0% found this document useful (0 votes)
43 views

IoT_Module-3

Uploaded by

soumyaks81
Copyright
© © All Rights Reserved
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
43 views

IoT_Module-3

Uploaded by

soumyaks81
Copyright
© © All Rights Reserved
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 36

INTERNET OF THINGS

Course Code : 6131A

IoT – Module 3 1
SYLLABUS
Program : Diploma in Computer Engineering
Course Code : 6131 A Course Title : Introduction to IoT
Semester : 6 Credits : 4
Course Category : Program Elective
Periods per week : 4 (L:3 T:1 P:0) Periods per semester : 60

Course Objectives:
 Provide knowledge on the basic building blocks of IoT and its applications.
 Familiarise different protocols used in IoT.
 Introduce the relationship between IoT and cloud.
 Explore the implementations of IoT.

IoT – Module 3 2
SYLLABUS

Course Prerequisites:

Topic Course Code Course Name Semester


Embedded Systems and Real
Embedded Systems 5131 5
Tile Operating System
Computer Networking Computer Communication &
4132 4
Concepts and Protocols Networks
Programming Concepts 3132 Programming in C 3

IoT – Module 3 3
COURSE OUTCOMES
On the completion of the course student will be able to:

Duration Cogitative
COn Description
(Hours) level
Explain the fundamental concepts of Internet of Things
CO1 13 Understanding
(IoT)
CO2 Interpret the protocols used in IoT infrastructure 13 Understanding
CO3 Explain the use of cloud for IoT 12 Understanding
Illustrate the development of IoT applications with
CO4 20 Understanding
Embedded Computing Boards.
Series Test 2

IoT – Module 3 4
MODULE III

Explain the use of Cloud for IoT

IoT – Module 3 5
MODULE II - OUTCOMES
Module outcomes
On the completion of the module student will be able to:
Module Duration
Description Cognitive Level
Outcomes (Hours)
CO 3 Explain the use of cloud for IoT
M3.01 Explain the fundamentals of cloud computing 3 Understanding
M3.02 Explain challenges of cloud with IoT 3 Understanding
Outline the selection of cloud service provider for IoT
M3.03 2 Understanding
applications
M3.04 Explain Fog Computing 2 Understanding
Explain the Security and privacy aspects of cloud
M3.05 2 Understanding
computing.

Contents:
Fundamentals of cloud computing – Challenges – Selection of cloud services – Introduction to
Fog Computing – Security issues.
IoT – Module 3 6
Cloud Computing
Definition

• A computing paradigm where the boundaries of computing will be determined by


economic rationale rather than technical limits.
• Cloud computing is the delivery of different services through the Internet.
• Cloud is preferred more than expected as it is affordable, effective and efficient for
data storage.
• The resources include tools and applications like data storage, servers, databases,
networking and software.

IoT – Module 3 7
Cloud Computing ….
Cloud Services

• Cloud services are :


1. Software – as – a – Service (SaaS)
2. Platform – as – a – Service (PaaS)
3. Infrastructure – as – a – Service (IaaS)
Software – as – a – Service
• Also called as application as a service.
• Complete software application as a service is provided to the user.
Platform – as – a – Service
• Provides platform to develop.
• Users have to build, manage and maintain the application.
• Development tools, APIs, libraries etc will be provided by the cloud service provider.

IoT – Module 3 8
Cloud Computing ….
Cloud Services …

Infrastucture – as – a – Service
• The entire infrastructure will be provided as support.
• The service is mostly provided as virtual machines (VMs).
• The user need not worry about the infrastructure at all and they manage the machines
• They select the OS and underlying applications.

Cloud Service Providers


1. Amazon Web Services
2. Azure
3. Adafruit

IoT – Module 3 9
Cloud Computing ….
Cloud Computing Deployment Models
• The data and data confidentiality are the essential parameters for choosing cloud.
• Based on the data being worked on, cloud is categorized into three deployment
models
1. Public Cloud Deployment
2. Private Cloud Deployment
3. Hybrid Cloud Deployment

IoT – Module 3 10
Cloud Computing ….
Cloud Computing Deployment Models …
Public Cloud Deployment

• It is for general public or large group


• The cloud service provider owns all the resources which include hardware/
infrastructure and software
• Service provider will take care of all resource management - Installation,
maintenance, upgradation and monitoring.
• Access to this cloud service happens via internet.
• It is a pay-and-use system

IoT – Module 3 11
Cloud Computing ….
Cloud Computing Deployment Models …
Advantages of Public Cloud Deployment

• Simple approach where the user needs to pay for what he has used.
• It is a pay-and-use system.
• No need to invest in setting up the hardware or infrastructure
• 24X7 customer support
• It can be easily scaled up or scaled down based on requirements
Disdvantages of Public Cloud Deployment

• Data is not within the walls of the organization or user


• Securing the data while ensuring privacy.

