0% found this document useful (0 votes)
46 views

Unit 5 IOT

Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
46 views

Unit 5 IOT

Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 12

UNIT-5

Data Collection, Storage and Computing Using a Cloud Platform


I) cloud computing paradigm for Data collection, Storage and Computing:

i) Cloud Computing Paradigm: Cloud computing means a collection of services available


over the Internet. Cloud delivers the computational functionality. Cloud computing deploys
infrastructure of a cloud-service provider. The infrastructure deploys on a utility or grid computing
or web services environment that includes network, system, grid of computers or servers or data
centres.
Cloud Platform Services:
Cloud platform offers the following:
• Infrastructure for large data storage of devices, RFIDs, industrial plant machines,
automobiles and device networks
• Computing capabilities, such as analytics, IDE (Integrated Development Environment)
• Collaborative computing and data store sharing
Cloud Platform Usages:
Cloud platform usages are for connecting devices, data, APIs, applications and services,
persons, enterprises, businesses and XAAS.
The following Equation describes a simple conceptual framework of the Internet Cloud :
Internet Cloud + Clients = User applications and services with ‘no boundaries and no
walls’
Cloud storage and computing environment offers a virtualized environment, which
refers to a running environment made to appear as one to all applications and services, but in fact
physically two or more running environments and platforms may be present.
Virtualization: A characteristic of virtualized environment is that it enables applications and
services to execute in an independent execution environment (heterogeneous computing
environment). Each one of them stores and executes in isolation on the same platform, it may
actually execute or access to a set of data centres or servers or distributed services and computing
systems.
The applications or services which are hosted remotely and are accessible using the
Internet can easily be deployed at a user application or service in a virtualized environment,
provided the Internet or other communications are present.

ULN KUMAR, Dept of MCA, ASCS-KKD


• Virtualization of storage means user application or service accesses physical storage using
abstract database interface or file system or logical drive or disk drive, though in fact storage
may be accessible using multiple interfaces or servers.
• Virtualization of server means user application accesses not only one server but in fact
accesses multiple servers.
• Virtualized desktop means the user application can change and deploy multiple desktops,
though the access by the user is through their own computer platform (OS) that in fact may
be through multiple OSs and platforms or remote computers.
Cloud Computing Features and Advantages:
• On demand self-service to users for the provision of storage, computing servers, software
delivery and server time.
• Resource pooling in multi-tenant model
• Broad network accessibility in virtualized environment to heterogeneous users, clients,
systems and devices
• Elasticity
• Massive scale availability
• Scalability
• Maintainability
• Homogeneity
• Virtualization
ii) Cloud Deployment Models: Following are the four cloud deployment models:
a) Public cloud: This model is provisioned by educational institutions, industries, government
institutions or businesses or enterprises and is open for public use.
b) Private cloud: This model is exclusive for use by institutions, industries, businesses or
enterprises and is meant for private use in the organization by the employees and associated
users only.
c) Community cloud: This model is exclusive for use by a community formed by institutions,
industries, businesses or enterprises, and for use within the community organization,
employees and associated users. The community specifies security and compliance
considerations.
d) Hybrid cloud: A set of two or more distinct clouds (public, private or community) with
distinct data stores and applications that bind between them to deploy the proprietary or
standard technology.

ULN KUMAR, Dept of MCA, ASCS-KKD


II) Everything as a Service and Cloud Service Models:
Cloud computing supports 4 types of service models :

