SlideShare a Scribd company logo
Cloud Computing and Internet of Things
Dr. Selvaraj Kesavan
Contents
2
➢Cloud computing introduction
➢Cloud computing- Service, deployment models and
characteristics
➢Cloud computing service platforms and Services
➢Internet of things(IoT)- Introduction
➢IoT stack landscape
➢IoT - Sensors, Protocols and Platforms.
➢Overview of various applications/Visualization Tools for IoT
Cloud Computing
➢ Cloud computing is the on-demand delivery of compute power,
database storage, applications, and other IT resources through a
services platform via the internet with pay-as-you-go pricing.
➢ It is the delivery of computing as a service rather than product
where shared resources, software and information are provided to
users as an utility.
➢ Moving from traditional to on-Demand model.
➢ The analogy is , 'If you need milk , would you buy a cow ?’.
3
Cloud Computing- service ,deployment models and
characteristics
Essential
Characteristics
Resource
pooling
Broad network
access
Measured
Service
Rapid
Elasticity
On-demand
Self-service SaaS
Software-as-a-Service
applied to
Applications
e.g. email, productivity, CRM
PaaS
Platform-as-a-Service
applied to
App Infrastructure
e.g. app runtimes, middleware, dev
tools
IaaS
Infrastructure-as-a-Service
applied to
System Infrastructure
e.g. VMs, containers, storage, network
Private Cloud
Public Cloud
Hybrid Cloud
Cloud Computing Service Models
• SaaS (Software as a Service)
- Access the services from provider. consumer uses an application, but does
not control the operating system, hardware or network infrastructure on which
it's running
• PaaS (Platform as a Service)
- The consumer uses a hosting environment for their applications. The
consumer controls the applications that run in the environment but does not
control the operating system, hardware or network infrastructure on which they
are running. Provides the middleware framework
• IaaS (Infrastructure as a Service)
- The consumer uses fundamental computing resources such as
processing power, storage, networking components
5
Major Benefits
6
Speed to Market
Cost Reduction
Elasticity / Scalability
Agility
• Lower capital and operational costs
• Pay-per-use
• Economies of scale
• Reduction of time to pilot and test projects
• New geographies
• Broad geographic availability
• Faster availability to customers
• Capacity only when you need it
• Ability to handle sudden load changes
• Survive infrastructure failures
• Productivity & Speed
• Deploy faster; Iterate faster
• React faster to changing business needs
• “Infinite” computing capacity
Major Services
7
Major cloud
platform
services
Machine Learning
Security and Identity Services
8
Authentication :
- Allow Apps to authenticate on behalf of users
- Allow users
Authorization:
- Fine-grained access control
- Attribute management
- Policy evaluation
- Policy Management
Implementation:
OpenID- Created for federated authentication. User obtain account with OpenID Provider and
use the account into sign in with any other web services. Allows communication between IDP
and SP.
OAuth (Open Authorization) is for token-based authentication and authorization. Allows
users/application to access resources.
SAML: Security Assertion Markup Language. Open standard for authentication and
authorization.
SSO( Single Sign On) for Federation and Identity Management. One user name and password
to access multiple services.
Authentication and authorization Flow
9
Database
10
Requirement:
➢ Relational/Non-Relational
➢ Store large amount of data
➢ Real Time Streaming Data
➢ Scalable ,Reliable and high availability
➢ Multi-tenancy
➢ Cost
Relational (SQL): Structure with defined attributes
➢ MS SQL, POSTGRESQL ,oracle SQL
➢ Can be queried using SQL
No-relational(NO-SQL): Free flow operations
➢ Utilize a variety of data models, including document, graph, key-
value and columnar
➢ Unique way to query the data
➢ Mongo DB(Document) , Redis (Key-value) ,Amazon Redshift
(Columnar) , Cassandra (Columnar), HBase (Columnar) ,Dynamo
DB(Document DB-stores JSON/XML) , GraphDB
Computing
11
Requirement:
➢ Able to deploy application or software
➢ Run and execute
➢ Scale based on conditions
➢ Balance and distribute the load
➢ Fail fallback
• Ramp up or ramp down resource on need basis
• Compute/memory/storage/GPU optimized
• Route the load to difference instances
• Virtual Network Environment
• Examples:
➢ Virtual Machines
➢ Load Balancers
➢ Auto Scaling
➢ Virtual Private Cloud
Machine Learning
12
➢ Machine learning is a method of data analysis
➢ Using algorithms it iteratively learn from data and allows to find insights into this
data
➢ It allows learning from previous computations to produce reliable, repeatable
decisions and results
➢ Machine Learning enables computer system to mimic the working of the human
brain
✓ Data Collection: Collect the historical Data
✓ Data Preparation: Choose and classify the data
✓ Model Training: Selecting the algorithm for model
