IoT_Module-3
IoT_Module-3
IoT – Module 3 1
SYLLABUS
Program : Diploma in Computer Engineering
Course Code : 6131 A Course Title : Introduction to IoT
Semester : 6 Credits : 4
Course Category : Program Elective
Periods per week : 4 (L:3 T:1 P:0) Periods per semester : 60
Course Objectives:
Provide knowledge on the basic building blocks of IoT and its applications.
Familiarise different protocols used in IoT.
Introduce the relationship between IoT and cloud.
Explore the implementations of IoT.
IoT – Module 3 2
SYLLABUS
Course Prerequisites:
IoT – Module 3 3
COURSE OUTCOMES
On the completion of the course student will be able to:
Duration Cogitative
COn Description
(Hours) level
Explain the fundamental concepts of Internet of Things
CO1 13 Understanding
(IoT)
CO2 Interpret the protocols used in IoT infrastructure 13 Understanding
CO3 Explain the use of cloud for IoT 12 Understanding
Illustrate the development of IoT applications with
CO4 20 Understanding
Embedded Computing Boards.
Series Test 2
IoT – Module 3 4
MODULE III
IoT – Module 3 5
MODULE II - OUTCOMES
Module outcomes
On the completion of the module student will be able to:
Module Duration
Description Cognitive Level
Outcomes (Hours)
CO 3 Explain the use of cloud for IoT
M3.01 Explain the fundamentals of cloud computing 3 Understanding
M3.02 Explain challenges of cloud with IoT 3 Understanding
Outline the selection of cloud service provider for IoT
M3.03 2 Understanding
applications
M3.04 Explain Fog Computing 2 Understanding
Explain the Security and privacy aspects of cloud
M3.05 2 Understanding
computing.
Contents:
Fundamentals of cloud computing – Challenges – Selection of cloud services – Introduction to
Fog Computing – Security issues.
IoT – Module 3 6
Cloud Computing
Definition
IoT – Module 3 7
Cloud Computing ….
Cloud Services
IoT – Module 3 8
Cloud Computing ….
Cloud Services …
Infrastucture – as – a – Service
• The entire infrastructure will be provided as support.
• The service is mostly provided as virtual machines (VMs).
• The user need not worry about the infrastructure at all and they manage the machines
• They select the OS and underlying applications.
IoT – Module 3 9
Cloud Computing ….
Cloud Computing Deployment Models
• The data and data confidentiality are the essential parameters for choosing cloud.
• Based on the data being worked on, cloud is categorized into three deployment
models
1. Public Cloud Deployment
2. Private Cloud Deployment
3. Hybrid Cloud Deployment
IoT – Module 3 10
Cloud Computing ….
Cloud Computing Deployment Models …
Public Cloud Deployment
IoT – Module 3 11
Cloud Computing ….
Cloud Computing Deployment Models …
Advantages of Public Cloud Deployment
• Simple approach where the user needs to pay for what he has used.
• It is a pay-and-use system.
• No need to invest in setting up the hardware or infrastructure
• 24X7 customer support
• It can be easily scaled up or scaled down based on requirements
Disdvantages of Public Cloud Deployment
IoT – Module 3 12
Cloud Computing ….
Cloud Computing Deployment Models …
Private Cloud Deployment
• Data generated is safeguarded.
• Mostly used for confidential data
• This model can be chosen wherever and whenever the Intellectual Property needs to
be protected
• When this model is chosen the complete control of everything is well within the
organization for which the deployment is carried out.
• The cloud servers are typically in the datacentres inside the organization.
• Everything has to be taken care of by the organization that owns this deployment
• The hardware, software, datacentre, personnel, infrastructure etc be maintained,
monitored and installed by the organization.
• This model offers the organization complete flexibility in terms of deciding and
managing the resources
• Data security can be ensured through this model as per the organization’s data
security guidelines. IoT – Module 3 13
Cloud Computing ….
Cloud Computing Deployment Models …
IoT – Module 3 14
Cloud Computing ….
Cloud Computing Deployment Models …
IoT – Module 3 15
Cloud Computing ….
Cloud Computing Deployment Models …
IoT – Module 3 16
Cloud Computing ….
Cloud Computing Deployment Models …
IoT – Module 3 17
Challenges of Cloud with IoT
• The following are the challenges which increases when IoT and cloud are integrated.
IoT – Module 3 18
Challenges of Cloud with IoT …..
1. Privacy and Security
• Valuable and confidential data goes into the cloud, outside the firewall.
• The moment it crosses the firewall the data becomes hackable.
• There is a possibility that this data could be monitored without informing the user.
Solution to privacy and security challenges are :
• Periodic monitoring of network activities, tracking unusual events in the network.
• Before signing the contract with cloud service provider, it is necessary to read and
understand the regulations involved in the service being provided
• The data received is from multiple sensor nodes, it is important to interpret the data
in correct sequence. This will safeguard the data and ensure that it is not stolen
IoT – Module 3 19
Challenges of Cloud with IoT …..
2. Bandwidth Cost
• IoT is all about data, and in most cases, this would be big data.
• There is always necessity of huge investment for bandwidth.
• The data generation and storage have to be spontaneous, that needs a continuous
cloud storage availability.
• If there is a downtime, it could miss critical data, hence the reliability decides the
effectiveness of the service.
