The TCP/IP protocol suite does not define any protocol in the data-link layer or
physical layer. These two layers are territories of networks that when connected
make up the Internet. These networks, wired or wireless, provide services to the upper
three layers of the TCP/IP suite. This may give us a clue that there are several standard
protocols in the market today. For this reason, we discuss the data-link layer in several
chapters. This chapter is an introduction that gives the general idea and common issues
in the data-link layer that relate to all networks.
❑ The first section introduces the data-link layer. It starts with defining the concept
of links and nodes. The section then lists and briefly describes the services provided
by the data-link layer. It next defines two categories of links: point-to-point
and broadcast links. The section finally defines two sublayers at the data-link layer
that will be elaborated on in the next few chapters.
❑ The second section discusses link-layer addressing. It first explains the rationale
behind the existence of an addressing mechanism at the data-link layer. It then
describes three types of link-layer addresses to be found in some link-layer protocols.
The section discusses the Address Resolution Protocol (ARP), which maps
the addresses at the network layer to addresses at the data-link layer. This protocol
helps a packet at the network layer find the link-layer address of the next node for
delivery of the frame that encapsulates the packet. To show how the network layer
helps us to find the data-link-layer addresses, a long example is included in this
section that shows what happens at each node when a packet is travelling through
the Internet.
Artificial Intelligence: Introduction, Typical Applications. State Space Search: Depth Bounded
DFS, Depth First Iterative Deepening. Heuristic Search: Heuristic Functions, Best First Search,
Hill Climbing, Variable Neighborhood Descent, Beam Search, Tabu Search. Optimal Search: A
*
algorithm, Iterative Deepening A*
, Recursive Best First Search, Pruning the CLOSED and OPEN
Lists
Problem solving
Problem formulation
Search Techniques for Artificial Intelligence
Classification of AI searching Strategies
What is Search strategy ?
Defining a Search Problem
State Space Graph versus Search Trees
Graph vs. Tree
Problem Solving by Search
The encryption mechanism is a digital coding system dedicated to preserving the confidentiality and integrity of data. It is used for encoding plain text data into a protected and unreadable format.
SDN( Software Defined Network) and NFV(Network Function Virtualization) for I...Sagar Rai
Software, Software Defined Network, Network Function Virtualization, SDN, NFV, Internet of things, Basics of Internet of things, Network Basics, Virtualization, Limitation of Conventional Network, Open flow, Basics of conventional network,
The TCP/IP protocol suite does not define any protocol in the data-link layer or
physical layer. These two layers are territories of networks that when connected
make up the Internet. These networks, wired or wireless, provide services to the upper
three layers of the TCP/IP suite. This may give us a clue that there are several standard
protocols in the market today. For this reason, we discuss the data-link layer in several
chapters. This chapter is an introduction that gives the general idea and common issues
in the data-link layer that relate to all networks.
❑ The first section introduces the data-link layer. It starts with defining the concept
of links and nodes. The section then lists and briefly describes the services provided
by the data-link layer. It next defines two categories of links: point-to-point
and broadcast links. The section finally defines two sublayers at the data-link layer
that will be elaborated on in the next few chapters.
❑ The second section discusses link-layer addressing. It first explains the rationale
behind the existence of an addressing mechanism at the data-link layer. It then
describes three types of link-layer addresses to be found in some link-layer protocols.
The section discusses the Address Resolution Protocol (ARP), which maps
the addresses at the network layer to addresses at the data-link layer. This protocol
helps a packet at the network layer find the link-layer address of the next node for
delivery of the frame that encapsulates the packet. To show how the network layer
helps us to find the data-link-layer addresses, a long example is included in this
section that shows what happens at each node when a packet is travelling through
the Internet.
Artificial Intelligence: Introduction, Typical Applications. State Space Search: Depth Bounded
DFS, Depth First Iterative Deepening. Heuristic Search: Heuristic Functions, Best First Search,
Hill Climbing, Variable Neighborhood Descent, Beam Search, Tabu Search. Optimal Search: A
*
algorithm, Iterative Deepening A*
, Recursive Best First Search, Pruning the CLOSED and OPEN
Lists
Problem solving
Problem formulation
Search Techniques for Artificial Intelligence
Classification of AI searching Strategies
What is Search strategy ?