validation and Training
✓ Model Evaluation: Feed the data and test the accuracy
✓ Performance tune and improvement: Choosing different
model
Data collection and preparation is the key in Machine
Learning
Machine Learning –Models
13
• Training Data with Labels
• Classification ,Regression etc..
• Classifier based on input and
output data
• Used when "I know how to
classify this data, I just need
you(the classifier) to sort it."
Supervised Learning
Machine Learning
Un supervised Learning Reinforcement Learning
• Training Data without Labels
• Clustering ,Dimension
reduction etc..
• Algorithm based on input data
• Used when "I have no idea how
to classify this data, can
you(the algorithm) create a
classifier for me?"
• Iterative Rewards and
punishments
• Correct input and output pairs
are not presented a-priori.
• allows machines and software
agents to automatically
determine the ideal behavior
within a specific context.
• Training an animal.
Machine Learning – algorithm and use case
14
Algorithms:
✓ Linear Regression
✓ Logical Regression
✓ K-Means
✓ Random Forest
Use cases:
✓ Forecasting ,Decision Making, Classification, Detecting Anomalies etc..
✓ ML from user preferences to push ads to the respective users
✓ Banking & Financials:- Identify loan & credit card defaulters and
customers who can be granted loans and credit cards
✓ Healthcare: Diagnose deadly diseases (e.g. cancer) based on the
symptoms of patients and tallying them with the past data of similar kind
of patients
Programming and Framework:
✓ Python
✓ R Programming (Statistical computing )
✓ Matlab
✓ Java
✓ Tensor flow
✓ Amazon Machine Learning
✓ Spark Mlib
✓ H2O
✓ Azure ML studio
Services Platform – Cloud ,IoT and IIoT
15
• Amazon Web Services
• Microsoft Azure
• Google Cloud platform
• IBM Bluemix
• Oracle Cloud
• GE Predix
• ThingWorx
Platform Services- Example
16
AWS RDS
AWS Aurora
AWS DynamoDB
Azure SQL
Google Cloud SQL
Azure Table Storage
Azure Cosmos DB
Google Bigtable
Google Cloud Datastore
Relational DB
Non-relational DB
as-a-Service
Data Streaming
as-a-Service
AWS Kinesis
Azure Event Hubs
Google Cloud Pub/Sub
Machine Learning
as-a-Service
AWS Lex
AWS Poly
AWS Rekognition
Azure Computer Vision API
Face API
Custom Vision Service
Google Cloud Natural Language API
Cloud Vision API
Cloud Translation API
Programming/Connecting to cloud Services
17
Programming Toolkits:
• Portal
• CLI
• Power Shell
• REST API’s
Application to Cloud Services:
• SDK’s
• REST API’s
Device/Gateway to Cloud Services:
• Device SDK
• REST API’s
Internet of Things (IoT) and Industrial Internet of Things (IIoT)
18
People
Things
IIOT
IOT
What is IOT
➢ Internet is no longer just a global network for people to communicate
with one another using computers, but it is also a platform for devices
to communicate electronically with the world around them.
➢ Sensors/Things connected to server via network and deliver
connected industry solutions for efficient control and improved human
experience.
➢ Billions of connected devices is an indicator of IoT. The connectivity is
just an enabler but the real value of IoT is on data (business
insight/data-driven economy).
19
Technology Landscape
20
Industry verticals -
Dashboard
Platform and
services
Protocols and
Communication
Sensors ,Devices and
Gateway
Application
End Device
Light
Sensor
Voltage
Sensor
Temp/
humidity
Vibration
Sensor
Ultrasonic
Sensor
Gas
Sensor
BLE
Sensor
GPS
Pi 3
gateway
Gateway
PLC
Field Devices, Sensors and Gateway
21
Monitor
Sensor Data
Aggregate
Analyze
Send to Cloud
Gateway Provides
➢ Authentication
➢ Data Filtering
➢ Edge Analytics
➢ Control and management
Communication between
sensors and Gateway ,
Gateway to cloud platform using
➢ Zigbee
➢ BLE
➢ Wi-Fi
➢ RF
➢ LoRa
➢ MQTT
➢ AMQP
➢ CoAP
➢ HTTP/HTTPS
➢ NFC,TCP/UDP
➢ UART,SPI
Different field sensors/Devices
✓ Sensors: Temperature, pressure, accelerometer ,vibration
,RPM, Beacons etc..
✓ Devices: Camera, activity tracker, smart glass etc..
IoT As a Service from Cloud platform
22
Major Functionalities:
➢Device Registration
➢Device Authentication and
Authorization
➢Device to cloud message
➢Cloud to Device message
➢Device state
➢Rules Engine
➢Communication with other Services
➢Communication with Edge devices
How to Visualize Raw/Processed/Analytics/Machine learning output?
Applications/Visualization Tools
23
Web Applications:
• Application that is accessed via a web browser over a
network
• JavaScript, CSS, and HTML5
• Web apps became really popular when HTML5 came
around and people realized that they can obtain native-
like functionality in the browser.
Native Applications:
• Native apps are written in languages that the platform
accepts
• Swift or Objective-C for iOS
• Java for Android
• C# for Windows Mobile
Hybrid Application:
• Combination of Native with Web Component
• Xamarin -Slack, Pinterest.
• React Native -Facebook, Walmart, Tesla, and Airbnb
• Titanium -eBay, ZipCar, PayPal
• Angular JS -PubNub Chat, YouTube on PS3
Thank You
24

