidly growing, leading to an
increased volume of data and communication. Scalability challenges in IoT
include:
1. Data management: Effectively managing and storing the large amounts of
data generated by IoT devices.
2. Network capacity: Ensuring that networks have sufficient capacity to handle
the increased volume of data and communication.
3. Device management: Efficiently managing the growing number of IoT
devices and ensuring that they can be easily configured and maintained.
To address these scalability challenges, organizations should adopt
scalable architectures, such as cloud computing, that can accommodate the
growing number of IoT devices and the data they generate.
Additionally, they should implement efficient data management and storage
solutions, such as distributed databases and data lakes, to handle the
increased volume of data. By prioritizing scalability, organizations can ensure
that their IoT systems can handle the growing number of connected
devices and continue to deliver high performance and efficiency. Designing
systems that can accommodate large numbers of connected devices
and manage the resulting data flow effectively.
Reliability: Reliability refers to the ability of a system to perform its
intended function consistently and without failure over time. In the context
of the Internet of Things (IoT), reliability is a critical concern, as the failure
of even a single IoT device can have significant consequences. Some of the
reliability challenges in IoT include:
1. Device failure: Ensuring that IoT devices are designed and built to be reliable
and function correctly even in harsh environments.
5
2. Network connectivity: Maintaining stable and reliable connections between
IoT devices and the network, even in the face of hardware or software
failures.
3. Data accuracy: Ensuring that the data collected and transmitted by IoT
devices is accurate and reliable.
To address these reliability challenges, organizations should implement
robust and reliable hardware and software designs for IoT devices, and conduct
regular testing and maintenance to identify and resolve any issues. They
should also implement redundant systems and failover mechanisms to ensure
that the system continues to function in the event of a failure. By
prioritizing reliability, organizations can help ensure that their IoT systems
perform consistently and without failure, delivering the intended
benefits and results. Ensuring that IoT systems remain functional and accessible
even in the face of hardware or software failures.
Power consumption: Power consumption refers to the amount of energy
that a system or device uses. In the context of the Internet of Things (IoT),
power consumption is a critical challenge, as many IoT devices are designed
to be small, low-power, and operate using batteries. Some of the power
consumption challenges in IoT include:
1. Battery life: Ensuring that IoT devices have sufficient battery life to operate
without frequent recharging or replacement.
2. Energy efficiency: Making sure that IoT devices are designed to use energy
efficiently and reduce the overall power consumption of the system.
3. Power management: Implementing effective power management techniques,
such as sleep modes, to reduce the power consumption of IoT devices when
they are not in use.
To address these power consumption challenges, organizations should
adopt low-power technologies and energy-efficient designs for IoT devices.
They should also implement effective power management techniques,
such as sleep modes, to reduce the power consumption of IoT devices when they
are not in use. By prioritizing power consumption, organizations can
help ensure that their IoT systems are energy efficient, reducing costs and
environmental impact. Minimizing the power consumption of IoT devices
to extend battery life and reduce costs.
Privacy: Privacy is a critical concern in the Internet of Things (IoT), as IoT
devices collect, store, and transmit large amounts of personal and sensitive
information. Some of the privacy challenges in IoT include:
1. Data collection: Ensuring that only the necessary data is collected and that it
is collected in a way that respects individuals’ privacy rights.
2. Data storage: Ensuring that the data collected by IoT devices is stored
securely and that access to it is strictly controlled.
6
3. Data sharing: Controlling who has access to the data collected by IoT devices
and ensuring that it is not shared without proper authorization.
To address these privacy challenges, organizations should implement
robust privacy policies and procedures, such as data protection, data
minimization, and data retention. They should also educate users on the
privacy implications of using IoT devices and encourage them to take steps to
protect their privacy. Additionally, organizations should adopt
privacy-enhancing technologies, such as encryption and anonymization, to
protect the privacy of individuals whose information is collected by
IoT devices. By prioritizing privacy, organizations can help to ensure that
individuals’ rights and freedoms are respected, and that sensitive
information is protected from unauthorized access or misuse. Protecting the
privacy of individuals whose personal information is collected
and transmitted by IoT devices.
Battery life is a limitation –
Issues in packaging and integration of small-sized chip with low weight and
less power consumption. If you’ve been following the mobile space, you’ve
likely see how every yr it looks like there’s no restriction in terms of display
screen size. Take the upward thrust of ‘phablets’, for instance, which can be
telephones nearly as huge as tablets. Although helpful, the bigger monitors
aren’t always only for convenience, rather, instead, display screen sizes are
growing to accommodate larger batteries. Computers have getting slimmer,
but battery energy stays the same.
Increased cost and time to market –
Embedded systems are lightly constrained by cost.
The need originates to drive better approaches when designing the IoT
devices in order to handle the cost modelling or cost optimally with digital
electronic components.
Designers also need to solve the design time problem and bring the
embedded device at the right time to the market.
Security of the system –
Systems have to be designed and implemented to be robust and reliable and
have to be secure with cryptographic algorithms and security procedures.
It involves different approaches to secure all the components of embedded
systems from prototype to deployment.
Designers and engineers must carefully balance these design challenges to
create IoT systems that are functional, secure, and scalable.
Deployment challenges in IoT :
The deployment of Internet of Things (IoT) systems can present several
challenges, including:
7
1. Connectivity –
It is the foremost concern while connecting devices, applications and cloud
platforms.
Connected devices that provide useful front and information are extremely
valuable. But poor connectivity becomes a challenge where IoT sensors are
required to monitor process data and supply information.
2. Cross platform capability –
IoT applications must be developed, keeping in mind the technological
changes of the future.
Its development requires a balance of hardware and software functions.
It is a challenge for IoT application developers to ensure that the device and
IoT platform drivers the best performance despite heavy device rates and
fixings.