Defining a Search Problem
State Space Graph versus Search Trees
Graph vs. Tree
Problem Solving by Search
The encryption mechanism is a digital coding system dedicated to preserving the confidentiality and integrity of data. It is used for encoding plain text data into a protected and unreadable format.
SDN( Software Defined Network) and NFV(Network Function Virtualization) for I...Sagar Rai
Software, Software Defined Network, Network Function Virtualization, SDN, NFV, Internet of things, Basics of Internet of things, Network Basics, Virtualization, Limitation of Conventional Network, Open flow, Basics of conventional network,
Fog Computing – between IoT Devices and The Cloud presentation covers following topics:
- Edge, Fog, Mist & Cloud Computing
- Fog domains and fog federation, wireless sensor networks, - multi-layer IoT architecture
- Fog computing standards and specifications
- Practical use-case scenarios & advantages of fog
- Fog analytics and intelligence on the edge
- Technologies for distributed asynchronous event processing - and analytics in real time
- Lambda architecture – Spark, Storm, Kafka, Apex, Beam, Spring - Reactor & WebFlux
- Eclipse IoT platform
Internet of things (IoT) has started growing due to the developments in RFID, sensors, communication technologies and Internet protocols. The basic aim is to connect sensors in a straight line devoid of human association in the vicinity of help in creation of new types applications. The revolution in mobile, Internet in addition to machine-to-machine (M2M) technologies preserve is seen when the primary step towards IoT. Internet of Things (IoT) is forwarding the association among the objects (the “things”) and the backend systems passing through the Internet. Every object can become connected and smart. As a result, the background is monitored via sensing the background furthermore the data are transferred toward cloud with internet connectivity of the things. The monitoring environment comes closer in spite of distance. There are several platforms that provide services such as data analytics, business analytics, notification, etc. Each platform provides a specific service In this expose, we examine a delegate section of these platforms, together open- source and proprietary, on the source of their capability to convene the potential of dissimilar IoT users. The evaluation focuses on how prepared and functional these platforms are for IoT ecology players, other than on the peculiarities of the essential scientific layers. This paper mainly aims to provide a summary of different platforms and stages for IOT. This paper would help the IoT users to decide their best platform to suit their application.
Mark Goldstein, President of International Research Center gave the opening keynote address “Internet of Things – Transformative Megatrends for Sustainability” to the IEEE Conference on Technologies for Sustainability (IEEE SusTech, http://sites.ieee.org/sustech/) on October 10, 2016 in Phoenix, AZ. He explored the next Internet wave, the Internet of Things (IoT), expected to connect tens of billions of new sensors and devices in the coming years driving sustainability while transforming home, business, government, industrial, medical, transportation, and other complex ecosystems. This deck examines how IoT will be implemented and monetized creating new business models from pervasive sensor deployments and data gathering, accompanied by new privacy and security risks. Explore IoT’s roadblocks and operational challenges, emerging standards and protocols, gateway and wireless integration, and big data strategies and opportunities.
RT-RCT: an online tool for real-time retrieval of connected thingsjournalBEEI
In recent years, internet of things (IoT) represents a giant and a promoter area in innovation and engineering fields. IoT devices are spread in various fields and offer advanced services which assist their users to monitor and control objects remotely. IoT has a set of special characteristics such as dynamic, variety of data and huge scale which introduces a great challenge in the field of retrieval technologies, more precisely real-time retrieval. This paper addresses the issue of real-time retrieval of connected things and tries to propose an innovative solution which allows the retrieval of these things and their descriptive data. The paper proposes an on-line tool for real-time retrieval of connected things and their descriptive data based on network port scanning technique. The performance of this tool proves to be powerful under normal conditions, however more tests must be implemented in the aim to improve the proposed solution. The tool resulted from this work appears to be promising and can be used as a reference by network administrators and IT security managers for the development of new security mechanisms and security reinforcement.