More Related Content

What's hot

Cloud deployment models
Cloud deployment modelsCloud deployment models
Cloud deployment models
Ashok Kumar
 
Data security in cloud computing
Data security in cloud computingData security in cloud computing
Data security in cloud computingPrince Chandu
 
Migration into a Cloud
Migration into a CloudMigration into a Cloud
Migration into a Cloud
Divya S
 
Introduction to Parallel and Distributed Computing
Introduction to Parallel and Distributed ComputingIntroduction to Parallel and Distributed Computing
Introduction to Parallel and Distributed Computing
Sayed Chhattan Shah
 
Information security
Information security Information security
Information security
razendar79
 
Parallel computing and its applications
Parallel computing and its applicationsParallel computing and its applications
Parallel computing and its applications
Burhan Ahmed
 
Distributed Computing
Distributed ComputingDistributed Computing
Distributed Computing
Sudarsun Santhiappan
 
Cloud Computing
Cloud ComputingCloud Computing
Distributed Systems
Distributed SystemsDistributed Systems
Distributed SystemsRupsee
 
Architecture of Mobile Computing
Architecture of Mobile ComputingArchitecture of Mobile Computing
Architecture of Mobile Computing
JAINIK PATEL
 
Peer to peer system
Peer to peer systemPeer to peer system
Peer to peer system
Jahanzaib Niazi
 
Service level agreement in cloud computing an overview
Service level agreement in cloud computing  an overviewService level agreement in cloud computing  an overview
Service level agreement in cloud computing an overview
Dr Neelesh Jain
 
cluster computing
cluster computingcluster computing
cluster computing
anjalibhandari11011995
 
Cloud computing stack
Cloud computing stackCloud computing stack
Cloud computing stack
Pedro Alexander Romero Tortosa
 
Grid computing
Grid computingGrid computing
Grid computing
Dikshita_Viradia
 
Virtualization security threats in cloud computing
Virtualization security threats in cloud computingVirtualization security threats in cloud computing
Virtualization security threats in cloud computing
Nitish Awasthi (anitish_225)
 