3. Data collection and processing –
In IoT development, data plays an important role. What is more critical
here is the processing or usefulness of stored data.
Along with security and privacy, development teams need to ensure that
they plan well for the way data is collected, stored or processed within an
environment.
4. Lack of skill set –
All of the development challenges above can only be handled if there is a
proper skilled resource working on the IoT application development.
The right talent will always get you past the major challenges and will be
an important IoT application development asset.
5. Integration: Ensuring that IoT devices and systems integrate seamlessly
with existing technology and infrastructure.
6. Network infrastructure: Building and maintaining the network
infrastructure needed to support the large number of connected IoT devices.
7. Device management: Efficiently managing and maintaining the large
number of IoT devices in a deployment.
8. Data management: Managing and analyzing the large amounts of data
generated by IoT devices, and integrating it with existing data systems.
9. Security: Ensuring that the IoT deployment is secure from threats such as
cyber attacks, data breaches, and unauthorized access.
10.Cost: Balancing the cost of deploying and maintaining an IoT system with
the benefits it delivers.
8
ASSET MANAGEMENT
Explain with a neat diagram Asset management application in IoT.
9
Due to the size, price and lifetime of the sensor devices, the use cases for IoT-
enabled asset management are often limited to tracking expensive and heavy
equipment (trucks, shipping containers, etc.).
INDUSTRIAL AUTOMATION
10
people. These systems carry out simple repetitive mechanical tasks, usually found
in production or continuous flow processes, with much greater production
efficiency and speed than could be done manually. These systems can be custom
built to perform a task, but many off-the-shelf solutions are available for common
applications. Sometimes called 'hard automation' because the operation is fixed
by the equipment design. Examples of fixed automation include conveyor belts,
box folders, or bottle filling and capping machines, or flow packing machines for
food packaging, etc.
2. Programmable Automation Systems — Programmable automation systems
introduces programmable computer logic to industrial automation. This upgrade
allows industrial automation machines to switch their capabilities, though this can
incur significant costs in money and programming time and expertise. However,
this style of automation is invaluably advantageous for industries such as auto
manufacturing, where capital costs are high for manufacturing equipment. While
auto manufacturing processes behave like they need fixed automation systems,
since there are millions of repetitive tasks to build thousands of automobiles,
every year new models are designed and marketed that require similar but
different automation. Does the company need to buy new automation solutions?
With programmable automation systems, manufacturers with long product runs,
and high automation investment requirements, can routinely reprogram their
automation systems to fit their new product lines.
3. Flexible Automation Systems — Flexible systems use computer-controlled
manufacturing systems that allow individual product customization while
automating production of the entire batch. Sometimes this is called 'soft
automation' in contrast to hard 'fixed' automation that is not flexible. Flexible
automation also differs from programmable automation as it's able to make
adjustments while processing jobs rather than be reprogrammed for
manufacturing new products. CNC machines are a common example, like
computer-controlled lathes and routers, which can take a computer code from the
operator, and turn-out a piece specific to the job. For this reason, flexible
automation systems are used in batch processes, small to medium volumes, and
high product varieties.
4. Integrated Automated Systems — Integrated automation systems expand
automation impact by connecting all systems within a manufacturing plant,
referred to as total automation. Sensor data, data analytics, and computer control
and decision making allows these factories to minimize human labor in
operations. For example, these systems are prominent in Computer Aided
11
Manufacturing (CAM), where engineers can design, plan, and send
manufacturing details to production, and maintain full control over the entire
product manufacturing life cycle. These concepts are further developed in Smart
Factories, where interconnected global systems utilize system wide data to make
decisions, such as the inventory levels in manufacturing one location may trigger
the real-time automatic resupply from international suppliers.
SMART GRID
13
extra energy, choose the loads they need to back up and use this energy in the
case of an outage, for example. Apart from giving management benefits, storage
becomes one of the innovative smart grid technologies essential for independent
residential grids that fully rely on renewables and generate much surplus.
IoT-based process automation:
Smart grid IoT technology is widely used to automate processes and
increase efficiency in the supply chain. Producers and distributers:
Adopt automated metering to monitor energy usage in real-time and
dynamically respond to changing demand.
Use environmental data and IoT technologies in renewable energy to
optimize power production and maximize the use of green sources of
energy.
Monitor grid load and adopt data-driven strategy to minimize the risks of
outages or overloads.
IoT applications in smart grid:
Here are some successful examples of the use of IoT in smart grid, from the
national level to startup solutions for households.
Germany has integrated IoT infrastructure and technology solutions to
implement a smart grid project in Mannheim. This project enabled the broad
adoption of renewable energy and allowed to coordinate energy consumption
and production in the city.
Lumin energy management platform is a good example of IoT application in
smart grid which enables cost savings, reduced emissions and easier adoption
of green energy at the same time. The company offers a smart panel and data
analytics tools to optimize storage, manage electricity consumption and
facilitate the integration of PV systems in houses.
Schneider Electric offers a set of connected solutions for implementing solar
power for homes. The company can equip a household with PV systems,
monitoring and management tools to go fully off-grid or generate and convert
solar energy to partially cover the household’s demand.
Cisco is one of the leaders among Internet of Things smart grid enablers. The
company together with several partners helps different players on the
upstream and downstream side to bring in connected technology and enhance
grid operations. Among their success stories is the modernization of BC
Hydro. Cisco helped the utility provider increase efficiency and reliability
using smart metering and advanced analytics technologies.
14
Siemens has a large share of solutions for smart grid in IoT portfolio. The
company offers a range of software and infrastructure solutions for energy
intelligence. One of their clients, a German electrical wholesaler Rexel,
implemented a large retrofit project and integrated a power monitoring system by
Siemens for energy metering and analytics
15
everything from lighting and temperature control to security cameras and
alarm systems.