IEEE Computer Society Phoenix Chapter - Internet of Things Innovations & Mega...Mark Goldstein
Mark Goldstein, President of International Research Center delivered his annual technology deep dive, this year into the Internet of Things Innovations & Megatrends to the IEEE Computer Society Phoenix Chapter (http://ewh.ieee.org/r6/phoenix/compsociety/) exploring the emergent Internet wave, the Internet of Things (IoT), on track to connect tens of billions of new sensors and devices in the coming years. Waves of change are rolling through home, business, government, industrial, medical, transportation, and other complex ecosystems. He examined how IoT will be implemented and monetized creating new business models from pervasive sensor deployments and data gathering as myriad wireless technologies will connect smart spaces at home, at work, and in public space including autonomous transportation accompanied by new privacy and security risks. View to explore IoT’s roadblocks and operational challenges, emerging standards and protocols, gateway and wireless integration, and big data strategies and opportunities bringing you the insight and strategies to leverage emerging IoT opportunities.
Presentation made for the event "Digital transformation in France and Germany: Consequences for industry, society & higher education" organized by the French-German University in cooperation with Institut Mines-Télécom https://www.dfh-ufa.org/fr/digital-transformation-in-france-and-germany/
SECURITY AND PRIVACY AWARE PROGRAMMING MODEL FOR IOT APPLICATIONS IN CLOUD EN...ijccsa
The introduction of Internet of Things (IoT) applications into daily life has raised serious privacy concerns
among consumers, network service providers, device manufacturers, and other parties involved. This paper
gives a high-level overview of the three phases of data collecting, transmission, and storage in IoT systems
as well as current privacy-preserving technologies. The following elements were investigated during these
three phases:(1) Physical and data connection layer security mechanisms(2) Network remedies(3)
Techniques for distributing and storing data. Real-world systems frequently have multiple phases and
incorporate a variety of methods to guarantee privacy. Therefore, for IoT research, design, development,
and operation, having a thorough understanding of all phases and their technologies can be beneficial. In
this Study introduced two independent methodologies namely generic differential privacy (GenDP) and
Cluster-Based Differential privacy ( Cluster-based DP) algorithms for handling metadata as intents and
intent scope to maintain privacy and security of IoT data in cloud environments. With its help, we can
virtual and connect enormous numbers of devices, get a clearer understanding of the IoT architecture, and
store data eternally. However, due of the dynamic nature of the environment, the diversity of devices, the
ad hoc requirements of multiple stakeholders, and hardware or network failures, it is a very challenging
task to create security-, privacy-, safety-, and quality-aware Internet of Things apps. It is becoming more
and more important to improve data privacy and security through appropriate data acquisition. The
proposed approach resulted in reduced loss performance as compared to Support Vector Machine (SVM) ,
Random Forest (RF) .
What -IoT
Why - IoT
Why - IoT
IoT is enabling Technology to ML, DL, AI and Data Science
Applications
IoT Product Development – Entrepreneurs
Research Gap
Online Tools
Linux commands working with file contents:
head, tail, cat, tac, more, less and strings, more file
attributes: hard links, symbolic links, fins, umask
and inodes The Linux file tree: the root directory, binary
directories, configuration directories, data
directories, Commands and arguments: $PATH,
echo, ls, env
Discussed on
Introduction to Linux: Linux history,
distributions, licensing, Linux commands: man
pages, commands working with directories,
absolute and relative paths
commands working with files: file, touch, rm, cp,
mv and rename, general purpose utilities: cal,
date, script, who, tty, pwd, ps, uname
Discussed about
An overview – Object basics – Object state and properties – Behavior – Methods – Messages –
Information hiding – Class hierarchy – Relationships – Associations – Aggregations- Identity –
Dynamic binding – Persistence – Metaclasses – Object oriented system development life cycle.
Discussed about:
A Short History of Business Models
The Business Model Canvas
Who is the Business Model for
Models
Funding an IoT Start-up
Lean Start-ups
Discussed about the following topics: A Web Security Forensic Lesson
Web Languages
Introduction to different web attacks
overview of n-tier web applications
Web servers
Apache
IIS
Database Servers
Executive Directors Chat Leveraging AI for Diversity, Equity, and InclusionTechSoup
Let’s explore the intersection of technology and equity in the final session of our DEI series. Discover how AI tools, like ChatGPT, can be used to support and enhance your nonprofit's DEI initiatives. Participants will gain insights into practical AI applications and get tips for leveraging technology to advance their DEI goals.