Google App Engine ppt
Google App Engine  pptGoogle App Engine  ppt
Infrastructure as a Service ( IaaS)
Infrastructure as a Service ( IaaS)Infrastructure as a Service ( IaaS)
Infrastructure as a Service ( IaaS)
Ravindra Dastikop
 
Open Cloud Consortium Overview (01-10-10 V6)
Open Cloud Consortium Overview (01-10-10 V6)Open Cloud Consortium Overview (01-10-10 V6)
Open Cloud Consortium Overview (01-10-10 V6)
Robert Grossman
 
Levels of Virtualization.docx
Levels of Virtualization.docxLevels of Virtualization.docx
Levels of Virtualization.docx
kumari36
 

What's hot (20)

Cloud deployment models
Cloud deployment modelsCloud deployment models
Cloud deployment models
 
Data security in cloud computing
Data security in cloud computingData security in cloud computing
Data security in cloud computing
 
Migration into a Cloud
Migration into a CloudMigration into a Cloud
Migration into a Cloud
 
Introduction to Parallel and Distributed Computing
Introduction to Parallel and Distributed ComputingIntroduction to Parallel and Distributed Computing
Introduction to Parallel and Distributed Computing
 
Information security
Information security Information security
Information security
 
Parallel computing and its applications
Parallel computing and its applicationsParallel computing and its applications
Parallel computing and its applications
 
Distributed Computing
Distributed ComputingDistributed Computing
Distributed Computing
 
Cloud Computing
Cloud ComputingCloud Computing
Cloud Computing
 
Distributed Systems
Distributed SystemsDistributed Systems
Distributed Systems
 
Architecture of Mobile Computing
Architecture of Mobile ComputingArchitecture of Mobile Computing
Architecture of Mobile Computing
 
Peer to peer system
Peer to peer systemPeer to peer system
Peer to peer system
 
Service level agreement in cloud computing an overview
Service level agreement in cloud computing  an overviewService level agreement in cloud computing  an overview
Service level agreement in cloud computing an overview
 
cluster computing
cluster computingcluster computing
cluster computing
 
Cloud computing stack
Cloud computing stackCloud computing stack
Cloud computing stack
 
Grid computing
Grid computingGrid computing
Grid computing
 
Virtualization security threats in cloud computing
Virtualization security threats in cloud computingVirtualization security threats in cloud computing
Virtualization security threats in cloud computing
 
Google App Engine ppt
Google App Engine  pptGoogle App Engine  ppt
Google App Engine ppt
 
Infrastructure as a Service ( IaaS)
Infrastructure as a Service ( IaaS)Infrastructure as a Service ( IaaS)
Infrastructure as a Service ( IaaS)
 
Open Cloud Consortium Overview (01-10-10 V6)
Open Cloud Consortium Overview (01-10-10 V6)Open Cloud Consortium Overview (01-10-10 V6)
Open Cloud Consortium Overview (01-10-10 V6)
 
Levels of Virtualization.docx
Levels of Virtualization.docxLevels of Virtualization.docx
Levels of Virtualization.docx
 

Similar to Emergence of cloud computing and internet of things an overview

Analytics&IoT
Analytics&IoTAnalytics&IoT
Analytics&IoT
Selvaraj Kesavan
 
A Complete Guide Cloud Computing
A Complete Guide Cloud ComputingA Complete Guide Cloud Computing
A Complete Guide Cloud Computing
Sripati Mahapatra
 
Salesforce - classification of cloud computing
Salesforce - classification of cloud computingSalesforce - classification of cloud computing
Salesforce - classification of cloud computing
Vibrant Technologies & Computers
 
Cloud Computing E-Lect.ppt
Cloud Computing E-Lect.pptCloud Computing E-Lect.ppt
Cloud Computing E-Lect.ppt
arunimaarunima1
 