Another advantage of IoT-enabled home automation is the ability to
remotely monitor and control devices, even when away from home. This
can be useful for controlling energy consumption and ensuring the safety
and security of the home.
IoT-enabled home automation systems typically involve the use of smart
devices, such as thermostats, light bulbs, and security cameras, that can be
controlled and monitored through a centralized hub or app. These smart
devices can communicate with each other and with the centralized hub using
wireless protocols such as Zigbee, Z-Wave, and Bluetooth.
In addition, IoT-enabled home automation systems can integrate with other
smart home technologies, such as voice assistants like Alexa and Google
Home, to provide additional functionality and convenience.
Overall, IoT-enabled home automation can provide many benefits to
homeowners, including increased convenience, energy efficiency, and
security. However, it is important to ensure the security of these systems, as
they may be vulnerable to hacking and other cyber threats.
1. Lighting
Lighting in the house may now be adjusted automatically to meet the demands of
the individual. For example, if people begin watching a movie, the lights may be set
to decrease automatically so that they do not become distracted from the storyline.
When you go inside your house, the lights may automatically switch on without you
having to click a button.
When you leave your house, the system may automatically switch down the lights
to save energy, so you don't have to. Your smartphone, laptop, and other linked
devices can control all of your house lights. As a result, you may set your app to
turn on your light when your alarm goes off in the morning.
2. Bathrooms
In the bathroom, IoT technology may make your daily routine more enjoyable and
convenient. Smart mirrors may link to other devices such as computers and
smartphones, detect the faces of family members in front of them, and show
information that interests those individuals, such as news articles, weather forecasts,
or specific websites.
If no one is in the bathroom, special sensors can detect movement and switch off
the water automatically. Smart shower controls may also recognise people and set
16
their preferred water temperature and pressure, as well as limit the amount of time
spent in the shower to save water.
Users of automated jacuzzis may relax and enjoy their bath without having to
manually modify their chosen temperature and air-jet regime, or pick their favorite
music, because the app will manage all of it for them.
3. Gardens
Sensors may be quite useful for people who want to cultivate their own veggies,
fruit, and herbs at home. Users may check on the app to see whether the temperature
is correct, if the plant is sufficiently hydrated, and if it is receiving enough sunshine.
The software can track the present status of the soil, determine whether it has
adequate moisture, and, if necessary, activate a smart irrigation system.
The sensor recognises when the amount of moisture reaches the ideal level and turns
off the watering system, preventing water waste. IoT technology has resulted in a
true breakthrough in gardening, which will fundamentally change the way plants
are grown in the future.
4. Kitchen
IoT devices can make cooking safer and easier by utilizing AI technologies. Smart
sensors can monitor for smoke and carbon monoxide, as well as the temperature
and humidity levels in your kitchen, to ensure that everything is in working order.
Special built-in applications keep track of whether the user has enough food in the
fridge (and reorder it if necessary), offer recipe suggestions, and assess the
nutritional worth of meals. Smart spoons, for example, urge users to eat gently.
5. Security Systems
Do you always double-check that the doors and windows are shut and that the TV,
computer, and other electrical equipment are turned off before leaving your house?
With the aid of specific sensors, smart security systems will do it for you.
When you leave the house, these controllers can lock the entrance, close the
shutters, switch off electronic gadgets, and ensure that your home is safe from
human and animal intruders. Users may use the app on their phones to check on
their homes and manage the temperature, humidity, and lighting remotely. You may
also keep an eye on your older relatives and assist them if necessary.
17
Explain in detail about Commercial building automation.
In an IoT-based BMS, Data Inputs From Sensors, equipment, and occupants move
wirelessly through an Onsite Gateway to the cloud, where built-in sequences
tailored to the building’s equipment then make informed control decisions. These
decisions travel down back to the building in the form of output decisions or micro
adjustments seamlessly. In this scenario, networking and integration are eliminated,
and all commissioning occurs continuously. Because the system is based in the
cloud, both monitoring and updates can be carried out remotely.
Data that streams from an IoT-native system is clean from the ground up, as well,
providing vast amounts of clear, readable and actionable data from our commercial
buildings for the first time. This powerful dataset can automatically inform
the Digital Twin and gives building operators unprecedented access to data
analytics that can be easily understood and securely shared with internal and
external parties. With automatic and industry-standard tagging, the opportunity for
integration is endless.
This simplified approach to building automation unlocks sophisticated technology
in the mid-sized commercial building market by reducing installation time, system
complexity, and total project costs.
18
SMART CITIES
2. Health Cards
Clinics and medical services frameworks are significant marks of administration.
The smart city requires a state−of−the−art medical services framework that can
follow quantifiable advancement concerning residents' well−being.
A shrewd card−based framework can be utilized by people that might be utilized in
all administration and approved clinics.
This card will have the verifiable subtleties of the medicines and so on for people.
The robust medical care framework will empower the public authority to look at the
clinics and their administrations to residents.
19
The smart card empowers the framework to work with simple information
assortment. The cloud−based framework can give essential knowledge to Medical
services experts for a further progressive organization.
4. Transport Systems
The transportation framework for the residents can be improved with
IoT−empowered frameworks. The armadas can be overseen and followed utilizing
GPS beacons.
Legislatures can finish armadas' organization, planning, ongoing situating, support,
and free time for executives with IoT frameworks.
The residents can likewise benefit from transportation administrations with a
card−based framework for tickets and so on.
20
The continuous undertaking stock for different advancement works can be followed
utilizing the brought−together framework.
The situation with framework resources, their usage, upkeep, and the complete
lifecycle of the board should be possible with the brought−together IoT framework.
7. Surveillance Systems
IP cameras and reconnaissance frameworks can assist the public authority with
controlling crime percentages in a city.
The IP cameras can be utilized for surveying and monitoring essential foundations.
