Walking through the fog (computing) - Keynote talk at Italian Networking Work...FBK CREATE-NET
"Walking through the fog (computing): trends, use-cases and open issues"
Despite its huge success in many IT-enabled application scenarios, cloud computing has demonstrated some intrinsic limitations that may severely limit its adoption in several contexts where constraints like e.g. preserving data locally, ensuring real-time reactivity or guaranteeing operation continuity despite lack of Internet connectivity (or a combination of them) are mandatory. These distinguishing requirements fostered an increased interest toward computing approaches that inherit the flexibility and adaptability of the cloud paradigm, while acting in proximity of a specific scenario. As a consequence, the emergence of this “proximity computing” approach has exploded into a plethora of architectural solutions (and novel terms) like fog computing, edge computing, dew computing, mist computing but also cloudlets, mobile cloud computing, mobile edge computing (and probably few others I may not be aware of…). The talk will initially make an attempt to introduce some clarity among these “foggy” definitions by proposing a taxonomy whose aim is to help identifying their peculiarities as well as their overlaps. Afterwards, the most important components of a generalized proximity computing architecture will be explained, followed by the description of few research works and use cases investigated within our Center and based on this emerging paradigm. An overview of open issues and interesting research directions will conclude the talk.
Data Modelling and Knowledge Engineering for the Internet of ThingsCory Andrew Henson
Tutorial on Data Modelling and Knowledge Engineering for the Internet of Things, presented at EKAW 2012, Galway City, Ireland, October 8-12, 2012
http://knoesis.org/iot-tutorial-ekaw2012/
Fog Computing extends the Cloud Computing paradigm close to the edge of network, and thus enabling a new breed of applications and services.
This is why it is also sometimes called as Edge computing but the defining characteristics of the Fog are: Low latency, Mobility, High efficiency and performance.
In this presentation we will talk about What is Fog Computing, how is it different from Edge computing, its benefits and limitations and how it will shape the future of IoT.
Integration of internet of things with wireless sensor networkIJECEIAES
The Internet of things (IoT) is a major source for technology solutions in many industries. The IoT can consider, Wireless Sensor Network (WSN) as the backbone network to reduce formation or advent of new technology. Integration of these would reduce the burden and form smart sensor node network with nodes given access to internet. WSN is already a major legacy system that has percolated into many industries. Thus by integration of IoT and WSN no huge paradigm shift is needed for the industries.
automation in it's next level,applications of fog computing,need of fog computing,fog vs cloud, Internet of things,fog vs cloud vs IOT ,existing cloud system, proposed system presentation conclusion
Walking through the fog (computing) - Keynote talk at Italian Networking Work...FBK CREATE-NET
"Walking through the fog (computing): trends, use-cases and open issues"
Despite its huge success in many IT-enabled application scenarios, cloud computing has demonstrated some intrinsic limitations that may severely limit its adoption in several contexts where constraints like e.g. preserving data locally, ensuring real-time reactivity or guaranteeing operation continuity despite lack of Internet connectivity (or a combination of them) are mandatory. These distinguishing requirements fostered an increased interest toward computing approaches that inherit the flexibility and adaptability of the cloud paradigm, while acting in proximity of a specific scenario. As a consequence, the emergence of this “proximity computing” approach has exploded into a plethora of architectural solutions (and novel terms) like fog computing, edge computing, dew computing, mist computing but also cloudlets, mobile cloud computing, mobile edge computing (and probably few others I may not be aware of…). The talk will initially make an attempt to introduce some clarity among these “foggy” definitions by proposing a taxonomy whose aim is to help identifying their peculiarities as well as their overlaps. Afterwards, the most important components of a generalized proximity computing architecture will be explained, followed by the description of few research works and use cases investigated within our Center and based on this emerging paradigm. An overview of open issues and interesting research directions will conclude the talk.
Data Modelling and Knowledge Engineering for the Internet of ThingsCory Andrew Henson
Tutorial on Data Modelling and Knowledge Engineering for the Internet of Things, presented at EKAW 2012, Galway City, Ireland, October 8-12, 2012
http://knoesis.org/iot-tutorial-ekaw2012/
Fog Computing extends the Cloud Computing paradigm close to the edge of network, and thus enabling a new breed of applications and services.
This is why it is also sometimes called as Edge computing but the defining characteristics of the Fog are: Low latency, Mobility, High efficiency and performance.