Introduction to Cloud Computing
Introduction to Cloud ComputingIntroduction to Cloud Computing
Introduction to Cloud Computing
Bharat Kalia
 
lect15_cloud.ppt
lect15_cloud.pptlect15_cloud.ppt
lect15_cloud.ppt
Ajit Mali
 
cloudintroduction.ppt
cloudintroduction.pptcloudintroduction.ppt
cloudintroduction.ppt
AhmedRebai8
 
Azure Overview Csco
Azure Overview CscoAzure Overview Csco
Azure Overview Cscorajramab
 
Cloud introduction
Cloud introductionCloud introduction
Cloud introduction
Dr.Neeraj Kumar Pandey
 
Building a Real-Time Security Application Using Log Data and Machine Learning...
Building a Real-Time Security Application Using Log Data and Machine Learning...Building a Real-Time Security Application Using Log Data and Machine Learning...
Building a Real-Time Security Application Using Log Data and Machine Learning...
Sri Ambati
 
Cloud computing-2 (1)
Cloud computing-2 (1)Cloud computing-2 (1)
Cloud computing-2 (1)
JUDYFLAVIAB
 
Introduction to Google Cloud & GCCP Campaign
Introduction to Google Cloud & GCCP CampaignIntroduction to Google Cloud & GCCP Campaign
Introduction to Google Cloud & GCCP Campaign
GDSCVJTI
 
Role of cloud and analytics in IoT
Role of cloud and analytics in IoTRole of cloud and analytics in IoT
Role of cloud and analytics in IoT
Selvaraj Kesavan
 
lect15_cloud.ppt
lect15_cloud.pptlect15_cloud.ppt
lect15_cloud.ppt
PeerlessSecuritiesLi
 
CLOUD
CLOUDCLOUD
Lect15 cloud
Lect15 cloudLect15 cloud
Lect15 cloud
Paul Huertas Apaza
 
Cloud
CloudCloud
Cloud
shan miao
 
Cloud computing ppt
Cloud computing pptCloud computing ppt
Cloud computing pptA
 
Lect15 cloud
Lect15 cloudLect15 cloud
Lect15 cloud
Ryan Jay Cabe
 
Introduction to cloud computing
Introduction to cloud computingIntroduction to cloud computing
Introduction to cloud computing
Revathi Ram
 

Similar to Emergence of cloud computing and internet of things an overview (20)

Analytics&IoT
Analytics&IoTAnalytics&IoT
Analytics&IoT
 
A Complete Guide Cloud Computing
A Complete Guide Cloud ComputingA Complete Guide Cloud Computing
A Complete Guide Cloud Computing
 
Salesforce - classification of cloud computing
Salesforce - classification of cloud computingSalesforce - classification of cloud computing
Salesforce - classification of cloud computing
 
Cloud Computing E-Lect.ppt
Cloud Computing E-Lect.pptCloud Computing E-Lect.ppt
Cloud Computing E-Lect.ppt
 
Introduction to Cloud Computing
Introduction to Cloud ComputingIntroduction to Cloud Computing
Introduction to Cloud Computing
 
lect15_cloud.ppt
lect15_cloud.pptlect15_cloud.ppt
lect15_cloud.ppt
 
cloudintroduction.ppt
cloudintroduction.pptcloudintroduction.ppt
cloudintroduction.ppt
 
Azure Overview Csco
Azure Overview CscoAzure Overview Csco
Azure Overview Csco
 
Cloud introduction
Cloud introductionCloud introduction
Cloud introduction
 
Building a Real-Time Security Application Using Log Data and Machine Learning...
Building a Real-Time Security Application Using Log Data and Machine Learning...Building a Real-Time Security Application Using Log Data and Machine Learning...
Building a Real-Time Security Application Using Log Data and Machine Learning...
 