These cameras can be associated with unified frameworks with reinforcements for
verifiable information.
A versatile reconnaissance framework can be set up with IoT video arrangements
safeguarding individuals, spots, and resources.
10. E-Services
This can be overseen through biometric confirmation or smart cards. Residents can
benefit from all taxpayer−driven organizations through this card.
21
The public authority can collect data through these cards for proactive preparation
and the executives.
All taxpayer−supported organizations can be incorporated through the
e−administrations gateway.
The residents can benefit from these offices for paying their water and power bills,
local charges, medical clinic check−ups, etc. Coordinated information additionally
helps in strategy−making and organization.
Conclusion
These are just a portion of the uses of IoT in making shrewd urban communities. A
lot more choices can be investigated to make urban communities a preferred choice
for more than 70% of the total populace later on. A significant number of these
applications are, as of now, utilized in enormous metropolitan urban communities
all over the planet, be that as it may, there are numerous hindrances to making
brilliant urban communities.
22
How Hadoop Works
Hadoop makes it easier to use all the storage and processing capacity in cluster
servers, and to execute distributed processes against huge amounts of data. Hadoop
provides the building blocks on which other services and applications can be built.
Applications that collect data in various formats can place data into the Hadoop
cluster by using an API operation to connect to the NameNode. The NameNode
tracks the file directory structure and placement of “chunks” for each file, replicated
across DataNodes. To run a job to query the data, provide a MapReduce job made
up of many map and reduce tasks that run against the data in HDFS spread across
the DataNodes. Map tasks run on each node against the input files supplied, and
reducers run to aggregate and organize the final output.
The Hadoop ecosystem has grown significantly over the years due to its
extensibility. Today, the Hadoop ecosystem includes many tools and applications
to help collect, store, process, analyze, and manage big data. Some of the most
popular applications are:
Spark – An open source, distributed processing system commonly used for
big data workloads. Apache Spark uses in-memory caching and optimized
execution for fast performance, and it supports general batch processing,
streaming analytics, machine learning, graph databases, and ad hoc queries.
Presto – An open source, distributed SQL query engine optimized for low-
latency, ad-hoc analysis of data. It supports the ANSI SQL standard,
including complex queries, aggregations, joins, and window functions. Presto
can process data from multiple data sources including the Hadoop Distributed
File System (HDFS) and Amazon S3.
Hive – Allows users to leverage Hadoop MapReduce using a SQL interface,
enabling analytics at a massive scale, in addition to distributed and fault-
tolerant data warehousing.
HBase – An open source, non-relational, versioned database that runs on top
of Amazon S3 (using EMRFS) or the Hadoop Distributed File System
(HDFS). HBase is a massively scalable, distributed big data store built for
random, strictly consistent, real-time access for tables with billions of rows
and millions of columns.
Zeppelin – An interactive notebook that enables interactive data exploration.
23
Explain about Apache OOzie, Apache spark and Apache Storm.
Oozie is a workflow engine that executes sequences of actions structured as directed
acyclic graphs (DAGs). Each action is an individual unit of work, such as a Spark
job or Hive query.
The Oozie "Spark action" runs a Spark job as part of an Oozie workflow. The
workflow waits until the Spark job completes before continuing to the next action.
Apache Spark is an open-source, distributed processing system used for big data
workloads. It utilizes in-memory caching, and optimized query execution for fast
analytic queries against data of any size. It provides development APIs in Java,
Scala, Python and R, and supports code reuse across multiple workloads—batch
processing, interactive queries, real-time analytics, machine learning, and graph
processing.
Spark was created to address the limitations to MapReduce, by doing processing in-
memory, reducing the number of steps in a job, and by reusing data across multiple
parallel operations. With Spark, only one-step is needed where data is read into
memory, operations performed, and the results written back—resulting in a much
faster execution. Spark also reuses data by using an in-memory cache to greatly
speed up machine learning algorithms that repeatedly call a function on the same
dataset. Data re-use is accomplished through the creation of DataFrames, an
abstraction over Resilient Distributed Dataset (RDD), which is a collection of
objects that is cached in memory, and reused in multiple Spark operations. This
dramatically lowers the latency making Spark multiple times faster than
MapReduce, especially when doing machine learning, and interactive analytics.
Apache Storm is a free and open source distributed realtime computation system.
Apache Storm makes it easy to reliably process unbounded streams of data, doing
for realtime processing what Hadoop did for batch processing. Apache Storm is
simple, can be used with any programming language, and is a lot of fun to use!
Apache Storm has many use cases: realtime analytics, online machine learning,
continuous computation, distributed RPC, ETL, and more. Apache Storm is fast: a
benchmark clocked it at over a million tuples processed per second per node. It
is scalable, fault-tolerant, guarantees your data will be processed, and is easy to set
up and operate.
Apache Storm integrates with the queueing and database technologies you already
use. An Apache Storm topology consumes streams of data and processes those
streams in arbitrarily complex ways, repartitioning the streams between each stage
of the computation however needed.
24
SOFTWARE & MANAGEMENT TOOLS FOR IOT CLOUD
STORAGE MODELS & COMMUNICATION APIS
Explain Software & Management Tools for IoT Cloud Storage Models &
Communication APIs
Cloud Storage uses remote servers to save data, such as files, business data, videos,
or images. Users upload data to servers via an internet connection, where it is saved
on a virtual machine on a physical server. To maintain availability and provide
redundancy, cloud providers will often spread data to multiple virtual machines in
data centers located across the world. If storage needs increase, the cloud provider
will spin up more virtual machines to handle the load. Users can access data in
Cloud Storage through an internet connection and software such as web portal,
browser, or mobile app via an application programming interface (API).