Safalta Digital marketing institute in Noida, provide complete applications that encompass a huge range of virtual advertising and marketing additives, which includes search engine optimization, virtual communication advertising, pay-per-click on marketing, content material advertising, internet analytics, and greater. These university courses are designed for students who possess a comprehensive understanding of virtual marketing strategies and attributes.Safalta Digital Marketing Institute in Noida is a first choice for young individuals or students who are looking to start their careers in the field of digital advertising. The institute gives specialized courses designed and certification.
for beginners, providing thorough training in areas such as SEO, digital communication marketing, and PPC training in Noida. After finishing the program, students receive the certifications recognised by top different universitie, setting a strong foundation for a successful career in digital marketing.
Biological screening of herbal drugs: Introduction and Need for
Phyto-Pharmacological Screening, New Strategies for evaluating
Natural Products, In vitro evaluation techniques for Antioxidants, Antimicrobial and Anticancer drugs. In vivo evaluation techniques
for Anti-inflammatory, Antiulcer, Anticancer, Wound healing, Antidiabetic, Hepatoprotective, Cardio protective, Diuretics and
Antifertility, Toxicity studies as per OECD guidelines
This slide is special for master students (MIBS & MIFB) in UUM. Also useful for readers who are interested in the topic of contemporary Islamic banking.
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...Levi Shapiro
Letter from the Congress of the United States regarding Anti-Semitism sent June 3rd to MIT President Sally Kornbluth, MIT Corp Chair, Mark Gorenberg
Dear Dr. Kornbluth and Mr. Gorenberg,
The US House of Representatives is deeply concerned by ongoing and pervasive acts of antisemitic
harassment and intimidation at the Massachusetts Institute of Technology (MIT). Failing to act decisively to ensure a safe learning environment for all students would be a grave dereliction of your responsibilities as President of MIT and Chair of the MIT Corporation.
This Congress will not stand idly by and allow an environment hostile to Jewish students to persist. The House believes that your institution is in violation of Title VI of the Civil Rights Act, and the inability or
unwillingness to rectify this violation through action requires accountability.
Postsecondary education is a unique opportunity for students to learn and have their ideas and beliefs challenged. However, universities receiving hundreds of millions of federal funds annually have denied
students that opportunity and have been hijacked to become venues for the promotion of terrorism, antisemitic harassment and intimidation, unlawful encampments, and in some cases, assaults and riots.
The House of Representatives will not countenance the use of federal funds to indoctrinate students into hateful, antisemitic, anti-American supporters of terrorism. Investigations into campus antisemitism by the Committee on Education and the Workforce and the Committee on Ways and Means have been expanded into a Congress-wide probe across all relevant jurisdictions to address this national crisis. The undersigned Committees will conduct oversight into the use of federal funds at MIT and its learning environment under authorities granted to each Committee.
• The Committee on Education and the Workforce has been investigating your institution since December 7, 2023. The Committee has broad jurisdiction over postsecondary education, including its compliance with Title VI of the Civil Rights Act, campus safety concerns over disruptions to the learning environment, and the awarding of federal student aid under the Higher Education Act.
• The Committee on Oversight and Accountability is investigating the sources of funding and other support flowing to groups espousing pro-Hamas propaganda and engaged in antisemitic harassment and intimidation of students. The Committee on Oversight and Accountability is the principal oversight committee of the US House of Representatives and has broad authority to investigate “any matter” at “any time” under House Rule X.
• The Committee on Ways and Means has been investigating several universities since November 15, 2023, when the Committee held a hearing entitled From Ivory Towers to Dark Corners: Investigating the Nexus Between Antisemitism, Tax-Exempt Universities, and Terror Financing. The Committee followed the hearing with letters to those institutions on January 10, 202
Francesca Gottschalk - How can education support child empowerment.pptxEduSkills OECD
Francesca Gottschalk from the OECD’s Centre for Educational Research and Innovation presents at the Ask an Expert Webinar: How can education support child empowerment?