Cloud computing-2 (1)
Cloud computing-2 (1)Cloud computing-2 (1)
Cloud computing-2 (1)
 
Introduction to Google Cloud & GCCP Campaign
Introduction to Google Cloud & GCCP CampaignIntroduction to Google Cloud & GCCP Campaign
Introduction to Google Cloud & GCCP Campaign
 
Role of cloud and analytics in IoT
Role of cloud and analytics in IoTRole of cloud and analytics in IoT
Role of cloud and analytics in IoT
 
lect15_cloud.ppt
lect15_cloud.pptlect15_cloud.ppt
lect15_cloud.ppt
 
CLOUD
CLOUDCLOUD
CLOUD
 
Lect15 cloud
Lect15 cloudLect15 cloud
Lect15 cloud
 
Cloud
CloudCloud
Cloud
 
Cloud computing ppt
Cloud computing pptCloud computing ppt
Cloud computing ppt
 
Lect15 cloud
Lect15 cloudLect15 cloud
Lect15 cloud
 
Introduction to cloud computing
Introduction to cloud computingIntroduction to cloud computing
Introduction to cloud computing
 

More from Selvaraj Kesavan

Cloud computing aws -key services
Cloud computing  aws -key servicesCloud computing  aws -key services
Cloud computing aws -key services
Selvaraj Kesavan
 
Cloud Computing Virtualization and containers
Cloud Computing Virtualization and containersCloud Computing Virtualization and containers
Cloud Computing Virtualization and containers
Selvaraj Kesavan
 
Cloud computing
Cloud computingCloud computing
Cloud computing
Selvaraj Kesavan
 
Internet of things
Internet of thingsInternet of things
Internet of things
Selvaraj Kesavan
 
Gstreamer internals
Gstreamer internalsGstreamer internals
Gstreamer internals
Selvaraj Kesavan
 
Multimedia streaming
Multimedia streamingMultimedia streaming
Multimedia streaming
Selvaraj Kesavan
 

More from Selvaraj Kesavan (6)

Cloud computing aws -key services
Cloud computing  aws -key servicesCloud computing  aws -key services
Cloud computing aws -key services
 
Cloud Computing Virtualization and containers
Cloud Computing Virtualization and containersCloud Computing Virtualization and containers
Cloud Computing Virtualization and containers
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Internet of things
Internet of thingsInternet of things
Internet of things
 
Gstreamer internals
Gstreamer internalsGstreamer internals
Gstreamer internals
 
Multimedia streaming
Multimedia streamingMultimedia streaming
Multimedia streaming
 

Recently uploaded

From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
Product School
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
Thijs Feryn
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
91mobiles
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Ramesh Iyer
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Tobias Schneck
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
OnBoard
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
Dorra BARTAGUIZ
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
RTTS
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
Product School
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
ThousandEyes
 

Recently uploaded (20)