In this presentation we will talk about What is Fog Computing, how is it different from Edge computing, its benefits and limitations and how it will shape the future of IoT.
Integration of internet of things with wireless sensor networkIJECEIAES
The Internet of things (IoT) is a major source for technology solutions in many industries. The IoT can consider, Wireless Sensor Network (WSN) as the backbone network to reduce formation or advent of new technology. Integration of these would reduce the burden and form smart sensor node network with nodes given access to internet. WSN is already a major legacy system that has percolated into many industries. Thus by integration of IoT and WSN no huge paradigm shift is needed for the industries.
automation in it's next level,applications of fog computing,need of fog computing,fog vs cloud, Internet of things,fog vs cloud vs IOT ,existing cloud system, proposed system presentation conclusion
Phoenix Data Conference - Big Data Analytics for IoT 11/4/17Mark Goldstein
“Big Data for IoT: Analytics from Descriptive to Predictive to Prescriptive” was presented to the Phoenix Data Conference on 11/4/17 at Grand Canyon University.
As the Internet of Things (IoT) floods data lakes and fills data oceans with sensor and real-world data, analytic tools and real-time responsiveness will require improved platforms and applications to deal with the data flow and move from descriptive to predictive to prescriptive analysis and outcomes.
IoT ( M2M) - Big Data - Analytics: Emulation and DemonstrationCHAKER ALLAOUI
Study and simulation of the systems modern IoT with examples of connected objects such as: GPS(GLOBAL POSITIONING SYSTEM), Philips Hue, Thermometer, and connected cars implemented with the technology nodeJS and Node-Red with the communication protocol of M2M ( MQTT).
As well as an analytical study based on Elasticsearch, MongoDB, Apache Hadoop, Apache Hive and Jaspersoft.
A review on orchestration distributed systems for IoT smart services in fog c...IJECEIAES
This paper provides a review of orchestration distributed systems for IoT smart services in fog computing. The cloud infrastructure alone cannot handle the flow of information with the abundance of data, devices and interactions. Thus, fog computing becomes a new paradigm to overcome the problem. One of the first challenges was to build the orchestration systems to activate the clouds and to execute tasks throughout the whole system that has to be considered to the situation in the large scale of geographical distance, heterogeneity and low latency to support the limitation of cloud computing. Some problems exist for orchestration distributed in fog computing are to fulfil with high reliability and low-delay requirements in the IoT applications system and to form a larger computer network like a fog network, at different geographic sites. This paper reviewed approximately 68 articles on orchestration distributed system for fog computing. The result shows the orchestration distribute system and some of the evaluation criteria for fog computing that have been compared in terms of Borg, Kubernetes, Swarm, Mesos, Aurora, heterogeneity, QoS management, scalability, mobility, federation, and interoperability. The significance of this study is to support the researcher in developing orchestration distributed systems for IoT smart services in fog computing focus on IR4.0 national agenda.
History based on traditional instruments, followed
by interface bus and cards to access data to measure and control,
thus elaborating the concept of Cloud Instrumentation is a
fundamental step in knowing more about instruments accessed
from cloud.
The measurement technology sounds to be the new era of
development of parameters to be measured and co
This talk brings one of the major problems of IoT: scalability. And yet, besides putting the problem, here we also present our solution, which uses cloud elasticity to support the IoT demand.
In the Field of Internet of Things IOT the devices by themselves can recognize the environment and conduct a certain functions by itself. IOT Devices majorly consist with sensors. Cloud Computing which is based in sensor networks manages huge amount of data which includes transferring and processing which takes delayed in service response time. As the growth of sensor network is increased, the demand to control and process the data on IOT devices is also increasing. Vikas Vashisth | Harshit Gupta | Dr. Deepak Chahal "Fog Computing: An Empirical Study" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-4 | Issue-3 , April 2020, URL: https://www.ijtsrd.com/papers/ijtsrd30675.pdf Paper Url :https://www.ijtsrd.com/computer-science/realtime-computing/30675/fog-computing-an-empirical-study/vikas-vashisth
The Internet of things (IoT) is the extension of Internet connectivity into physical devices and everyday objects.
Presentation cover below topics
How IoT works ? IoT Key Components. Enabling technologies for IoT, IoT Connectivity , Technology Road Map. Iot architecture, How to Choose the Right IoT Platform,Benefits of IoT, IoT adoption barriers, Challenges for IoT security:
Other Challenges
Phoenix Data Conference - Big Data Analytics for IoT 11/4/17Mark Goldstein
“Big Data for IoT: Analytics from Descriptive to Predictive to Prescriptive” was presented to the Phoenix Data Conference on 11/4/17 at Grand Canyon University.