Natural birth techniques - Mrs.Akanksha Trivedi Rama University
INTRODUCTION TO INTERNET OF THINGS
1. INTRODUCTION AND CONCEPTS OF IOT
Introduction
Physical Design
Logical Design
Enabling Technologies
IoT Levels and Deployment
Templates
4/20/2021
DR. VIKRAM NEERUGATTI, PROFESSOR & HEAD, DEPT. OF CSE, ASIT, GUDURU. 1
2. CREDITS
Arshdeep bhagha & Vijay Maddisetti
MRS sir
Google
4/20/2021
DR. VIKRAM NEERUGATTI, PROFESSOR & HEAD, DEPT. OF CSE, ASIT, GUDURU. 2
3. INTERNET OF THINGS
IoT
Things – around us
Connected- Internet
Remote Controlling
Remote Monitoring
Applications-All Disciplines
4/20/2021
DR. VIKRAM NEERUGATTI, PROFESSOR & HEAD, DEPT. OF CSE, ASIT, GUDURU. 3
4. INTRODUCTION TO IOT
“A dynamic global network infrastructure with self-configuring capabilities
based on standard and interoperable communication protocols where physical
and virtual "things" have identities, physical attributes, and virtual personalities
and use intelligent interfaces, and are seamlessly integrated into the
information network, often communicate data associated with users and their
environments”
Definition by
Arshadeep & Vijay
4/20/2021
DR. VIKRAM NEERUGATTI, PROFESSOR & HEAD, DEPT. OF CSE, ASIT, GUDURU. 4
5. CHARACTERISTICS OF IOT
Dynamic & Self-Adapting
Self-Configuring
Interoperable Communication Protocols
Unique Identity
Integrated into Information Network
4/20/2021
DR. VIKRAM NEERUGATTI, PROFESSOR & HEAD, DEPT. OF CSE, ASIT, GUDURU. 5
12. PHYSICAL DESIGN OF IOT
Things in IoT
IoT Protocols
Link Layer
Network Layer
Transport Layer
Application Layer
4/20/2021
DR. VIKRAM NEERUGATTI, PROFESSOR & HEAD, DEPT. OF CSE, ASIT, GUDURU. 12
13. THINGS IN IOT
The "Things" in IoT usually refers to IoT devices which have unique identities and
can perform remote sensing, actuating and monitoring capabilities.
IoT devices can:
Exchange data with other connected devices and applications (directly or indirectly), or
Collect data from other devices and process the data locally or
Send the data to centralized servers or cloud-based application back-ends for processing
the data, or
Perform some tasks locally and other tasks within the IoT infrastructure, based on
temporal and space constraints
4/20/2021
DR. VIKRAM NEERUGATTI, PROFESSOR & HEAD, DEPT. OF CSE, ASIT, GUDURU. 13
14. THINGS IN IOT
An IoT device may consist of
several interfaces for connections
to other devices, both wired and
wireless.
I/O interfaces for sensors
Interfaces for Internet connectivity
Memory and storage interfaces
Audio/video interfaces.
4/20/2021
DR. VIKRAM NEERUGATTI, PROFESSOR & HEAD, DEPT. OF CSE, ASIT, GUDURU. 14
16. IOT PROTOCOLS
Transport Layer
TCP
UDP
Application Layer
HTTP
CoAP
WebSocket
MQTT
XMPP
DDS
AMQP
4/20/2021
DR. VIKRAM NEERUGATTI, PROFESSOR & HEAD, DEPT. OF CSE, ASIT, GUDURU. 16
17. LOGICAL DESIGN OF IOT
IoT Functional Blocks
IoT Communication Models
Request-Response
Publish-Subscribe
Push-Pull
Exclisive Pair
IoT Communication API’s
Rest-based
WebSocket-based
4/20/2021
DR. VIKRAM NEERUGATTI, PROFESSOR & HEAD, DEPT. OF CSE, ASIT, GUDURU. 17
18. IOT FUNCTIONAL BLOCKS
Logical design of an IoT system refers to an
abstract representation of the entities and
processes without going into the low-level
specifics of the implementation.
An IoT system comprises of a number of
functional blocks that provide the system the
capabilities for identification, sensing, actuation,
communication, and management.