1. Software as a Service (SaaS)


2. Platform as a Service (PaaS)
3. Infrastructure as a Service(IaaS)
4. Data as a Service(DaaS)
1) SaaS : means Software as a Service. Software as a service (SaaS) is a cloud-based
software delivery model in which the cloud provider develops and maintains cloud
application software, provides automatic software updates, and makes software available
to its customers via the internet on a pay-as-you-go basis. For Example Google Docs,
Office 365, MS Windows Live, MS Exchange Labs., Salesforce.com, extensible CRM .
2) PaaS : Stands for Platform as a service is a cloud computing model that provides a
complete on-demand cloud platform—hardware, software and infrastructure—for
developing, running and managing applications. For Example Google App Engine, MS
Azure, Xively, Nimbits, AWS IoT, IBM IoT Foundation, Cisco IoT, IOx and Fog, TCS
CUP.
3) 3) IaaS : means Infrastructure as a Service. aaS, or Infrastructure as a Service, is a
cloud computing model that provides on-demand access to computing resources such as
servers, storage, networking, and virtualization. For Example Amazon Web Services and
Virtual Servers, GoGrid Virtual Servers, EC2 , Cloud.com Open Source IaaS, Cisco IaaS.
4) DaaS : means Data as a Service. Data at a data centre is made available to a user or
developer of application on demand. DaaS is a service model where the data store or data
warehouse is made available through the Internet on demand on rent (pay as per use in
multi tenancy model) to an enterprise. The data centre management, 24×7 power, control,
network, maintenance, scale up, data replicating and mirror nodes and systems as well as
physical security are the responsibilities of the data centre service provider. For Example
Tata Communications, GoGrid virtual servers, Amazon Virtual Servers, EC2.

III) IOT Cloud-based Services Using the xively, Nimbits and other platforms:

i) IoT Cloud-based Data Collection, Storage, Computing using Xively :


Xively is an open source platform for Arduino which is an open source prototyping platform
that provides connectivity with web deploying Internet.Xively is a commercial PaaS for the

ULN KUMAR, Dept of MCA, ASCS-KKD


IoT/M2M. It is used as a data aggregator and data mining website often integrated into the
Web of Things. Xively is an IoT PaaS for services and business services. The platform
supports the REST, WebSockets and MQTT protocols and connects the devices to Xively
Cloud Services
There are native SDKs for Android, Arduino, ARM mbed, Java, PHP, Ruby and
Python languages. Developers can use the workflow of prototyping, deployment and
management through the tools provided by Xively. A user creates an account with Xively
when deploying Xively APIs for the data collection and other functions.

A Xively PaaS service offers the following features:


 It enables services, business services platform which connects the products, including
collaboration products.
 Data collection in real-time over the Internet.
 Data visualization for data of connected sensors to IoT devices.
 Graphical plots of collected data
 It generates alerts.
 Access to historical data
 it supports Java, Python and Ruby, and Android platform.
 It supports the ARM mBedTM-based, Arduino-based and other hardware-platform based IoT
devices, and HTTP-based APIs which are easy to implement on device hardware acting as
clients to Xively web services and connect to web service and send data.
 It supports REST.
For example, an Arduino climate logging client that can be accessed via a browser or
mobile using Xively. Arduino is an open-source prototyping platform which is based on
ATmega microcontroller for embedded applications and IoT/ M2M. Xively is an open source
platform that enables IoT devices or sensors network to connect the sensor data to the web.
Xively provides services for logging, sharing and displaying sensor data of all kinds using an
HTTP based API.
ii) IoT Cloud-based Data Collection, Storage and Computing Services Using Nimbits :
Nimbits enables IoT on an open source distributed cloud. Nimbits cloud PaaS deploys an
instance of Nimbits Server at the device nodes. Nimbits functions as an M2M system data store, data
collector and logger with access to historical data. Nimbits architecture is a cloud-based Google App
Engine.

ULN KUMAR, Dept of MCA, ASCS-KKD


Nimbits PaaS services offer the following features:
1) Edge computing locally on embedded systems, built up of local applications. It runs the rules
and pushes important data up to the cloud running when connected over Internet and an
instance of Nimbits Server hosts at the device nodes which is then enabled.
2) It supports multiple programming languages, including Arduino, new Arduino library, push
functions from Arduino cloud, JavaScript, HTML or the Nimbits.io Java library.
3) Nimbits server functions as a backend platform. Nimbits data point can relay data between the
software systems, or hardware devices such as Arduino, using the cloud as a backend.
4) An open source Java library called nimbits.io enables easy development of JAVA, web and
Android solutions (Nimbits data, alerts, messages on mobile).
5) It provides a rule engine for connecting sensors, persons and software to the cloud and one
another. Rules can be for calculations, statistics, email alerts, xmpp messagesetc.
6) It provides a data logging service and access, and stores the historical data points and data
objects.

