SlideShare a Scribd company logo
1 of 11
Download to read offline
Introduction to
Internet of Things (IoT)
(Emerging Technology Course for 1st Year: VTU)
Course Code: 22ETC15H/25H
MODULE - 3
IoT Processing Topologies
and Types
Dr. SURESHA V
Professor, Department of E&CE
K.V.G. College of Engineering, Sullia, D.K-574 327
Introduction to IoT (22ETC15H) - Module 3: IoT Processing Topologies &Types
Dr. Suresha V, Professor, Dept. of E&C. K V G C E, Sullia, D.K-57432 Page 1
Module 3
IoT Processing Topologies &Types
 Learning Outcomes
After reading this Module, the student will be able to:
 List common data types in IoT applications
 Understand the importance of processing
 Explain the various processing topologies in IoT
 Understand the importance of processing offloading toward achieving
scalability and cost-effectiveness of IoT solutions.
 Determine the importance of choosing the right processing topologies and
associated considerations while designing IoT applications
 Determine the requirements that are associated with IoT-based processing of
sensed and communicated data.
Chapter 6: IoT Processing Topologies and Types (Textbook: Page 115-125)
 Data Format: Structured data, Unstructured data.
 Importance of Processing in IoT
 Processing Topologies: On-site processing, Off-site processing.
 IoT Device Design and Selection Considerations
 Processing Offloading:
- Offload location
- Offload decision making
- Offloading considerations
Text Book: Sudip Misra, Anandarup Mukherjee, Arijit Roy, “Introduction to IoT”,
Cambridge University Press 2021.
Introduction to IoT (22ETC15H) - Module 3: IoT Processing Topologies &Types
Dr. Suresha V, Professor, Dept. of E&C. K V G C E, Sullia, D.K-57432 Page 2
Chapter 6: IoT Processing Topologies and Types
6.1 Data Format: In an IoT system, a massive volume of data is generated by a huge
number of diversified users. These data can be broadly grouped into TWO types based
on how they can be accessed and stored: *
1. Structured data
2. Unstructured data
1. Structured data: Structured data is highly specific, typically text data, and is stored
in a predefined format. Typical examples are product databases, contact lists, etc.
These are primarily created by using length-limited data fields such as phone
numbers, social security numbers, and other such information. Common usage of
this type of data is associated with flight or train reservation systems, banking
systems, inventory controls, and other similar systems. Languages such as
Structured Query Language (SQL) are used for accessing these data in database
management systems.
2. Unstructured data: These data types have no pre-defined structure and can vary
according to applications and data-generating sources. Examples are documents,
videos, audio files, posts on social media, and emails. In simple words, all the data on
the internet is categorized as unstructured. Querying languages such as NoSQL are
generally used for this data type.
6.2 Importance of Processing in IoT:*** Data processing is more crucial with the
rapid advancements in IoT. Intelligent and resourceful processing techniques are
required to process vast amounts and types of data flowing through the Internet. it is
also important to decide when to process and what to process. We first divide the data
to be processed into THREE types based on the urgency of processing:
1. Very time-critical data
2. Time critical data
3. Normal data
1. Very time-critical data: These data have a very low processing latency, typically in
the range of a few milliseconds. Data from sources such as flight control systems,
healthcare, etc need immediate decision support. Processing requirements are
exceptionally high. Processing the data in place or nearer to the source is crucial.
Introduction to IoT (22ETC15H) - Module 3: IoT Processing Topologies &Types
Dr. Suresha V, Professor, Dept. of E&C. K V G C E, Sullia, D.K-57432 Page 3
2. Time-critical data: Data from sources that can tolerate normal processing latency
are deemed as time-critical data. These data, generally associated with sources such
as vehicles, traffic, smart home systems, surveillance systems, and others, can
tolerate a latency of a few seconds. These data are to be processed in remote
locations processors such as clouds.
3. Normal data: These data, can tolerate a processing latency of a few minutes to a
few hours and are typically associated with less data-sensitive domains such as
agriculture, environmental monitoring, and others. Typically have no particular
time requirements for processing urgently.
6.3 Processing Topologies:*** The various processing solutions are divided into two
large topologies:
1. On-site processing topologies
2. Off-site processing topologies: It further divides into
i. Remote processing topologies
ii. Collaborative processing topologies
1. On-site processing topologies: In this topology, the data is processed at the source
itself. It is used in applications that have a very low tolerance for latencies. These
latencies may result from the processing hardware or the network. Applications such
as healthcare and flight control systems (real-time systems). The processing
infrastructure is fast and robust enough to handle such data (See figure 6.2)
Introduction to IoT (22ETC15H) - Module 3: IoT Processing Topologies &Types
Dr. Suresha V, Professor, Dept. of E&C. K V G C E, Sullia, D.K-57432 Page 4
Figure 6.2 shows the on-site processing topology, where an event (here, fire) is
detected utilizing a temperature sensor connected to a sensor node. The sensor node
processes the information from the sensed event and generates an alert. The node
additionally has the option of forwarding the data to a remote infrastructure for
further analysis and storage.