4/20/2021
DR. VIKRAM NEERUGATTI, PROFESSOR & HEAD, DEPT. OF CSE, ASIT, GUDURU. 18
19. REQUEST-RESPONSE COMMUNICATION MODEL
Request-Response is a communication model in
which the client sends requests to the server
and the server responds to the requests.
When the server receives a request, it decides
how to respond, fetches the data, retrieves
resource representations, prepares the
response, and then sends the response to the
client.
4/20/2021
DR. VIKRAM NEERUGATTI, PROFESSOR & HEAD, DEPT. OF CSE, ASIT, GUDURU. 19
20. PUBLISH-SUBSCRIBE COMMUNICATION MODEL
Publish-Subscribe is a communication model that
involves publishers, brokers and consumers.
Publishers are the source of data.
Publishers send the data to the topics which are
managed by the broker.
Publishers are not aware of the consumers.
Consumers subscribe to the topics which are
managed by the broker.
When the broker receives data for a topic from the
publisher, it sends the data to all the subscribed
consumers.
4/20/2021
DR. VIKRAM NEERUGATTI, PROFESSOR & HEAD, DEPT. OF CSE, ASIT, GUDURU. 20
21. PUSH-PULL COMMUNICATION MODEL
Push-Pull is a communication model in which the
data producers push the data to queues and the
consumers pull the data from the queues.
Producers do not need to be aware of the
consumers.
Queues help in decoupling the messaging between
the producers
and consumers.
Queues also act as a buffer which helps in
situations when there is a mismatch between the
rate at which the producers push data and the rate
rate at which the consumers pull data.
4/20/2021
DR. VIKRAM NEERUGATTI, PROFESSOR & HEAD, DEPT. OF CSE, ASIT, GUDURU. 21
22. EXCLUSIVE PAIR COMMUNICATION MODEL
Exclusive Pair is a bidirectional, fully duplex
communication model that uses a persistent
connection between the client and server.
Once the connection is setup it remains open
until the client sends a request to close the
connection.
Client and server can send messages to each
other after connection setup.
4/20/2021
DR. VIKRAM NEERUGATTI, PROFESSOR & HEAD, DEPT. OF CSE, ASIT, GUDURU. 22
23. REST-BASED COMMUNICATION API
Representational State Transfer (REST) is a set
of architectural principles by which you can
design web services and web APIs that focus on
a system’s resources and how resource states
are addressed and transferred.
REST APIs follow the request response
communication model.
The REST architectural constraints apply to the
components, connectors, and data elements,
within a distributed hypermedia system.
4/20/2021
DR. VIKRAM NEERUGATTI, PROFESSOR & HEAD, DEPT. OF CSE, ASIT, GUDURU. 23
24. WEB SOCKET-BASED COMMUNICATION API
Web Socket APIs allow bidirectional, full duplex
communication between clients and servers.
Web Socket APIs follow the exclusive pair
communication model
4/20/2021
DR. VIKRAM NEERUGATTI, PROFESSOR & HEAD, DEPT. OF CSE, ASIT, GUDURU. 24
25. IOT ENABLING TECHNOLOGIES
AI, ML, DL
Wireless Sensor Networks
Cloud Computing
Big data Analytics
Communication Protocols
Embedded Systems
4/20/2021
DR. VIKRAM NEERUGATTI, PROFESSOR & HEAD, DEPT. OF CSE, ASIT, GUDURU. 25
32. ARTIFICIAL INTELLIGENCE
AI
Internet of Things (IoT)
Machine Learning (ML)
Deep Learning (DL)
4/20/2021
DR. VIKRAM NEERUGATTI, PROFESSOR & HEAD, DEPT. OF CSE, ASIT, GUDURU. 32
41. DATA SCIENCE
DS-Useful data
Decisions
Applications-All Disciplines
4/20/2021
DR. VIKRAM NEERUGATTI, PROFESSOR & HEAD, DEPT. OF CSE, ASIT, GUDURU. 41
45. IOT SYSTEM COMPONENTS
An IoT system comprises of the following components:
Device:
An IoT device allows identification, remote sensing, actuating and remote monitoring capabilities.
Resource:
Resources are software components on the IoT device for accessing, processing, and storing sensor
information, or controlling actuators connected to the device. Resources also include the software
components that enable network access for the device.
Controller Service:
Controller service is a native service that runs on the device and interacts with the web services.