As the Internet of Things (IoT) floods data lakes and fills data oceans with sensor and real-world data, analytic tools and real-time responsiveness will require improved platforms and applications to deal with the data flow and move from descriptive to predictive to prescriptive analysis and outcomes.
IoT ( M2M) - Big Data - Analytics: Emulation and DemonstrationCHAKER ALLAOUI
Study and simulation of the systems modern IoT with examples of connected objects such as: GPS(GLOBAL POSITIONING SYSTEM), Philips Hue, Thermometer, and connected cars implemented with the technology nodeJS and Node-Red with the communication protocol of M2M ( MQTT).
As well as an analytical study based on Elasticsearch, MongoDB, Apache Hadoop, Apache Hive and Jaspersoft.
A review on orchestration distributed systems for IoT smart services in fog c...IJECEIAES
This paper provides a review of orchestration distributed systems for IoT smart services in fog computing. The cloud infrastructure alone cannot handle the flow of information with the abundance of data, devices and interactions. Thus, fog computing becomes a new paradigm to overcome the problem. One of the first challenges was to build the orchestration systems to activate the clouds and to execute tasks throughout the whole system that has to be considered to the situation in the large scale of geographical distance, heterogeneity and low latency to support the limitation of cloud computing. Some problems exist for orchestration distributed in fog computing are to fulfil with high reliability and low-delay requirements in the IoT applications system and to form a larger computer network like a fog network, at different geographic sites. This paper reviewed approximately 68 articles on orchestration distributed system for fog computing. The result shows the orchestration distribute system and some of the evaluation criteria for fog computing that have been compared in terms of Borg, Kubernetes, Swarm, Mesos, Aurora, heterogeneity, QoS management, scalability, mobility, federation, and interoperability. The significance of this study is to support the researcher in developing orchestration distributed systems for IoT smart services in fog computing focus on IR4.0 national agenda.
History based on traditional instruments, followed
by interface bus and cards to access data to measure and control,
thus elaborating the concept of Cloud Instrumentation is a
fundamental step in knowing more about instruments accessed
from cloud.
The measurement technology sounds to be the new era of
development of parameters to be measured and co
This talk brings one of the major problems of IoT: scalability. And yet, besides putting the problem, here we also present our solution, which uses cloud elasticity to support the IoT demand.
In the Field of Internet of Things IOT the devices by themselves can recognize the environment and conduct a certain functions by itself. IOT Devices majorly consist with sensors. Cloud Computing which is based in sensor networks manages huge amount of data which includes transferring and processing which takes delayed in service response time. As the growth of sensor network is increased, the demand to control and process the data on IOT devices is also increasing. Vikas Vashisth | Harshit Gupta | Dr. Deepak Chahal "Fog Computing: An Empirical Study" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-4 | Issue-3 , April 2020, URL: https://www.ijtsrd.com/papers/ijtsrd30675.pdf Paper Url :https://www.ijtsrd.com/computer-science/realtime-computing/30675/fog-computing-an-empirical-study/vikas-vashisth
The Internet of things (IoT) is the extension of Internet connectivity into physical devices and everyday objects.
Presentation cover below topics
How IoT works ? IoT Key Components. Enabling technologies for IoT, IoT Connectivity , Technology Road Map. Iot architecture, How to Choose the Right IoT Platform,Benefits of IoT, IoT adoption barriers, Challenges for IoT security:
Other Challenges
Edge computing is a distributed computing paradigm that brings computation and data storage closer to the sources of data. This ppt contains everything about Edge Computing Starting from its Definition, needs, terms involved to its merits, demerits and application use cases
It is an exciting time in computing with the sea-change happening both on the technology fronts and application fronts. Networked sensors and embedded platforms with significant computational capabilities with access to backend utility computing resources, offer a tremendous opportunity to realize large-scale cyber-physical systems (CPS) to address the many societal challenges including emergency response, disaster recovery, surveillance, and transportation. Referred to as Situation awareness applications, they are latency-sensitive, data intensive, involve heavy-duty processing, run 24x7, and result in actuation with possible retargeting of sensors. Examples include surveillance deploying large-scale distributed camera networks, and personalized traffic alerts in vehicular networks using road and traffic sensing. This talk covers ongoing research in Professor Ramachandran’s embedded pervasive lab to provide system support for Internet of Things.