Cloud Storage is available in four different models:
Public
Public Cloud Storage is a model where an organization stores data in a service
provider’s data centers that are also utilized by other companies. Data in public
Cloud Storage is spread across multiple regions and is often offered on a
subscription or pay-as-you-go basis. Public Cloud Storage is considered to be
“elastic” which means that the data stored can be scaled up or down depending on
the needs of the organization. Public cloud providers typically make data available
from any device such as a smartphone or web portal.
Private
Private Cloud Storage is a model where an organization utilizes its own servers and
data centers to store data within their own network. Alternatively, organizations can
deal with cloud service providers to provide dedicated servers and private
connections that are not shared by any other organization. Private clouds are
typically utilized by organizations that require more control over their data and have
stringent compliance and security requirements.
Hybrid
A hybrid cloud model is a mix of private and public cloud storage models. A hybrid
cloud storage model allows organizations to decide which data it wants to store in
which cloud. Sensitive data and data that must meet strict compliance requirements
may be stored in a private cloud while less sensitive data is stored in the public
cloud. A hybrid cloud storage model typically has a layer of orchestration to
25
integrate between the two clouds. A hybrid cloud offers flexibility and allows
organizations to still scale up with the public cloud if need arises.
A cloud storage API is an application programming interface that connects a locally
based application to a cloud-based storage system so that a user can send data to it
and access and work with data stored in it. To the application, the cloud
storage system is just another target device, like disk-based storage.
A cloud API is specific to the storage service it targets. For example, a cloud object
storage service might offer an API that can create, fetch and delete objects on that
platform, as well as perform other object-related tasks. An API for a file storage
service operates at the file and folder level, supporting operations such as uploading
and downloading files and sharing folders with multiple users.
Even if providers offer the same type of storage, such as Amazon Simple Storage
Service (S3) and Microsoft Azure blob, each service still requires an API specific
to that service. For example, developers can't use the Amazon S3 representational
state transfer (REST) API to access an object in Azure Blob.
Examples of cloud storage APIs include the following:
Amazon S3 REST API. This one is a Hypertext Transfer Protocol (HTTP)
interface to Amazon S3 that is programming language-neutral. The API lets
developers build applications that include HTTP requests and use standard
HTTP headers and status codes. In this way, developers can work with any
toolkit that supports HTTP. However, Amazon added functionality to HTTP
in some areas, so developers should be aware of these changes when working
with the API.
Dropbox API. With this API, developers get a set of HTTP endpoints to help
integrate their applications with the Dropbox The API can access both user
and business endpoints, accommodating direct work with stored files.
Developers can use the API for advanced functionality, such as sharing,
thumbnails and full-text search. They can also manage the user lifecycle for
a business account, perform actions on multiple team members and access
Dropbox Business administration functionality.
Google Drive API. This API lets developers create applications
that integrate with Google Drive. It supports file upload and download,
search for files and folders, and file and folder sharing. Developers can also
create third-party shortcuts that are external links to data in a different data
store or cloud storage system.
Microsoft OneDrive REST API. Developers can use this API to
access OneDrive, OneDrive for Business, SharePoint document libraries
26
and Office Groups. The API makes it possible to read and store content in
any of these locations without having to modify the code.
Microsoft Azure Storage REST APIs. These offer programmatic access to
various Azure services. The APIs vary depending on which service is being
accessed. For example, developers can use the Blob service API to retrieve
service stats, set container metadata and create a hierarchical namespace
similar to a file system. They can use the Table service API to set service
properties, create tables and configure a table's access control list.
27
3. Analytics Services: It includes services such as AWS IoT Events, AWS
IoT Analytics, AWS IoT SiteWise & AWS IoT ThingsGraph, etc.
1. Device Software
Device Software is used to connect your devices and operate them at the edge.
FreeRTOS: It is an open-source real-time operating system for embedded
systems that can be used in IoT. It is suitable for programming low-power systems,
their deployment, security, and connection. It is open and freely available under
MIT open source license. It comes with a kernel and set of suitable libraries which
we would need for different sectors. Using Amazon FreeRTOS we can connect
the low power devices with the cloud’s powerful services. Free RTOS can be
easily reused and has high reliability. It comes with the features like
microcontrollers support, FreeRTOS console, secure connection of devices,
connectivity with cloud, etc.
AWS IoT Greengrass: AWS IoT Greengrass is an open-source runtime for IoT
edge devices and cloud services. It is widely used by people in homes, factories,
vehicles, and businesses. We can easily build intelligent device software on IoT
Greengrass. It comes with features like local processing, messaging, data
management, and other Machine learning interfaces. It also allows us to remotely
manage the devices. It also makes the device smarter over time by keeping it up-to-
date.
2. Connectivity & Control Services
These services are used to secure, control, and manage your devices from the cloud.
AWS IoT Core: AWS IOT core enables the IoT devices to securely and easily
communicate with the cloud. It can support up to billion devices easily. It can also
process trillions of messages at once and send them to suitable endpoints. It mainly
helps devices that use protocols like MQTT over WSS to publish their messages.
AWS IoT Device Defender: AWS IOT device defender is mainly used to secure a
group of IoT devices. It is responsible for the safety of IoT devices. It enforces the
safety measures such as identity, authentication, authorization of devices, and
encryption of the device’s data.
AWS IoT Device Management: AWS IoT Device Management mainly helps in
monitoring and tracking IoT devices. It is very much useful for the management of
IoT devices. Using this we can remotely monitor the health of each device, problems
with the devices, and necessary steps to be taken. The important benefit is that we
can overlook the status of the fleet of devices all at once.
3. Analytics Services
28
The Analytics Services are used to work with IoT data faster to extract value from
your data.