From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
 

Emergence of cloud computing and internet of things an overview

  • 1. Cloud Computing and Internet of Things Dr. Selvaraj Kesavan
  • 2. Contents 2 ➢Cloud computing introduction ➢Cloud computing- Service, deployment models and characteristics ➢Cloud computing service platforms and Services ➢Internet of things(IoT)- Introduction ➢IoT stack landscape ➢IoT - Sensors, Protocols and Platforms. ➢Overview of various applications/Visualization Tools for IoT
  • 3. Cloud Computing ➢ Cloud computing is the on-demand delivery of compute power, database storage, applications, and other IT resources through a services platform via the internet with pay-as-you-go pricing. ➢ It is the delivery of computing as a service rather than product where shared resources, software and information are provided to users as an utility. ➢ Moving from traditional to on-Demand model. ➢ The analogy is , 'If you need milk , would you buy a cow ?’. 3
  • 4. Cloud Computing- service ,deployment models and characteristics Essential Characteristics Resource pooling Broad network access Measured Service Rapid Elasticity On-demand Self-service SaaS Software-as-a-Service applied to Applications e.g. email, productivity, CRM PaaS Platform-as-a-Service applied to App Infrastructure e.g. app runtimes, middleware, dev tools IaaS Infrastructure-as-a-Service applied to System Infrastructure e.g. VMs, containers, storage, network Private Cloud Public Cloud Hybrid Cloud
  • 5. Cloud Computing Service Models • SaaS (Software as a Service) - Access the services from provider. consumer uses an application, but does not control the operating system, hardware or network infrastructure on which it's running • PaaS (Platform as a Service) - The consumer uses a hosting environment for their applications. The consumer controls the applications that run in the environment but does not control the operating system, hardware or network infrastructure on which they are running. Provides the middleware framework • IaaS (Infrastructure as a Service) - The consumer uses fundamental computing resources such as processing power, storage, networking components 5
  • 6. Major Benefits 6 Speed to Market Cost Reduction Elasticity / Scalability Agility • Lower capital and operational costs • Pay-per-use • Economies of scale • Reduction of time to pilot and test projects • New geographies • Broad geographic availability • Faster availability to customers • Capacity only when you need it • Ability to handle sudden load changes • Survive infrastructure failures • Productivity & Speed • Deploy faster; Iterate faster • React faster to changing business needs • “Infinite” computing capacity
  • 8. Security and Identity Services 8 Authentication : - Allow Apps to authenticate on behalf of users - Allow users Authorization: - Fine-grained access control - Attribute management - Policy evaluation - Policy Management Implementation: OpenID- Created for federated authentication. User obtain account with OpenID Provider and use the account into sign in with any other web services. Allows communication between IDP and SP. OAuth (Open Authorization) is for token-based authentication and authorization. Allows users/application to access resources. SAML: Security Assertion Markup Language. Open standard for authentication and authorization. SSO( Single Sign On) for Federation and Identity Management. One user name and password to access multiple services.
  • 10. Database 10 Requirement: ➢ Relational/Non-Relational ➢ Store large amount of data ➢ Real Time Streaming Data ➢ Scalable ,Reliable and high availability ➢ Multi-tenancy ➢ Cost Relational (SQL): Structure with defined attributes ➢ MS SQL, POSTGRESQL ,oracle SQL ➢ Can be queried using SQL No-relational(NO-SQL): Free flow operations ➢ Utilize a variety of data models, including document, graph, key- value and columnar ➢ Unique way to query the data ➢ Mongo DB(Document) , Redis (Key-value) ,Amazon Redshift (Columnar) , Cassandra (Columnar), HBase (Columnar) ,Dynamo DB(Document DB-stores JSON/XML) , GraphDB
  • 11. Computing 11 Requirement: ➢ Able to deploy application or software ➢ Run and execute ➢ Scale based on conditions ➢ Balance and distribute the load ➢ Fail fallback • Ramp up or ramp down resource on need basis • Compute/memory/storage/GPU optimized • Route the load to difference instances • Virtual Network Environment • Examples: ➢ Virtual Machines ➢ Load Balancers ➢ Auto Scaling ➢ Virtual Private Cloud
  • 12. Machine Learning 12 ➢ Machine learning is a method of data analysis ➢ Using algorithms it iteratively learn from data and allows to find insights into this data ➢ It allows learning from previous computations to produce reliable, repeatable decisions and results ➢ Machine Learning enables computer system to mimic the working of the human brain ✓ Data Collection: Collect the historical Data ✓ Data Preparation: Choose and classify the data ✓ Model Training: Selecting the algorithm for model validation and Training ✓ Model Evaluation: Feed the data and test the accuracy ✓ Performance tune and improvement: Choosing different model Data collection and preparation is the key in Machine Learning