Internet of Things A Vision, Architectural Elements, and Future Directions Mostafa Arjmand
Present paper aboat Internet of Things (IoT) A Vision, Architectural Elements, and Future Directions
Overall IoT vision and the technologies that will achieve the it
Application domains in IoT with a new approach in defining them
Cloud centric Internet of Things realization and challenges
Case study of data analytics on the Aneka/Azure cloud platform
Open Challenges and Future Directions
Smart environment application domains
Cloud computing
Cloud centric Internet of Things
Microsoft Azure
Internet Of Things(IoT) is emerging technology in future world.The term IoT comprises of Cloud computing, Data mining,
Big data analytics, hardware board. The Security and Interoperability is a main factor that influences the IoT Enegy
consumption is also main fator for IoT application designing.The various protocols such as MQTT,AMQP,XMPP are used in
IoT.This paper analysis the various protocols used in Internet of Things.
What is Your Edge From the Cloud to the Edge, Extending Your ReachSUSE
As companies continue to take advantage of the benefits of cloud – increased flexibility, speed of innovation and quickly responding to business demands, it is no wonder that they want to extend these benefits to the edge. But there are still a lot of questions.
THE ROLE OF EDGE COMPUTING IN INTERNET OF THINGSsuthi
Edge computing refers to the enabling technologies allowing computation to be performed at the edge of the network, on downstream data on behalf of cloud services and upstream data on behalf of IoT services. Here we define “edge” as any computing and network resources along the path between data sources and cloud data centers. For example, a smart phone is the edge between body things and cloud, a gateway in a smart home is the edge between home things and cloud, a micro data center and a cloudlet is the edge between a mobile device and cloud. The rationale of edge computing is that computing should happen at the proximity of data sources. From our point of view, edge computing is interchangeable with fog computing, but edge computing focus more toward the things side, while fog computing focus more on the infrastructure side. Edge computing could have as big an impact on our society as has the cloud computing.
A Guide to Edge Computing Technology For Business OperationsCerebrum Infotech
Edge computing services enable us to generate more data at a faster rate and distribute it to a range of networks and devices located at or near the consumer. For further details, see our website.
Making Actionable Decisions at the Network's EdgeCognizant
With the vast analytical power unleashed by the Internet of Things (IoT) ecosystem, IT organizations must be able to apply both cloud analytics and edge analytics - cloud for strategic decision-making and edge for more instantaneous response based on local sensors and other technology.
The French Revolution, which began in 1789, was a period of radical social and political upheaval in France. It marked the decline of absolute monarchies, the rise of secular and democratic republics, and the eventual rise of Napoleon Bonaparte. This revolutionary period is crucial in understanding the transition from feudalism to modernity in Europe.
For more information, visit-www.vavaclasses.com
The Art Pastor's Guide to Sabbath | Steve ThomasonSteve Thomason
What is the purpose of the Sabbath Law in the Torah. It is interesting to compare how the context of the law shifts from Exodus to Deuteronomy. Who gets to rest, and why?
Synthetic Fiber Construction in lab .pptxPavel ( NSTU)
Synthetic fiber production is a fascinating and complex field that blends chemistry, engineering, and environmental science. By understanding these aspects, students can gain a comprehensive view of synthetic fiber production, its impact on society and the environment, and the potential for future innovations. Synthetic fibers play a crucial role in modern society, impacting various aspects of daily life, industry, and the environment. ynthetic fibers are integral to modern life, offering a range of benefits from cost-effectiveness and versatility to innovative applications and performance characteristics. While they pose environmental challenges, ongoing research and development aim to create more sustainable and eco-friendly alternatives. Understanding the importance of synthetic fibers helps in appreciating their role in the economy, industry, and daily life, while also emphasizing the need for sustainable practices and innovation.
We all have good and bad thoughts from time to time and situation to situation. We are bombarded daily with spiraling thoughts(both negative and positive) creating all-consuming feel , making us difficult to manage with associated suffering. Good thoughts are like our Mob Signal (Positive thought) amidst noise(negative thought) in the atmosphere. Negative thoughts like noise outweigh positive thoughts. These thoughts often create unwanted confusion, trouble, stress and frustration in our mind as well as chaos in our physical world. Negative thoughts are also known as “distorted thinking”.