2. Off-site processing: Here processing is not done at the source point. It allows for
latencies and is significantly cheaper than on-site processing topologies. In this
topology, the sensor node is responsible for the collection and framing of data to be
transmitted to another location for processing. Simpler sensor node borrows
processing from high processing enabled device to accomplish their task. Multiple
nodes can come together to share their processing power to collaboratively process the
data. It is divided into TWO types
i. Remote processing: It is the most common processing topology used in present-day
IoT solutions. It encompasses sensing data by various sensor nodes; the data is then
forwarded to a remote server or a cloud-based infrastructure for further processing
and analytics. Figure 6.3 shows the outline of one such paradigm, where the sensing
of an event is performed locally, and the decision-making is outsourced to a remote
processor.
Introduction to IoT (22ETC15H) - Module 3: IoT Processing Topologies &Types
Dr. Suresha V, Professor, Dept. of E&C. K V G C E, Sullia, D.K-57432 Page 5
o Advantages:
- Massive cost and energy savings by enabling the reuse and reallocation of
the same processing resource.
- It ensures the massive scalability of solutions, without significantly
affecting the cost of the deployment.
o Drawback:
- It requires a lot of network bandwidth
- Need good network connectivity between the sensor nodes and the remote
processing infrastructure.
ii. Collaborative processing: Here Sensors cooperatively process data from multiple
sources to serve a high-level task. It typically finds use in scenarios with limited or
no network connectivity. Figure 6.4 shows the collaborative processing topology for
collaboratively processing data locally.
o Advantages:
- This topology can be quite economical for large-scale deployments spread
over vast areas where remote infrastructure is not viable.
- This approach also reduces latencies due to the transfer of data over the
network.
- It conserves the bandwidth of the network, especially those connecting to the
Internet.
- This topology can be quite beneficial for applications such as agriculture.
o Drawback:
- This topology needs costlier mesh networks for implementation. Collaborative
Introduction to IoT (22ETC15H) - Module 3: IoT Processing Topologies &Types
Dr. Suresha V, Professor, Dept. of E&C. K V G C E, Sullia, D.K-57432 Page 6
6.4 IoT Device Design and Selection Considerations:***** The processor is the main
factor for IoT device design and selection for various applications. Other important
considerations to design an IoT device are
1. Size
2. Energy
3. Cost
4. Memory
5. Processing power
6. I/O rating
7. Add-ons
1. Size: Size and energy consumption are crucial factors of a sensor node. The larger
the size factor consumes more energy. Additionally, large-size factors are not
suitable for many IoT applications.
2. Energy: Energy efficient processor is the most important factor in designing IoT-
based sensing solutions. The higher the energy requirements, the higher the battery
replacement frequency. This principle is not a good option for IoT-based
applications.
3. Cost: Cheaper cost of the hardware enables a much higher density of hardware
deployment. For example, cheaper gas and fire detection solutions would enable
users to include much more sensing hardware for a lesser cost.
4. Memory: devices with higher memory tend to be costlier. But features such as local
data processing, data storage, data filtering, data formatting, and a host of other
features rely heavily on the memory capabilities of devices.
5. Processing power: In deciding what type of sensors can be accommodated with the
IoT device/node, and what processing features can integrate on-site. The processing
power also decides the type of applications the device can be associated with. For
example, if the application involves video or audio needs more processing power
than other simple sensing IoT applications.
6. Input /output (I/O) rating: Primarily the processor, is the deciding factor in
determining the circuit complexity, energy usage, and requirements for support of
various sensing solutions and sensor types. Some processors have a meager I/O
voltage rating of 3.3 V, as compared to 5 V for somewhat older processors. This
Introduction to IoT (22ETC15H) - Module 3: IoT Processing Topologies &Types
Dr. Suresha V, Professor, Dept. of E&C. K V G C E, Sullia, D.K-57432 Page 7
needs additional voltage and logic conversion circuitry and increases the cost and
complexity of the node.
7. Add-ons: IoT device provides, such analog to digital conversion (ADC) units,
connections to USB and ethernet, and inbuilt wireless access capabilities for various
IoT applications. These add-ons also decide how fast a solution can be developed
others helps in defining the robustness and usability of a processor or IoT devicein
various application scenarios.
6.5 Processing Offloading: This technique in the IoT context is the transfer of
resource-intensive computational tasks to a separate external device in the network. It
is important for the development of densely deployable, energy-conserving,
miniaturized, and cheap IoT-based solutions for sensing tasks.
Figure 6.5 shows the typical outline of an IoT deployment with the various layers
of processing that are encountered spanning vastly different application domains—
from as near as sensing the environment to as far as cloud-based infrastructure. For
the majority of IoT applications, the bulk of the processing is carried out remotely to
keep the on-site devices simple, small, and economical.
Introduction to IoT (22ETC15H) - Module 3: IoT Processing Topologies &Types
Dr. Suresha V, Professor, Dept. of E&C. K V G C E, Sullia, D.K-57432 Page 8
 The processing procedure is as follows:
- For off-site processing, data from the sensing layer can be forwarded to the fog
or cloud or contained within the edge layer.