7) Storage in any format that can be serialized into a string, such as JSON or XML.

8) Data visualization for data of connected sensors to IoT devices.

9) It supports the mBedTM, Arduino, Raspberry Pi based and other hardware platform based
IoT devices.

10) It deploys software on Google App Engine, any J2EE server on Amazon EC2 or on a
Raspberry Pi.

Sensors, Participatory Sensing, RFIDs and Wireless Sensor Networks


I) Sensor Technology :
i) Sensing the Real world :
A sensor can sense a change in physical parameters, such as temperature, pressure,
light, metal, smoke and proximity to an object. Sensors can also sense acceleration,
orientation, location, vibrations or smell, organic vapors or gases. A microphone senses the
voice and changes in the sound, and is used to record voice or music. A sensor converts
physical energy like heat, sound, strain, pressure, vibrations and motion into electrical
energy. An electronic circuit connects to the input at a sensor. The circuit receives the output
of the sensor. The output is according to the variation in physical condition.

ULN KUMAR, Dept of MCA, ASCS-KKD


a. Analog Sensors: Analog sensors use a sensor and an associated electronic analog
circuit. Analog sensors generate analog outputs as per the physical environmental
parameters, such as temperature, strain, pressure, force, flex, vapours, magnetic field,
or proximity. Resistance of the sensing component may show measurable changes
with surrounding pressure or strain or magnetic field or humidity. There are various
types of analog sensors such as temperature, moisture, accelerometer, pressure, light,
sound sensor etc .
b. Digital Sensors : A specific electronic component or circuit gives digital output 1 or
0 (on-off state) or output of 1s and 0s as a binary number (corresponding to a set of
on-off states). A digital sensor uses the sensor and has an associated electronic circuit
which gives digital output. For example , Digital Temperature Sensor, Digital
Accelerometers,etc
ii) Examples of Sensors:
I) Temperature: A temperature sensor is an integrated circuit sensor that measures
the centigrade temperature and provides an output voltage that is linearly
proportional to the temperature. It can be used in various applications such as
microwave ovens, fridges, air conditioners, and water temperature monitoring.
II) Light: Sometimes also known as Photo Sensors, Light Sensors are one of the
important sensors. A simple Light Sensor available today is the Light Dependent
Resistor or LDR. The property of LDR is that its resistance is inversely
proportional to the intensity of the ambient light i.e., when the intensity of light
increases, its resistance decreases and vice-versa.
III) Acceleration: Accelerometer sensors convert physical acceleration recorded from
motion or gravity into a voltage output. Accelerometers can be used to measure
static acceleration due to gravity, the low-frequency component of the acceleration
and the dynamic acceleration due to animal movement.
IV) Touch Sensor: A touch sensor is a type of device that captures and records
physical touch or embrace on a device and/or object. It enables a device or object
to detect touch or near proximity, typically by a human user or operator.
V) Pressure: A pressure sensor is a device that senses and measures pressure. In this
case, pressure is defined as the amount of force exerted over an area. Pressure
sensors allow for more specialized maintenance strategies, such as predictive
maintenance.