Palestine last event orientationfvgnh .pptxRaedMohamed3
An EFL lesson about the current events in Palestine. It is intended to be for intermediate students who wish to increase their listening skills through a short lesson in power point.
Operation “Blue Star” is the only event in the history of Independent India where the state went into war with its own people. Even after about 40 years it is not clear if it was culmination of states anger over people of the region, a political game of power or start of dictatorial chapter in the democratic setup.
The people of Punjab felt alienated from main stream due to denial of their just demands during a long democratic struggle since independence. As it happen all over the word, it led to militant struggle with great loss of lives of military, police and civilian personnel. Killing of Indira Gandhi and massacre of innocent Sikhs in Delhi and other India cities was also associated with this movement.
Model Attribute Check Company Auto PropertyCeline George
In Odoo, the multi-company feature allows you to manage multiple companies within a single Odoo database instance. Each company can have its own configurations while still sharing common resources such as products, customers, and suppliers.
How to Make a Field invisible in Odoo 17Celine George
It is possible to hide or invisible some fields in odoo. Commonly using “invisible” attribute in the field definition to invisible the fields. This slide will show how to make a field invisible in odoo 17.
The Roman Empire A Historical Colossus.pdfkaushalkr1407
The Roman Empire, a vast and enduring power, stands as one of history's most remarkable civilizations, leaving an indelible imprint on the world. It emerged from the Roman Republic, transitioning into an imperial powerhouse under the leadership of Augustus Caesar in 27 BCE. This transformation marked the beginning of an era defined by unprecedented territorial expansion, architectural marvels, and profound cultural influence.
The empire's roots lie in the city of Rome, founded, according to legend, by Romulus in 753 BCE. Over centuries, Rome evolved from a small settlement to a formidable republic, characterized by a complex political system with elected officials and checks on power. However, internal strife, class conflicts, and military ambitions paved the way for the end of the Republic. Julius Caesar’s dictatorship and subsequent assassination in 44 BCE created a power vacuum, leading to a civil war. Octavian, later Augustus, emerged victorious, heralding the Roman Empire’s birth.
Under Augustus, the empire experienced the Pax Romana, a 200-year period of relative peace and stability. Augustus reformed the military, established efficient administrative systems, and initiated grand construction projects. The empire's borders expanded, encompassing territories from Britain to Egypt and from Spain to the Euphrates. Roman legions, renowned for their discipline and engineering prowess, secured and maintained these vast territories, building roads, fortifications, and cities that facilitated control and integration.
The Roman Empire’s society was hierarchical, with a rigid class system. At the top were the patricians, wealthy elites who held significant political power. Below them were the plebeians, free citizens with limited political influence, and the vast numbers of slaves who formed the backbone of the economy. The family unit was central, governed by the paterfamilias, the male head who held absolute authority.
Culturally, the Romans were eclectic, absorbing and adapting elements from the civilizations they encountered, particularly the Greeks. Roman art, literature, and philosophy reflected this synthesis, creating a rich cultural tapestry. Latin, the Roman language, became the lingua franca of the Western world, influencing numerous modern languages.
Roman architecture and engineering achievements were monumental. They perfected the arch, vault, and dome, constructing enduring structures like the Colosseum, Pantheon, and aqueducts. These engineering marvels not only showcased Roman ingenuity but also served practical purposes, from public entertainment to water supply.
This is a presentation by Dada Robert in a Your Skill Boost masterclass organised by the Excellence Foundation for South Sudan (EFSS) on Saturday, the 25th and Sunday, the 26th of May 2024.
He discussed the concept of quality improvement, emphasizing its applicability to various aspects of life, including personal, project, and program improvements. He defined quality as doing the right thing at the right time in the right way to achieve the best possible results and discussed the concept of the "gap" between what we know and what we do, and how this gap represents the areas we need to improve. He explained the scientific approach to quality improvement, which involves systematic performance analysis, testing and learning, and implementing change ideas. He also highlighted the importance of client focus and a team approach to quality improvement.
Ethnobotany and Ethnopharmacology:
Ethnobotany in herbal drug evaluation,
Impact of Ethnobotany in traditional medicine,
New development in herbals,
Bio-prospecting tools for drug discovery,
Role of Ethnopharmacology in drug evaluation,
Reverse Pharmacology.