AWS IoT Events: As the name indicates AWS IOT Events helps the user to watch
over the devices by the events or notifications it sends. Its events are sent when an
error occurs or when any actions need to be triggered. Using this we can build
complex monitoring services for our IoT products. The major benefits of AWS IOT
events include getting inputs from multiple sources, Usage of simple logical
expressions to recognize complex cases of events, Triggering actions based on the
events, Automatically scaling the system to meet the IoT fleet’s demands.
AWS IoT Analytics: AWS IOT Analytics mainly analyzes and scales the IoT data.
It easily supports up to petabytes of IoT data. So it is highly efficient. It eliminates
the need to manage complex IoT infrastructure and helps in building fast and
responsive IoT applications. It can be used to operate huge volumes of IoT data
without needing to worry about the infrastructure needed for its processing. Since
IoT data is highly unstructured and susceptible to false readings it is necessary to
preprocess and analyze it properly for accurate and better results it can be done by
AWS IOT analytics.
AWS IoT SiteWise: AWS IoT Sitewise allows us to collect, model, and analyze
the data from the industrial IOT devices which are at scale. We can also gain insights
into industrial operations by configuring the suitable metrics using AWS IOT
Sitewise. We can also effectively process the data on the local devices with IoT
Sitewise Edge. Some benefits of it include, it collects the data from all the sources
consistently, even identifies remote issues with quick monitoring, improving the
cross-facility process with a central data source, process and monitoring the data
on-premises for better shop floor applications.
AWS IoT ThingsGraph: AWS IoT Things Graph is used to connect web services
and other different devices visually for building IoT applications. It provides a drag
and drop interface which makes it easy for us to build IoT applications easily by
connecting devices and web services quickly. Some of the benefits of the IoT things
graph include allowing us to build IoT applications faster, can easily create
sophisticated workflows, very easily monitoring and managing the devices.
29
Explain in detail with the advantages the various types of cloud.
Cloud computing is Internet-based computing in which a shared pool of resources
is available over broad network access, these resources can be provisioned or
released with minimum management efforts and service-provider interaction.
Types of Cloud
Public cloud
Private cloud
Hybrid cloud
Community cloud
Multicloud
Public Cloud
Public clouds are managed by third parties which provide cloud services over the
internet to the public, these services are available as pay-as-you-go billing
models.
They offer solutions for minimizing IT infrastructure costs and become a good
option for handling peak loads on the local infrastructure. Public clouds are the
go-to option for small enterprises, which can start their businesses without large
upfront investments by completely relying on public infrastructure for their IT
needs.
The fundamental characteristics of public clouds are multitenancy. A public
cloud is meant to serve multiple users, not a single customer. A user requires a
virtual computing environment that is separated, and most likely isolated, from
other users.
Advantages of using a Public cloud are:
1. High Scalability
2. Cost Reduction
3. Reliability and flexibility
4. Disaster Recovery
Disadvantages of using a Public cloud are:
1. Loss of control over data
2. Data security and privacy
3. Limited Visibility
4. Unpredictable cost
30
Private cloud
Private clouds are distributed systems that work on private infrastructure and
provide the users with dynamic provisioning of computing resources. Instead of a
pay-as-you-go model in private clouds, there could be other schemes that manage
the usage of the cloud and proportionally billing of the different departments or
sections of an enterprise. Private cloud providers are HP Data Centers, Ubuntu,
Elastic-Private cloud, Microsoft, etc.
The advantages of using a private cloud are as follows:
1. Customer information protection: In the private cloud security concerns
are less since customer data and other sensitive information do not flow out
of private infrastructure.
2. Infrastructure ensuring SLAs: Private cloud provides specific operations
such as appropriate clustering, data replication, system monitoring, and
maintenance, disaster recovery, and other uptime services.
3. Compliance with standard procedures and operations: Specific
procedures have to be put in place when deploying and executing
applications according to third-party compliance standards. This is not
possible in the case of the public cloud.
Disadvantages of using a private cloud are:
1. The restricted area of operations: Private cloud is accessible within a
particular area. So the area of accessibility is restricted.
2. Expertise requires: In the private cloud security concerns are less since
customer data and other sensitive information do not flow out of private
infrastructure. Hence skilled people are required to manage & operate cloud
services.
31
Hybrid cloud:
A hybrid cloud is a heterogeneous distributed system formed by combining
facilities of the public cloud and private cloud. For this reason, they are also
called heterogeneous clouds.
A major drawback of private deployments is the inability to scale on-demand and
efficiently address peak loads. Here public clouds are needed. Hence, a hybrid
cloud takes advantage of both public and private clouds.
Advantages of using a Hybrid cloud are:
1) Cost: Available at a cheap cost than other clouds because it is formed by a
distributed system.
2) Speed: It is efficiently fast with lower cost, It reduces the latency of the data
transfer process.
3) Security: Most important thing is security. A hybrid cloud is totally safe and
secure because it works on the distributed system network.
Disadvantages of using a Hybrid cloud are:
1. It’s possible that businesses lack the internal knowledge necessary to create
such a hybrid environment. Managing security may also be more
challenging. Different access levels and security considerations may apply
in each environment.
2. Managing a hybrid cloud may be more difficult. With all of the alternatives
and choices available today, not to mention the new PaaS components and
technologies that will be released every day going forward, public cloud and
migration to public cloud are already complicated enough. It could just feel
like a step too far to include hybrid.
32
Community cloud:
Community clouds are distributed systems created by integrating the services of
different clouds to address the specific needs of an industry, a community, or a
business sector. But sharing responsibilities among the organizations is difficult.
In the community cloud, the infrastructure is shared between organizations that
have shared concerns or tasks. An organization or a third party may manage the
cloud.
Advantages of using Community cloud are:
1. Because the entire cloud is shared by numerous enterprises or a community,
community clouds are cost-effective.
2. Because it works with every user, the community cloud is adaptable and
scalable. Users can alter the documents according to their needs and
requirements.