• The process should be robust towards handling data at different rates.
IoT – Module 3 20
Challenges of Cloud with IoT …..
5. Costing
6. Data Ownership
• The data stored by the user on the cloud is owned by the user.
• The data is under the ownership of the person who generates it.
• When opting for cloud storage, the data is under the custody of the cloud service
provider.
7. Expertise
• Cloud platform gets updated every now and then and so experts have to constantly
upgrade themselves.
IoT – Module 3 21
Selection of Cloud Service Provider
• There are many parameters and considerations to select the cloud service provider.
• The following are some of the criteria for the considerations :
1. Certification and Standards Compliance
2. Financial Health of the Service Provider
3. Business and Technology Strength
4. Compliance Audit
5. Service Level Agreements
6. Reporting/Tracking
7. Costing and Billing
8. Maintenance Monitoring and Upgrade
9. Support
10. Security
IoT – Module 3 22
Selection of Cloud Service Provider ….
IoT – Module 3 23
Selection of Cloud Service Provider ….
Criteria 1 : Certification and Standards Compliance
• When a product adheres to the standards that are accepted widely, it is considered as
reliable product
• The Cloud Service Providers are expected to comply with standards.
• Some of the main standards for cloud are ISO, Open Cloud Consortium (OCC) ,
IEEE etc.
Criteria 2: Financial Health of the Service Provider
• The service provider should hold sufficient money/funding to operate for a long
period.
• If the service provider has healthy financial status and history of sustenance, then it is
most unlikely to shutdown
IoT – Module 3 24
Selection of Cloud Service Provider ….
IoT – Module 3 25
Selection of Cloud Service Provider ….
Criteria 5: Service Level Agreements
• Service Level Agreements (SLAs) provide details and information about the services
being provided.
• They serve as a contract between two parties.
• They define the terms and conditions and the legal aspects of the contract between the
two parties.
Criteria 9: Support
• Help and assistance should be provided when required.
• Support should be available based on the agreements and a dedicated resource.
• Onsite support may be needed when clarifications cannot be offered over phone.
IoT – Module 3 28
Fog Computing ….
Working of Fog Computing
IoT – Module 3 29
Fog Computing ….
Working of Fog Computing
• Sensors/devices generate data and transmit it to the middle layer which is very
close to the data source.
• The nodes in the middle layer are capable of handling the data
• This requires minimum power and lesser resources.
• All data need not go to the cloud at the instant it is generated
• Sensitive data gets processed very fast which results in an instant response.
• Fog is not meant for hefty (strong) storage.
• It is still cloud that does the task of storing big data
• Fog is just an intermediary layer that enables faster data processing , thereby
facilitating faster response time
IoT – Module 3 30
Fog Computing ….
Working of Fog Computing …
Fog Nodes
• It receives the data feed from the sensors, in real time.
• Response time is minimal, ideally in milliseconds
• Fog computing is transit, where data is stored for a limited time only.
• Data is then sent to cloud as a summary.
• Not all data goes to cloud.
Cloud Computing platform
• It receives data summary from the fog.
• Data prediction, data analytics, data storage etc takes place here.
IoT – Module 3
31
Fog Computing ….
Advantages/Benefits of Fog Computing
IoT – Module 3
32
Difference Between Edge and Fog Computing
• Both fog and edge are computing capabilities to be executed locally, before
passing it to the cloud.
• Both reducing complete dependency on the cloud to perform computation
• Both reduces the time delay due to decision making before the data is passed on
to the cloud.
• Data driven decisions would be much faster which is crucial for real-time
applications.
• Main difference is the place where data processing takes place
• Edge computing is the computing carried out at the device itself, where all the
sensors are connected
• The computing devices would be physically much closer to the data generation
points(sensors)
• In fog computing data processing is moved to the processors that are connected to
the local area network (LAN).
• The main difference between edge and fog computing is the distance
IoT – Module 3
33
Cloud Computing : Security Issues/Aspects
• The security of any computing platform including cloud computing depends on
the following :
Software Security
Infrastructure Security
Storage Security
Network Security
1. Software Security
• If there are defects created/generated during the development phase, it is a
software security threat.
• Defects such as software implementation defects, memory allocation, design
issues, and exception handling all contribute to security issues.
• Care should be taken to write software for IoT without errors/defects.
• It can be ensured by complete and comprehensive testing carried out at all stages
IoT – Module 3
34
Cloud Computing : Security Issues/Aspects
2. Infrastructure Security
• Ensure the infrastructure provided by CSP is safe.
• The entire data is stored and is dependent on this infrastructure
• The third party involved in infrastructure is to check the security vulnerabilities
with the infrastructure.
• All infrastructure related guidelines should be mentioned clearly in the
agreements and should be transparent to the customer.
• If data is damaged, everything is damaged and lost, hence care should be taken to
protect the infrastructure.
IoT – Module 3
35
Cloud Computing : Security Issues/Aspects
3. Storage Security
• It is important to be in formed of who owns the data and the location where it is
stored
• Data leak, snooping, malware attacks, etc are all threats to the stored data and can
be listed under storage security.
• Appropriate antivirus software and periodic monitoring, should help protect data
4. Network Security
• Data is stored in the cloud via the Internet and hence all network threats become a
possibility
IoT – Module 3
36