Unit 8 - Information and Communication Technology (Paper I).pdfThiyagu K
This slides describes the basic concepts of ICT, basics of Email, Emerging Technology and Digital Initiatives in Education. This presentations aligns with the UGC Paper I syllabus.
Unit 8 - Information and Communication Technology (Paper I).pdf
Edge computing and its role in architecting IoT
1. EDGE computing and it’s role in architecting IoT
K. K. PATTANAIK
Wireless Sensor Networks laboratory
Atal Bihari Vajpayee –
Indian Institute of Information Technology and Management,
Gwalior
kkpatnaik@iiitm.ac.in
3. Academic programs offered
• 4 year BTech in CSE (started in 2017)
• 5 year Integrated Post Graduate in IT
• 5 year Integrated Post Graduate in MBA
• 2 year Mtech in CN, IS, DC, VLSI
• PhD
4. Figure: PDP loop explaining the ways in which Industry 4.0 might benefit
customers. Adapted from Center for Integrated Research, Deloitte US, 2018
• Shift from “linear data and
communications” to “real time
access to data and
intelligence” driven by the
continuous and cyclical flow
of information and actions
between the physical and
digital worlds
• Decentralization of digital
entities onto edge nodes
towards a modular structure of
MES
• Interoperability among digital
entities and execution of
sophisticated algorithms on
edge nodes.
Edge computing in Industry 4.0
5. Example on improving the availability of the
machine
Figure: OE without an adaptive mechanism Figure: OE as a consequence of adaptive mechanism
• Identification of “beginning of deterioration” and the “rate of deterioration” in OE of machine
is necessary to mitigate the unscheduled down state.
• Sophisticated algorithms at edge nodes to signal the deterioration and adaptively control the workload
will defer early breakdown and enhance average AOE
AOE =
𝐴𝑐𝑡𝑢𝑎𝑙 𝑡ℎ𝑟𝑜𝑢𝑔ℎ𝑝𝑢𝑡
𝐼𝑑𝑒𝑎𝑙 𝑡ℎ𝑟𝑜𝑢𝑔ℎ𝑝𝑢𝑡
Case of improving the average Absolute Operational Efficiency (AOE) of machine through edge intelligence
6. Visualizing Edge – An Introduction
Figure: Edge seen at different levels of granularity in an industry
• The Edge computing realm:
• Equipment protection
• Overall equipment effectiveness
monitoring
• Optimizing supply chain processes
• Predictive maintenance
• Improved performance: Alerts, analysis,
robustness, reliability, autonomous, resilient,
enhanced uptime
• Privacy and security: Data kept close to its
generation
• Reduced operational cost: Due to reduced data
migration, bandwidth, savings from cloud
spending
7. Visualizing Edge – An Introduction (continued)
• The in-device computing capability in real-time helps in
improving performances through embedded intelligence
in devices
• Huge IoT data generated is exploited at Edge
• Ratio of amount of data generated by all sensors to the
data used for decision is high
Edge Computing
Space
Cloud computing
Space
Low latency, increased privacy, less cost, real time processing,
relatively less processing capability, faster insights and actions,
improved response time, improved BW availability.
8. Visualizing Edge – An Introduction (continued)
Edge Computing
Space
Cloud computing
Space
Low latency, increased privacy,
less cost, real time processing,
relatively less processing capability,
faster insights and actions,
improved response time,
improved BW availability.
9. Abstract view of Edge paradigm
Source: IONOS Inc.
Source: IoT World Today
10. Figure: Layered view referenced to ISA 95 standard
Layered view of the ecosystem
11. Edge computing – Use cases
• Banks analyze ATM video feeds in real-time
• Mining companies use their data to optimize operations
• Chemical industries analyze the workers’ exposure trend to
harmful chemicals/gases
• Retailers can personalize the shopping experience of
customers and communicate specialized offers
• Industrial analytics
• Fleet management application
• Product traceability application
• Connected elevators to monitor the elevators’ health
• Cobots (collaborative robots) etc.
12. Data pro-sumers
• Data is both produced and consumed by us
• Traditionally all our data is placed on public/private cloud
and process them (term it as workload) on cloud
Cloud infrastructure
(Public/private)
Service providers
Network infrastructure
Service providers
Factory/workplace
(Data pro-summers)
Place workload as close to the place where the data is being produced
and action is being taken.
13. Data processing approaches
Figure: Classification of data processing mechanisms for IoT sensory environment.