IoT – Module 3 12
Cloud Computing ….
Cloud Computing Deployment Models …
Private Cloud Deployment
• Data generated is safeguarded.
• Mostly used for confidential data
• This model can be chosen wherever and whenever the Intellectual Property needs to
be protected
• When this model is chosen the complete control of everything is well within the
organization for which the deployment is carried out.
• The cloud servers are typically in the datacentres inside the organization.
• Everything has to be taken care of by the organization that owns this deployment
• The hardware, software, datacentre, personnel, infrastructure etc be maintained,
monitored and installed by the organization.
• This model offers the organization complete flexibility in terms of deciding and
managing the resources
• Data security can be ensured through this model as per the organization’s data
security guidelines. IoT – Module 3 13
Cloud Computing ….
Cloud Computing Deployment Models …

Advantages of Private Cloud Deployment


• Data security is paramount in this model and is ensured
• This model is s a flexible model compared to others

Disdvantages of Private Cloud Deployment


• It is expensive.
• Its maintenance, periodic upgradation etc could be difficult.
• Policies and other related things are to be framed carefully to make sure data is safe

IoT – Module 3 14
Cloud Computing ….
Cloud Computing Deployment Models …

Hybrid Cloud Deployment


• It is a mix of both private and public cloud deployment.
• The resources offered and managed are in-house and third party based.
• Both the organinazation and service providers have control and stake
• It offers flexibility to decide what is to be owned by the organization and what can be
leased to a third party.
• The data can be secured to a great extent.

IoT – Module 3 15
Cloud Computing ….
Cloud Computing Deployment Models …

Advantages of Hybrid Cloud Deployment

• Both organization and third party come together


• Not as expensive as private cloud deployment
• Flexible and controlled access can be enabled

Disdvantages of Hybrid Cloud Deployment


• Data may be unsafe, because it is public cloud.
• The data could be vulnerable to attacks as well.

IoT – Module 3 16
Cloud Computing ….
Cloud Computing Deployment Models …

IoT – Module 3 17
Challenges of Cloud with IoT

• The following are the challenges which increases when IoT and cloud are integrated.

1. Privacy and Security


2. Bandwidth cost
3. Migration and portability
4. Availability, Reliability and Robustness
5. Costing
6. Data Ownership
7. Expertise

IoT – Module 3 18
Challenges of Cloud with IoT …..
1. Privacy and Security

• Valuable and confidential data goes into the cloud, outside the firewall.
• The moment it crosses the firewall the data becomes hackable.
• There is a possibility that this data could be monitored without informing the user.
Solution to privacy and security challenges are :
• Periodic monitoring of network activities, tracking unusual events in the network.
• Before signing the contract with cloud service provider, it is necessary to read and
understand the regulations involved in the service being provided
• The data received is from multiple sensor nodes, it is important to interpret the data
in correct sequence. This will safeguard the data and ensure that it is not stolen

IoT – Module 3 19
Challenges of Cloud with IoT …..
2. Bandwidth Cost

• IoT is all about data, and in most cases, this would be big data.
• There is always necessity of huge investment for bandwidth.

3. Migration and Portability

• Data is to be migrated to and from the cloud


4. Availability, Reliability and Robustness

• The data generation and storage have to be spontaneous, that needs a continuous
cloud storage availability.
• If there is a downtime, it could miss critical data, hence the reliability decides the
effectiveness of the service.
• The process should be robust towards handling data at different rates.
IoT – Module 3 20
Challenges of Cloud with IoT …..
5. Costing

• Unclear vision and planning may lead to unnecessary cost.

6. Data Ownership

• The data stored by the user on the cloud is owned by the user.
• The data is under the ownership of the person who generates it.
• When opting for cloud storage, the data is under the custody of the cloud service
provider.
7. Expertise

• Cloud platform gets updated every now and then and so experts have to constantly
upgrade themselves.

IoT – Module 3 21
Selection of Cloud Service Provider
• There are many parameters and considerations to select the cloud service provider.
• The following are some of the criteria for the considerations :
1. Certification and Standards Compliance
2. Financial Health of the Service Provider
3. Business and Technology Strength
4. Compliance Audit
5. Service Level Agreements
6. Reporting/Tracking
7. Costing and Billing
8. Maintenance Monitoring and Upgrade
9. Support
10. Security

IoT – Module 3 22
Selection of Cloud Service Provider ….

IoT – Module 3 23
Selection of Cloud Service Provider ….
Criteria 1 : Certification and Standards Compliance

• When a product adheres to the standards that are accepted widely, it is considered as
reliable product
• The Cloud Service Providers are expected to comply with standards.
• Some of the main standards for cloud are ISO, Open Cloud Consortium (OCC) ,
IEEE etc.
Criteria 2: Financial Health of the Service Provider
• The service provider should hold sufficient money/funding to operate for a long
period.
• If the service provider has healthy financial status and history of sustenance, then it is
most unlikely to shutdown

IoT – Module 3 24
Selection of Cloud Service Provider ….

Criteria 3: Business and Technology Strength


• The technical expertise to sustain and adapt to a client’s requirements is a key factor
in selecting a CSP.
• The CSP needs business skills as well to sustain.
• Business skills includes growth planning, financial planning and other factors that are
required to sustain in the market.

Criteria 4: Compliance Audit


• The CSP must validate compliance with the client’s requirement, which should be
done through a proper third-party audit.