ULN KUMAR, Dept of MCA, ASCS-KKD


VI) Humidity: Humidity sensors sense the relative humidity of the environment in
which it is placed. They measure both moisture and temperature in the atmosphere
and express relative humidity as a percentage of the ratio of moisture and
temperature in the air to the maximum amount held in the air at the current
temperature.
VII) Gas Sensor: Gas sensors use physical or chemical reactions to convert the
concentration of various gases into electrical signals, and output values after
calculation. Widely used to detect toxic and harmful gases and natural gas leaks.
II) Participatory Sensing :
Participatory sensing (PS) is the process whereby individuals and communities use
evermore-capable mobile phones and cloud services to collect and analyze systematic data for
use in discovery. A participant of a PS process can be sensors used in mobile phones. Mobile
phones have camera, temperature and humidity sensors, an accelerometer, a gyroscope, a
compass, infrared sensors, NFC sensors, bar or QR code readers, microphone and GPS.
Applications of PS include retrieving information about weather, environment
information, pollution, waste management, road faults, health of individuals and group of people,
traffic congestion, urban mobility, or disaster management, such as flood, fire, etc.

Figure shows the sources of data in the PS process for IoT applications.

ULN KUMAR, Dept of MCA, ASCS-KKD


1) Phase 1 is coordination, in which the participants of a PS process organize after identifying
the sources.
2) Next two phases, i.e. phases 2 and 3 involve data capture, communication and storage on
servers or cloud.
3) Next two phases, i.e. phases 4 and 5 involve PS data processing and analytics, visualization
and knowledge discovery. Last phase, i.e. phase 6 is for initiating appropriate actions.

Figure : IIoT phases in the bicycle manufacturing process


III) ACTUATOR :
An actuator is a device that takes actions as per the input command, pulse or state (1 or
0), or set of 1s and 0s, or a control signal. An attached motor, speaker, LED or an output device
converts electrical energy into physical action. Examples of applications of actuators are:
 Light sources
 LEDs
 Piezoelectric vibrators and sounders
 Speakers
 Solenoids
 Servomotor
 Relay switch

ULN KUMAR, Dept of MCA, ASCS-KKD


 Switching on a set of streetlights
 Application of brakes in a moving vehicle
 Ringing of alarm bell
 Switching off or on a heater or air-conditioner or boiler current in a steam boiler
in a thermal plant.
a) Light Source: Traffic lights are examples of function of light sources as actuators controlled
by the inputs.
b) LED: LED is an actuator which emits light or infrared radiation. Uses of different colour
LEDs, RGB (Red-Green-Blue) LEDs, intensity variation of LED and colours, graphic and
text display using big screens are actions which are controlled using the inputs. RGB LED
has three inputs to control, i.e. R, G and B components and thus the composite colour. Pulse
width modulated pulses control the LED light emission intensity. A microcontroller is used
for generating PWM outputs.
c) Piezoelectric Vibrator: Piezoelectric crystals when applied in varying electric voltages at
the input generate vibrations.
d) Piezoelectric Speaker: A piezoelectric speaker enables synthesized music tunes and sounds.
The appropriately programmed pulses generate the music, sounds, buzzers and alarms when
they are the input to the speaker. A microcontroller is used for generating PWM outputs for
actions using speakers.
e) Solenoid: A solenoid is an actuator consisting of a number of cylindrically wound coils. The
flow of current creates a magnetic field in proportion to the number of turns in the solenoid
and the current in it. If a shaft made of iron is placed along the axis, then its motion can be
controlled by the input current, pulses and variations of current with time.
IV) Radio Frequency Identification Technology :
RFID is a wireless communication. A tag enables identification of an object at
different locations and times. A product, parcel, postal article, person, bird, animal,
vehicle or object can have a tag or label in order to make the identification feasible. The
reader circuit of an ID can use UART or NFC protocol to identify the tag, when the RFID
tag is at a distance less than 20 cm. An active NFC device/mobile generates an RF field
which induces the currents in RFID and generates enough power for RFID. Using that
power, the RFID transmits the identification of tag contents
A hotspot consists of a wireless transceiver or Wi-Fi transceiver for Internet
connectivity. It receives signals from a number of RFID tags in an organisation and