Controller service sends data from the device to the web service and receives commands from the
application (via web services) for controlling the device.
4/20/2021
DR. VIKRAM NEERUGATTI, PROFESSOR & HEAD, DEPT. OF CSE, ASIT, GUDURU. 45
46. IOT SYSTEM COMPONENTS
Database:
Database can be either local or in the cloud and stores the data generated by the IoT device.
Web Service:
Web services serve as a link between the IoT device, application, database and analysis components. Web service can be
either implemented using HTTP and REST principles (REST service) or using WebSocket protocol (WebSocket service).
Analysis Component:
The Analysis Component is responsible for analysing the IoT data and generate results in a form which are easy for the user
to understand.
Application:
IoT applications provide an interface that the users can use to control and monitor various aspects of the IoT system.
Applications also allow users to view the system status and view the processed data.
4/20/2021
DR. VIKRAM NEERUGATTI, PROFESSOR & HEAD, DEPT. OF CSE, ASIT, GUDURU. 46
47. IOT LEVEL-1
A level-1 IoT system has a single node/device
that performs sensing and/or actuation, stores
data, performs analysis and hosts the
application
Level-1 IoT systems are suitable for modelling
low cost and low-complexity solutions where the
data involved is not big and the analysis
requirements are not computationally intensive.
4/20/2021
DR. VIKRAM NEERUGATTI, PROFESSOR & HEAD, DEPT. OF CSE, ASIT, GUDURU. 47
48. IOT LEVEL-2
A level-2 IoT system has a single node that
performs sensing and/or actuation and local
analysis.
Data is stored in the cloud and application is
usually cloud based.
Level-2 IoT systems are suitable for solutions
where the data involved is big, however, the
primary analysis requirement is not
computationally intensive and can be done
locally itself.
4/20/2021
DR. VIKRAM NEERUGATTI, PROFESSOR & HEAD, DEPT. OF CSE, ASIT, GUDURU. 48
49. IOT LEVEL-3
A level-3 IoT system has a single node. Data is
stored and analyzed in the cloud and application
is cloudbased.
Level-3 IoT systems are suitable for solutions
where the data involved is big and the analysis
requirements are computationally intensive.
4/20/2021
DR. VIKRAM NEERUGATTI, PROFESSOR & HEAD, DEPT. OF CSE, ASIT, GUDURU. 49
50. IOT LEVEL-4
A level-4 IoT system has multiple nodes that perform local
analysis. Data is stored in the cloud and application is
cloud-based.
Level-4 contains local and cloud based observer nodes
which can subscribe to and receive information collected
in the cloud from IoT devices.
Level-4 IoT systems are suitable for solutions where
multiple nodes are required, the data involved is big and
the analysis requirements are computationally intensive.
4/20/2021
DR. VIKRAM NEERUGATTI, PROFESSOR & HEAD, DEPT. OF CSE, ASIT, GUDURU. 50
51. IOT LEVEL-5
A level-5 IoT system has multiple end nodes and one
coordinator node.
The end nodes that perform sensing and/or actuation.
Coordinator node collects data from the end nodes and
sends to the cloud.
Data is stored and analyzed in the cloud and application is
cloud-based.
Level-5 IoT systems are suitable for solutions based on
wireless sensor networks, in which the data involved is big
and the analysis requirements are computationally
intensive.
4/20/2021
DR. VIKRAM NEERUGATTI, PROFESSOR & HEAD, DEPT. OF CSE, ASIT, GUDURU. 51
52. IOT LEVEL-6
A level-6 IoT system has multiple independent end nodes
that perform sensing and/or actuation and send data to
the cloud.
Data is stored in the cloud and application is cloud-based.
The analytics component analyses the data and stores the
results in the cloud database.
The results are visualized with the cloud-based
application.
The centralized controller is aware of the status of all the
end nodes and sends control commands to the nodes.