Source: R K Verma et al., (2019), In-network context inference in IoT sensory environment for efficient network resource utilization, Journal of Network and Computer Applications,
Volume 130, 2019, Pages 89-103.
14. Non-message exchange based in-network data processing
Figure: Taxonomy of outlier detection techniques in wireless sensor networks.
Source: Bharti, S et al., (2016), Gravitational outlier detection for wireless sensor networks. Int. J. Commun. Syst. 29 (13), 2015–2027
15. Message exchange based in-network data processing
Figure: InContextIoT system architecture.
Source: R K Verma et al., (2019), In-network context inference in IoT sensory environment for efficient network resource utilization, Journal of Network and Computer
Applications, Volume 130, 2019, Pages 89-103.
16. Message exchange based in-network data processing
Figure: InContextIoT system architecture.
Source: R K Verma et al., (2019), In-network context inference in IoT sensory environment for efficient network resource utilization, Journal of Network and
Computer Applications, Volume 130, 2019, Pages 89-103.
Ex: high temperature, low humidity, high
luminosity, and presence of CO are the
LLCs acquired by annotating and tagging
the raw sensor data
LLCs are processed to infer HLC
Moving the process of the HLCs inference inside the
network and closer to the RoI of queries as against
the current approaches of centralized processing.
17. Edge server and edge devices
Edge compute capacity
(place where workload can be processed)
Edge server: A piece of IT
Equipment for processing IT
workload. It has relatively
higher processing abilities
Edge devices: A piece of IT
Equipment built for some purpose.
Ex: Assembling machine,
robot, car, quality check,
health of critical machine
Components etc.
19. How to manage workloads in these computing spaces?
• Reflection Questions:
How to manage a huge number of workloads in these diverse
compute spaces!
• Containerization
• Management of containers
• Security aspect etc.
Computing spaces
Edge devices’
Computing
space
Edge server
Computing space
Cloud computing
space
150+ billion edge devices by 2025
Computation will moved to edge
20. Enabling network protocols for edge computing
Low power, Low data, Short-range wireless mesh
network wireless standards
Z-Wave
ZigBee
Bluetooth LE
6LoWPAN
Industrial automation uses RS485 communication
protocol/PLC to monitor the device with Modbus
communication
Modbus
ONVIF
Open Network Video Interface Forum defines Interfaces
of physical IP-based security products for communication
21. Enabling network protocols for edge computing (continued)
SoC based self powered applications for the IoT
EnOcean
Open Platform Communications United Architecture is a
data exchange standard for industrial communication. It is
independent of the manufacturer of the application,
programming language, and the execution environment.
BACnet Building Automation and Control Networks used
to manage heating, ventilating, air-conditioning,
refrigerating, lighting, fire control, and alarm
systems.
OPC UA
The Long Range is a low power, networking protocol
designed to interoperate seamlessly between end devices
and the Internet in wireless manner
LoRa
22. Application layer protocols for gateway communication
To allow remote applications to communicate with the gateway
• MQTT: Message Queuing Telemetry Transport based on publish-subscribe
architecture
• AMQP: Advanced Message Queuing Protocol
• CoAP: Constrained Application Protocol, a web transfer protocol for IoT
• REST: Representational State Transfer architectural style for IoT atop
application layer
• WebSockets: A low-latency, full-duplex, persistent protocol that allows
the server to update the client application without an initiating request
from the client.
• JSON-RPC: A RPC protocol for microservices that allows clients to push
data/multiple calls to be sent to the server which need not be answered
in order.
23. What we are working on!
Figure: AgriCPS architecture
Source: Sapna et al., (2020), A dynamic distributed boundary node detection algorithm for management zone delineation in Precision Agriculture,
Journal of Network and Computer Applications, Volume 167
25. What we are working on! (continued)
• Edge server placement schemes to minimize edge device to server
communication cost
• Split learning in edge-cloud collaboration for predictive maintenance
• Optimizing communication cost for interactive IoT sensory environments
• Workload offloading in multi-access edge computing
Contributions of all the PhD scholars of Wireless Sensor Networks laboratory at ABV-
IIITM Gwalior is appreciated and duly acknowledged.
26. Connecting stuff: The IoT reference model
Source: http://cdn.iotwf.com/resources/72/IoT_Reference_Model_04_June_2014.pdf
Source: https://www.altexsoft.com/blog/iot-architecture-layers-components/