3. Public cloud is less secure than the community cloud, which is more secure
than private cloud.
4. Thanks to community clouds, we may share cloud resources, infrastructure,
and other capabilities between different enterprises.
Disadvantages of using Community cloud are:
1. Not all businesses should choose community cloud.
2. gradual adoption of data
3. It’s challenging for corporations to share duties.
Sectors that use community clouds are:
1. Media industry: Media companies are looking for quick, simple, low-cost
ways for increasing the efficiency of content generation. Most media productions
involve an extended ecosystem of partners. In particular, the creation of digital
content is the outcome of a collaborative process that includes the movement of
33
large data, massive compute-intensive rendering tasks, and complex workflow
executions.
2. Healthcare industry: In the healthcare industry community clouds are used to
share information and knowledge on the global level with sensitive data in the
private infrastructure.
3. Energy and core industry: In these sectors, the community cloud is used to
cluster a set of solution which collectively addresses the management,
deployment, and orchestration of services and operations.
4. Scientific research: In this organization with common interests in science share
a large distributed infrastructure for scientific computing.
Multicloud
Multicloud is the use of multiple cloud computing services from different
providers, which allows organizations to use the best-suited services for their
specific needs and avoid vendor lock-in.
This allows organizations to take advantage of the different features and
capabilities offered by different cloud providers.
Advantages of using multi-cloud:
1. Flexibility: Using multiple cloud providers allows organizations to choose
the best-suited services for their specific needs, and avoid vendor lock-in.
2. Cost-effectiveness: Organizations can take advantage of the cost savings
and pricing benefits offered by different cloud providers for different
services.
3. Improved performance: By distributing workloads across multiple cloud
providers, organizations can improve the performance and availability of
their applications and services.
34
4. Increased security: Organizations can increase the security of their data and
applications by spreading them across multiple cloud providers and
implementing different security strategies for each.
Disadvantages of using multi-cloud:
1. Complexity: Managing multiple cloud providers and services can be
complex and require specialized knowledge and expertise.
2. Increased costs: The cost of managing multiple cloud providers and services
can be higher than using a single provider.
3. Compatibility issues: Different cloud providers may use different
technologies and standards, which can cause compatibility issues and
require additional resources to resolve.
4. Limited interoperability: Different cloud providers may not be able to
interoperate seamlessly, which can limit the ability to move data and
applications between them.
35
2. Status data
This is the most basic, raw, and prevalent type of IoT data is status data. It is
collected in its most natural format, transformed into a consumable guise, and then
used for more complex analysis.
3. Automation data
Even in the 2020s, connected device automation is met with skepticism. However,
whether it is enabling automatic settings on a thermostat or automating light
switches in an office, it does bring forth a lot of convenience to the end customers.
Different layers work together to make data collection within an IoT system
possible. These can be broken down into five main layers:
1. Device layer
The devices that relay data to each other and the event processing layer create the
device layer of the IoT architecture. These devices either have sensors embedded
within them or have external sensors attached to them, which track and transmit the
connected device data.
2. Communication layer
This layer forms the network that facilitates communication between devices and
systems in the IoT architecture. Devices communicate using protocols such as
HTTP/HTTPS, MQTT, and CoAP.
3. IT edge layer
The edge layer comprises the device hardware, the installed operating system that
runs and manages processes on the device, and the device firmware, which is coded
onto the device that gives it working instructions. The edge layer is responsible for
sensing activities.
4. Event processing layer
This layer comprises systems that store all the data transmitted from the IoT devices,
clean this data, organize it, manipulate it, and analyze it to generate insights.
An example is an AI-based diagnostic platform used in asset maintenance. This
forms the backend of the IoT system, the location where all the data is stored and
prepared for the front-end system to use and deliver as insights to users.
5. Client communication layer
This layer makes the data and insights available to users of the IoT system. The data
collected and insights generated can be viewed and used by decision-makers
through front-end systems in this layer.
36
Explain in detail the various types of analytics in IoT?
The types of Internet of Things analytics are broken down by the types of challenges
they address and insights they produce. The main four are descriptive analytics,
diagnostic analytics, prescriptive analytics, and predictive analytics.
1. 1. Descriptive analytics
Descriptive analytics is the most basic form of analytic insight that allows users to
describe and aggregate incoming IoT data. Descriptive analytics -- even calculations
as simple as mean and standard deviation -- can be used to quickly make sense of
collected data. In a connected factory use case, description analytics might be used
to answer the question, “What are the average pump temperature, flow rate, and
RPM over a 30-minute time period?”
When identifying best-in-class descriptive analytics capabilities on an IoT platform,
enterprises should evaluate:
On-platform descriptive analytics capabilities: The ability of a platform to
perform descriptive analytic inquiries, such as aggregating or calculating
basic statistics of ingested data points across sensors, device, or groups of
devices as well as visually presenting the results.
On-platform data lake / big-data storage capabilities: The ability of the
platform to both store and query against very large quantities of ingested IoT
data including table-based data stores with greater than 10 million rows or
unstructured data stores with greater than 50 million records.
2. Diagnostic Analytics
Diagnostic analytics provides insights into why things are happening. It can
be used to understand anomalies, areas of inefficiency or other trends. In the
case that a device is not performing optimally, diagnostic analytics look at
IoT data to identify what the problem is.
3. Predictive analytics
Predictive analytics seek to model future data and behaviors by analyzing historical
data. Regression analysis such as linear regression is an example of predictive
analytics. In the same use case, predictive analytics might be used to answer the
question, “What is the estimated time-to-failure for a pump that is demonstrating a
20% increase in measured temperature?”
When identifying best-in-class predictive analytics capabilities on an IoT platform,
enterprises should evaluate:
On-platform predictive analytic model building: The ability of the
platform to automatically or through programmatic-interfaces generate a
37
predictive model of the underlying platform-ingested IoT data. Models such
as linear or polynomial regressions are typical, although more complex
modeling choices are available in sophisticated platforms.