4/20/2021
DR. VIKRAM NEERUGATTI, PROFESSOR & HEAD, DEPT. OF CSE, ASIT, GUDURU. 52
53. SUMMARY
INTRODUCTION AND CONCEPTS OF IOT
Introduction
Physical Design
Logical Design
Enabling Technologies
IoT Levels and Deployment
Templates
4/20/2021
DR. VIKRAM NEERUGATTI, PROFESSOR & HEAD, DEPT. OF CSE, ASIT, GUDURU. 53
54. LUXE: Smart Homes / Office
HARMONIZER APP DESIGN – for
SMART SWITCHES
Design by: Vikram + MRS
Sept 2020
4/20/2021
DR. VIKRAM NEERUGATTI, PROFESSOR & HEAD, DEPT. OF CSE, ASIT, GUDURU. 54
55. LUXE: Smart Homes / Office LUXE: Smart Homes / Office
Single room
1BHK
2BHK
3BHK
Villa
LUXE: Smart Homes / Office
Single room
Switch 1
Switch 2
Switch 3
Switch 4
Switch 5
4/20/2021
DR. VIKRAM NEERUGATTI, PROFESSOR & HEAD, DEPT. OF CSE, ASIT, GUDURU. 55
56. LUXE: Smart Homes / Office
Single room
1BHK
2BHK
3BHK
Villa
LUXE: Smart Homes / Office
Bed Room: SB 1
Switch 1
Switch 2
Switch 3
Switch 4
Switch 5
LUXE: Smart Homes / Office
Single room
1BHK
4/20/2021
DR. VIKRAM NEERUGATTI, PROFESSOR & HEAD, DEPT. OF CSE, ASIT, GUDURU. 56
57. HARMONIZER INDIA PVT LTD.,
INTRODUCING
“CANNY” INTELLIGENT PANELS
4/20/2021
DR. VIKRAM NEERUGATTI, PROFESSOR & HEAD, DEPT. OF CSE, ASIT, GUDURU. 57
58. PROBLEM STATEMENT IN ELECTRICAL
PANELS
Temperature inside the Enclosure
Heat Trap
Deterioration of Insulation
Smoke due to insulation burning
Smoke due to Short circuit
Vibration due to Busbar
Vibration due to over
load/harmonics
Over Load on the equipment
“CANNY” INTELLIGENT PANELS
SMART SOLUTION WITH MACHINE LEARNING TECHNOLOGY
Convert your existing Electrical
Switchboard to “Canny”
4/20/2021
DR. VIKRAM NEERUGATTI, PROFESSOR & HEAD, DEPT. OF CSE, ASIT, GUDURU. 58
59. CANNY – AN INTELLIGENT ELECTRIC SWITCH BOARD
Measure
Analyse
Control
Field devices to measure
Temperature in each Feeder, Cable,
Busbar
Vibration on the Electric Switchboard
Hot Spot Temperature
Busbar alignment
Insect, animal movement
Smoke detection
Mobile APP for
Monitoring Temperature
Vibration on the Electric Switchboard
Hot Spot Temperature
Busbar alignment
Machine Learning Technology
Alert
Automatic Solution recommendation
Monitor
4/20/2021
DR. VIKRAM NEERUGATTI, PROFESSOR & HEAD, DEPT. OF CSE, ASIT, GUDURU. 59
60. Canny
PCC 1
PCC 2
MCC 1
MCC 2
MCC 3
Canny
CANNY – MOBILE APP
PCC 1
Temperature
Smoke
Vibration
Canny
PCC 1 - Feeders
Feeder 1
Feeder 2
Feeder N
4/20/2021
DR. VIKRAM NEERUGATTI, PROFESSOR & HEAD, DEPT. OF CSE, ASIT, GUDURU. 60
61. CANNY – MOBILE APP
Canny
PCC 1 - Feeders
Feeder 1
Feeder 2
Feeder N
Canny
Feeder 1
Tmax = 60Deg C
Tmini = 40Deg C
4/20/2021
DR. VIKRAM NEERUGATTI, PROFESSOR & HEAD, DEPT. OF CSE, ASIT, GUDURU. 61
62. HARMONIZER INDIA PVT LTD.,
INTRODUCING INTELLIGENT PANELS
Measure
Monitor
Analyse
Control
Canny – Intelligent Switch board
Canny , Dapper
PCC 1
4/20/2021
DR. VIKRAM NEERUGATTI, PROFESSOR & HEAD, DEPT. OF CSE, ASIT, GUDURU. 62