IoT – Module 3 25
Selection of Cloud Service Provider ….
Criteria 5: Service Level Agreements
• Service Level Agreements (SLAs) provide details and information about the services
being provided.
• They serve as a contract between two parties.
• They define the terms and conditions and the legal aspects of the contract between the
two parties.

Criteria 6: Reporting/ Tracking


• CSP should be capable of issuing a comprehensive performance report.
• This will enable the customer to understand the complete situation.

Criteria 7: Costing and Billing


• It should be transparent and should provide the complete details of the usage.
• It is expected to be automated with details of the complete resource utilization.
IoT – Module 3 26
Selection of Cloud Service Provider ….
Criteria 8: Maintenance Monitoring and Upgrade
• It should be easy and less expensive to migrate to the CSP’s environment.
• It should be easier to install, manage, maintain and upgrade.
• The upgrade includes migration from private to public to hybrid cloud, if needed.

Criteria 9: Support
• Help and assistance should be provided when required.
• Support should be available based on the agreements and a dedicated resource.
• Onsite support may be needed when clarifications cannot be offered over phone.

Criteria 10: Security


• The infrastructure, hardware and software should be secured.
• There should be defined policies about the security and should be shared with a
customer.
• The data should be safe in case of breakdown/failure.
IoT – Module 3 27
Fog Computing
• The most sensitive data should be analysed in the vicinity closer to the place where
it is generated.
• With fog computing it is possible to analyse the data at a place that is closer to
where it was generated.
• This prevents from sending all data to cloud and respond much faster since data
travel is reduced considerably
• It thus becomes a reality to process the data in milliseconds time frame.
• Fog is below cloud, which is closer to the elements that generate data.
• After analysis data stored is pushed into the cloud

IoT – Module 3 28
Fog Computing ….
Working of Fog Computing

IoT – Module 3 29
Fog Computing ….
Working of Fog Computing
• Sensors/devices generate data and transmit it to the middle layer which is very
close to the data source.
• The nodes in the middle layer are capable of handling the data
• This requires minimum power and lesser resources.
• All data need not go to the cloud at the instant it is generated
• Sensitive data gets processed very fast which results in an instant response.
• Fog is not meant for hefty (strong) storage.
• It is still cloud that does the task of storing big data
• Fog is just an intermediary layer that enables faster data processing , thereby
facilitating faster response time

IoT – Module 3 30
Fog Computing ….
Working of Fog Computing …
Fog Nodes
• It receives the data feed from the sensors, in real time.
• Response time is minimal, ideally in milliseconds
• Fog computing is transit, where data is stored for a limited time only.
• Data is then sent to cloud as a summary.
• Not all data goes to cloud.
Cloud Computing platform
• It receives data summary from the fog.
• Data prediction, data analytics, data storage etc takes place here.

IoT – Module 3
31
Fog Computing ….
Advantages/Benefits of Fog Computing

• Minimal amount of data sent to the cloud.


• Reduced bandwidth consumption.
• Reduced data latency.
• Improved data security.
• Immediate processing of data in real time.

IoT – Module 3
32
Difference Between Edge and Fog Computing
• Both fog and edge are computing capabilities to be executed locally, before
passing it to the cloud.
• Both reducing complete dependency on the cloud to perform computation
• Both reduces the time delay due to decision making before the data is passed on
to the cloud.
• Data driven decisions would be much faster which is crucial for real-time
applications.
• Main difference is the place where data processing takes place
• Edge computing is the computing carried out at the device itself, where all the
sensors are connected
• The computing devices would be physically much closer to the data generation
points(sensors)
• In fog computing data processing is moved to the processors that are connected to
the local area network (LAN).
• The main difference between edge and fog computing is the distance
IoT – Module 3
33
Cloud Computing : Security Issues/Aspects
• The security of any computing platform including cloud computing depends on
the following :
 Software Security
 Infrastructure Security
 Storage Security
 Network Security
1. Software Security
• If there are defects created/generated during the development phase, it is a
software security threat.
• Defects such as software implementation defects, memory allocation, design
issues, and exception handling all contribute to security issues.
• Care should be taken to write software for IoT without errors/defects.
• It can be ensured by complete and comprehensive testing carried out at all stages

IoT – Module 3
34
Cloud Computing : Security Issues/Aspects

2. Infrastructure Security
• Ensure the infrastructure provided by CSP is safe.
• The entire data is stored and is dependent on this infrastructure
• The third party involved in infrastructure is to check the security vulnerabilities
with the infrastructure.
• All infrastructure related guidelines should be mentioned clearly in the
agreements and should be transparent to the customer.
• If data is damaged, everything is damaged and lost, hence care should be taken to
protect the infrastructure.

IoT – Module 3
35
Cloud Computing : Security Issues/Aspects
3. Storage Security
• It is important to be in formed of who owns the data and the location where it is
stored
• Data leak, snooping, malware attacks, etc are all threats to the stored data and can
be listed under storage security.
• Appropriate antivirus software and periodic monitoring, should help protect data

4. Network Security
• Data is stored in the cloud via the Internet and hence all network threats become a
possibility

IoT – Module 3
36

You might also like