On-platform predictive analytic model operation: The ability of the
platform to utilize either a platform-generated or platform-integrated data
model (such as R or Python) to classify data or identify outliers through
anomaly detection. Users should place emphasis on the ability to manage
models such as model versioning and updating as well as the ability to
integrate a predictive model within a complex event processing (CEP)
framework.
4. Prescriptive analytics
Prescriptive analytics are analyses to help enterprises optimize a future direction to
be taken. Image processing, machine learning, and natural language processing are
some of the techniques used to complete prescriptive analytics. Prescriptive
analytics might be used to answer the question, “To maximize pump uptime and
minimize service intervals, what is the maximum allowed temperature increase for
a pump before a preventative pump servicing must be scheduled?”
When identifying best-in-class prescriptive analytics capabilities on an IoT
platform, enterprises should evaluate:
On-platform prescriptive analytic model capabilities: The ability of the
platform to utilize either a platform-generated or platform-integrated data
model, such as R or Python, to optimize a business outcome or relevant KPI.
A prescriptive model should maximize or minimize a business-relevant KPI,
such as time-to-delivery in route planning or equipment uptime for predictive
maintenance.
Analytics help enterprises create business value by better understanding data. While
there is no perfect IoT platform, some platforms are built with higher quality IoT
analytics microservices than others. Savvy enterprises will test IoT platforms’
descriptive, predictive, and prescriptive analytics capabilities as well as the ability
of a platform to integrate with third-party analytic solutions. They will also fully
test their ability to use platform tools to configure on-platform analytics services
and export data to external systems. The best way to understand the capabilities of
an IoT platform is to use them.
i) How edge computing influencing IoT analytics?
Edge computing provides an IoT system with a local source of data processing,
storage, and computing. The IoT device gathers data and sends it to the edge
38
server. Meanwhile, the server analyzes data at the edge of the local network,
enabling faster, more readily scalable data processing.
When compared to the usual design that involves sending data to a central server
for analysis, an IoT edge computing system has:
Reduced latency of communication between the IoT device and the
network.
Faster response times and increased operational efficiency.
Smaller network bandwidth consumption as the system only streams data to
the cloud for long-term storage or analysis.
The ability to continue operating even if the system loses connection with
the cloud or the central server.
Edge computing is an efficient, cost-effective way to use the Internet of Things at
scale without risking network overloads. A business relying on IoT edge also
lowers the impact of a potential data breach. If someone breaches an edge device,
the intruder will only have access to local raw data (unlike what happens if
someone hacks a central server).
The same "smaller blast radius" logic applies to accidental data leaks and similar
threats to data integrity.
Additionally, edge computing offers a layer of redundancy for mission-critical IoT
tasks. If a single local unit goes down, other edge servers and IoT devices can go
on operating without issues. There are no single points of failure that can bring all
operations down to a halt.
A Few Noteworthy Use Cases of Edge Computing
Autonomous Vehicles: Autonomous vehicles (AVs) must stop pedestrians
from crossing in front of them. It is unfair to rely on a remote server to
make this judgement. Edge computing can be useful here. Furthermore,
vehicles can interact more efficiently since they can speak first rather than
sending data about accidents, weather conditions, traffic, or detours. Edge
computing can be useful here.
Healthcare Devices: People can keep tabs on chronic diseases with the
assistance of health monitors and other wearable medical devices. In an
emergency, it can quickly alert caregivers to the need for their assistance. If
these devices rely on sending data to the cloud before making decisions, the
results could be tragic.
Security Solutions: Because security surveillance systems must respond to
attacks in seconds, edge computing technologies can help. Security systems
39
can detect possible dangers in real-time and warn users of unexpected
activities.
Retail Advertising: Targeted adverts and information for retail enterprises
are based on essential factors specified on field devices, such as
demographic information. Edge computing can help secure user privacy in
this scenario.
Smart Speakers: Smart speakers can learn to recognise voice commands
locally to conduct simple tasks. Turning on and off lights or adjusting the
thermostat would still be possible even if internet access is lost.
Video Conferencing: Poor video quality, speech delays, and frozen
screens—a sluggish connection to the cloud can cause numerous video
conferencing issues. Users can reduce quality issues by bringing the server-
side of video conferencing software closer to the participants.
40
– Subscriber: Subscriber subscribes to the topics and receives the events
including the payload. In RPC model client can have following roles:
– Caller: Caller issues calls to the remote procedures along with call arguments.
– Callee: Callee executes the procedures to which the calls are issued by the
caller and returns the results back to the caller.
• Router: Routers are peers that perform generic call and event routing. In
publish-subscribe model Router has the role of a Broker:
– Broker: Broker acts as a router and routes messages published to a topic
to all subscribers subscribed to the topic.
In RPC model Router has the role of a Broker:
– Dealer: Dealer acts a router and routes RPC calls from the Caller to the Callee
and routes results from Callee to Caller.
• Application Code: Application code runs on the Clients (Publisher, Subscriber,
Callee or Caller).
In RPC model client can have following roles: –
1. Caller: Caller issues calls to the remote procedures along with call arguments.
– Callee: Callee executes the procedures to which the calls are issued by the
caller and returns the results back to the caller. • Router: Routers are peers that
perform generic call and event routing. In publish-subscribe model Router has
the role of a Broker: – Broker: Broker acts as a router and routes messages
published to a topic to all subscribers subscribed to thetopic.
In RPC model Router has the role of a Broker: –
1. Dealer: Dealer acts a router and routes RPC calls from the Caller to the Callee
and routes results from Callee to Caller.
2. Application Code: Application code runs on the Clients (Publisher, Subscriber,
Callee or Caller).
41