Lec 2
Lec 2
Introduction - Lec 2
Dr.Ravikiran Y
Assistant Professor
EEE Department
BITS Pilani Hyderabad Campus
● Characteristics of IOT
● Functional Blocks
● Enablers of IOT
● Overview of enablers
● Project Discussion
● Self-Configuring
● Unique Identity
● Unique Identity
● Each IoT device has a unique identity and unique identifier (such
as an IP address).
● Allows communication
● Device interfaces allow users to query the devices, monitor their
status and control them remotely
• Services: An IoT system used various types of IoT services such as services
for device monitoring, device control services, data publishing services and
services for device discovery.
• Security: Security functional block secures the IoT system and by providing
functions such as authentication, authorization, message and content integrity
and data security
• Application: IoT applications provide an interface that the users can use to
control and monitor various aspects of the IoT system. Applications also allow
the users to view the system status and view or analyse processed data.
8/23/2023 10
Communication Protocols:
• Enable network connectivity and coupling to applications.
• Define the data exchange formats, data encoding, addressing
schemes and routing.
• Sequence control, flow control and retransmission.
8/23/2023 13
14
IoT Enabling Technologies – Embedded
Systems
Embedded Systems:
• A computer system embedded to perform specific tasks.
• Has every basic component that a computer has.
• Some embedded systems have specialised processors.
8/23/2023 15
16
17
8/23/2023 18
8/23/2023 19
Cloud Computing
• A transformative computing paradigm that involves delivering
applications and services over the Internet.
• Provisioning of computing resources of computing, networking and
storage resources on demand (often in a “pay as you go” model).
• Provides Platform independent access.
• Multi-tenancy.
• Virtual resources are assigned to users.
8/23/2023 20
• Infrastructure-as-a-Service (IaaS):
Cloud
21
• Platform-as-a-Service (PaaS):
• Users have the ability to develop and deploy applications in the cloud
computing development tools, application programming interfaces (APIs),
software libraries and the services provided by the cloud.
• The Cloud Service provider manager the underlying infrastructure.
• The users are responsible for developing, deploying, configuring and
managing applications.
• E.g Windows Azure - https://en.wikipedia.org/wiki/Microsoft_Azure
• AWS - comprises over 200 products and services including computing,
storage, networking, database, analytics, application services,
deployment, management, machine learning, mobile, developer tools,
RobOps and tools for the Internet of Things. 22
• Software-as-a-Service (SaaS):
• Users are provided with a complete software application or the user
interface to the application.
• The Cloud Service provider manager the underlying infrastructure.
• The applications are provided to the user via a thin client interface.
• Applications are platform independent.
• E.g Salesforce, Microsoft Office 365, Google drive - create documents,
presentations, tools for collaborative development
23
1. Research Methodology
2. How to read papers -
- level 1
-level 2
- kinds of papers - survey, theoretical, algorithm design, simulation, experimental.
- Research rabbit
E.g survey paper -Inter-Disciplinary Research Challenges in Computer Systems for the 2020s
https://dl.acm.org/doi/book/10.5555/3297279
25
Before comprehensive exams: present your work, complete report -> submit your work in an
upcoming conference.
Topics include : WSN, Drones, HCI, IOT frameworks, ML based IOT data processing etc..
If you are interested about any topic/problem statement -> we shall evaluate it and accordingly
guide you
End