  • 13. Machine Learning –Models 13 • Training Data with Labels • Classification ,Regression etc.. • Classifier based on input and output data • Used when "I know how to classify this data, I just need you(the classifier) to sort it." Supervised Learning Machine Learning Un supervised Learning Reinforcement Learning • Training Data without Labels • Clustering ,Dimension reduction etc.. • Algorithm based on input data • Used when "I have no idea how to classify this data, can you(the algorithm) create a classifier for me?" • Iterative Rewards and punishments • Correct input and output pairs are not presented a-priori. • allows machines and software agents to automatically determine the ideal behavior within a specific context. • Training an animal.
  • 14. Machine Learning – algorithm and use case 14 Algorithms: ✓ Linear Regression ✓ Logical Regression ✓ K-Means ✓ Random Forest Use cases: ✓ Forecasting ,Decision Making, Classification, Detecting Anomalies etc.. ✓ ML from user preferences to push ads to the respective users ✓ Banking & Financials:- Identify loan & credit card defaulters and customers who can be granted loans and credit cards ✓ Healthcare: Diagnose deadly diseases (e.g. cancer) based on the symptoms of patients and tallying them with the past data of similar kind of patients Programming and Framework: ✓ Python ✓ R Programming (Statistical computing ) ✓ Matlab ✓ Java ✓ Tensor flow ✓ Amazon Machine Learning ✓ Spark Mlib ✓ H2O ✓ Azure ML studio
  • 15. Services Platform – Cloud ,IoT and IIoT 15 • Amazon Web Services • Microsoft Azure • Google Cloud platform • IBM Bluemix • Oracle Cloud • GE Predix • ThingWorx
  • 16. Platform Services- Example 16 AWS RDS AWS Aurora AWS DynamoDB Azure SQL Google Cloud SQL Azure Table Storage Azure Cosmos DB Google Bigtable Google Cloud Datastore Relational DB Non-relational DB as-a-Service Data Streaming as-a-Service AWS Kinesis Azure Event Hubs Google Cloud Pub/Sub Machine Learning as-a-Service AWS Lex AWS Poly AWS Rekognition Azure Computer Vision API Face API Custom Vision Service Google Cloud Natural Language API Cloud Vision API Cloud Translation API
  • 17. Programming/Connecting to cloud Services 17 Programming Toolkits: • Portal • CLI • Power Shell • REST API’s Application to Cloud Services: • SDK’s • REST API’s Device/Gateway to Cloud Services: • Device SDK • REST API’s
  • 18. Internet of Things (IoT) and Industrial Internet of Things (IIoT) 18 People Things IIOT IOT
  • 19. What is IOT ➢ Internet is no longer just a global network for people to communicate with one another using computers, but it is also a platform for devices to communicate electronically with the world around them. ➢ Sensors/Things connected to server via network and deliver connected industry solutions for efficient control and improved human experience. ➢ Billions of connected devices is an indicator of IoT. The connectivity is just an enabler but the real value of IoT is on data (business insight/data-driven economy). 19
  • 20. Technology Landscape 20 Industry verticals - Dashboard Platform and services Protocols and Communication Sensors ,Devices and Gateway Application End Device Light Sensor Voltage Sensor Temp/ humidity Vibration Sensor Ultrasonic Sensor Gas Sensor BLE Sensor GPS Pi 3 gateway Gateway PLC
  • 21. Field Devices, Sensors and Gateway 21 Monitor Sensor Data Aggregate Analyze Send to Cloud Gateway Provides ➢ Authentication ➢ Data Filtering ➢ Edge Analytics ➢ Control and management Communication between sensors and Gateway , Gateway to cloud platform using ➢ Zigbee ➢ BLE ➢ Wi-Fi ➢ RF ➢ LoRa ➢ MQTT ➢ AMQP ➢ CoAP ➢ HTTP/HTTPS ➢ NFC,TCP/UDP ➢ UART,SPI Different field sensors/Devices ✓ Sensors: Temperature, pressure, accelerometer ,vibration ,RPM, Beacons etc.. ✓ Devices: Camera, activity tracker, smart glass etc..
  • 22. IoT As a Service from Cloud platform 22 Major Functionalities: ➢Device Registration ➢Device Authentication and Authorization ➢Device to cloud message ➢Cloud to Device message ➢Device state ➢Rules Engine ➢Communication with other Services ➢Communication with Edge devices
  • 23. How to Visualize Raw/Processed/Analytics/Machine learning output? Applications/Visualization Tools 23 Web Applications: • Application that is accessed via a web browser over a network • JavaScript, CSS, and HTML5 • Web apps became really popular when HTML5 came around and people realized that they can obtain native- like functionality in the browser. Native Applications: • Native apps are written in languages that the platform accepts • Swift or Objective-C for iOS • Java for Android • C# for Windows Mobile Hybrid Application: • Combination of Native with Web Component • Xamarin -Slack, Pinterest. • React Native -Facebook, Walmart, Tesla, and Airbnb • Titanium -eBay, ZipCar, PayPal • Angular JS -PubNub Chat, YouTube on PS3