ULN KUMAR, Dept of MCA, ASCS-KKD


transmits the data to the web server over the Internet. The hotspot connects to the Internet
for IoT services, applications and business processes. A mobile or wireless nearby the
device can also function as a hotspot .
Principle of RFID:
A tag is an electronic circuit which transmits its ID using RF signals. The ID
transmits to a reader, then that transmits along with the additional information to a remote
server or cloud connected through the Internet. The additional information is as per the
application. For example, for a tracking application, it is location and time-stamped data
along with the ID.
RFID IoT Applications:
Examples are tracking and inventory control of goods, supply chain systems, business
processes such as for payment, leasing, insurance, and quality management, access to
buildings and road tolls or secured store centre entries, and devices such as RFID based
temperature or any other parameter sensor. New applications of RFID network have been
found in designing a factory, protecting a brand and anti-counterfeiting measures.
Components of an RFID System:
Figure shows the components needed in a system for IoT applications and services.
The components of an RFID system are:
The components of an RFID system are: RFID is a tiny chip which functions as a tag or label
onto an object. The chip is one of three types—passive, active and batterypowered passive (battery
switches when reader is nearby).
A transceiver : is in-built at the chip. It communicates in a range 10 cm to 200 m according to the
chip. The chip does UART communication to the reader either using RF link or does NFC
communication to the reader within 20 cm range; standard frequency range used can be between 120
kHz to 150 kHz, 13.56 MHz, 433 MHz, higher when using UHF and microwave frequencies.
Transceiver using RF frequencies recommended by Regulator has the data transfer rate of 115 kbps
using carrier RF signals from 915 MHz to 868 MHz, 315 MHz or 27 MHz.
Data processing subsystem: A reader associates a data processing subsystem which consists of a
computing device and a middleware and provides connectivity to the Internet, directly or through a
gateway which includes a data adaptation sub layer. The subsystem is a backend system. A reader
circuit may send data directly or through a computer, mobile or tablet to the Internet.

ULN KUMAR, Dept of MCA, ASCS-KKD


V) Wireless sensor networks Technology :
Definition: WSN is defined as a network in which each sensor node connects wirelessly and
has the capability of computation, for data compaction, aggregation and analysis. Each one
also has communication as well as networking capabilities. A WSN consists of spatially
distributed autonomous devices (sensors).
i) WSN Architecture :
Figure shows the three-layer architecture of a node. The three layers are application layer,
network layer (serial link with data-link MAC), physical cum data-link layer (MAC +
Physical Layer).

The application layer software components are sensor management, sensor query and
data dissemination, task assignment, data advertisement and application-specific
protocols. Sensor, CPU and program sensor node constitute the application and network

ULN KUMAR, Dept of MCA, ASCS-KKD


layers. Network layer links serially to the data-link layer, and may include the
coordination or routing software. A serial link interconnects the layers to a wireless radio
circuit and antenna. The radio circuit is at physical cum data-link layer. Communication
subsystem uses MAC and physical protocols.
Architecture for Connecting Nodes:
Figure shows two architectures for connecting WSN nodes, fixed connecting
infrastructure of WSN nodes, coordinators, relays, gateways and routers, and mobile adhoc
network of WSNs, access points, routers, gateways and multi-point relays. An access point is
a fixed point transceiver to provide the accessibility to nodes present nearby or nodes
reaching in the wireless range. A multipoint relay connects to other networks such as the
Internet or mobile service provider network. A router’s role is to select a path for packet
transmission among the presently available paths in the network. A coordinator provides the
link between the two networks.

Fixed infrastructure example is a smart home network consisting of WSNs at security


surveillance points, refrigerator, air conditioner, microwave, TV and computers with WiFi
access point. Another example is WSN nodes, access points, routers, gateways and multi-
point relays. At an industrial plant, multiple machine locations, stores, offices, sales and
receipts and other plant locations.

ULN KUMAR, Dept of MCA, ASCS-KKD

You might also like