- The edge layer makes use of devices within the local network to process data
that is similar to the collaborative processing topology as shown in fig 6.4
- Fog nodes are localized within a geographic area and serve the IoT node within
a small coverage area.
- Forwarding data to a cloud or a remote server requires the device to be
connected to the internet.
 Data offloading is divided into THREE parts:
1. Offload location:
( where all the processing can be offloaded in the IoT architecture)
2. Offload decision:
(How to choose where to offload the processing to and by how much)
3. Offloading considerations:
(Deciding when to offload)
1. Offload location: The choice of offload location decides the applicability, cost, and
sustainability of the IoT application and deployment. The offload location into FOUR
types:
(a) Edge (b) Fog
(c) Remote server (d) Cloud
i. Edge: Offloading processing to the edge implies that the data processing is
facilitated to a location at or near the source of data generation itself.
ii. Fog: Fog computing is a decentralized computing infrastructure. The data,
computing, storage, and applications are shifted to a place between the data
source and the cloud resulting in significantly reduced latencies and network
bandwidth usage.
iii. Remote Server: A simple remote server with good processing power may be
used with IoT-based applications to offload the processing from resource-
constrained IoT devices.
iv. Cloud: A cloud is provisioned for processing offloading so that processing
resources can be rapidly provisioned with minimal effort over the Internet,
which can be accessed globally. Cloud enables massive scalability of solutions.
Introduction to IoT (22ETC15H) - Module 3: IoT Processing Topologies &Types
Dr. Suresha V, Professor, Dept. of E&C. K V G C E, Sullia, D.K-57432 Page 9
2. Offload decision making: The choice of where to offload and how much to offload is
addressed considering data generation rate, network bandwidth, the criticality of
applications, processing resource available at the offload site, and other factors.
Main three approaches are as follows.
a) Naive Approach
b) Bargaining-based approach
c) Learning-based approach
a. Naive Approach: This rule-based approach, in which the data from IoT devices
are offloaded to the nearest location based on the achievement of certain offload
criteria. Statistical measures are consulted for generating the rules.
b. Bargaining-based approach: To maximize the quality of service(bandwidth,
latencies) by reaching a point where the qualities of certain parameters are
reduced, while the others are enhanced. QoS is achieved collaboratively for
better full implementation.
c. Learning-based approach: It relies on past behavior and trends of data flow
through the IoT architecture. The optimization of QoS parameters is done by
learning from historical trends and trying to optimize previous solutions further
and enhance the collective behavior of the IoT implementation.
3. Offloading considerations:*** offloading parameters need to be considered while
deciding upon the offloading type to choose arising from the nature of the IoT
application and the hardware being used to interact with the application. These
parameters are as follows.
- Bandwidth
- Latency
- Criticality
- Resources
- Data volume
 Bandwidth: The maximum amount of data that can be simultaneously transmitted
over the network between two points. The bandwidth of a wired or wireless
network is also considered to be its data-carrying capacity and often used to
describe the data rate of that network.
Introduction to IoT (22ETC15H) - Module 3: IoT Processing Topologies &Types
Dr. Suresha V, Professor, Dept. of E&C. K V G C E, Sullia, D.K-57432 Page 10
 Latency: It is the time delay between the start and completion of an operation,
which is due to physical limitations of the infrastructure in the network or the
processor which is associated with an operation.
 Criticality: It defines importance of a task being pursued by an IoT application. The
more critical a task is, the lesser latency is expected. For example, detection of fires
using an IoT solution has higher criticality than detection of agricultural field
parameters.
 Resources: It signifies the actual capabilities(like processing power, the analytical
algorithm, etc) of an offload location.
 Data volume: The amount of data generated by a source or sources that can be
simultaneously handled by the offload location. Typically, for large and dense IoT
deployments, the offload location should be robust enough to address the
processing issues related to massive data volumes.
 Acknowledgment: My sincere thanks to the author Prof. Sudip Misra, because the above contents
are prepared from his textbook “Introduction to IoT” published by Cambridge University Press
2021.
Prepared by:
Dr. Suresha V
Principal & Professor
Dept. of Electronics and Communication Engineering.
Reach me at: suresha.vee@gmail.com
WhatsApp: +91 8310992434

More Related Content

What's hot

Unit 2,3,4 _ Internet of Things A Hands-On Approach (Arshdeep Bahga, Vijay Ma...
Unit 2,3,4 _ Internet of Things A Hands-On Approach (Arshdeep Bahga, Vijay Ma...Unit 2,3,4 _ Internet of Things A Hands-On Approach (Arshdeep Bahga, Vijay Ma...
Unit 2,3,4 _ Internet of Things A Hands-On Approach (Arshdeep Bahga, Vijay Ma...Selvaraj Seerangan
 
IOT DATA MANAGEMENT AND COMPUTE STACK.pptx
IOT DATA MANAGEMENT AND COMPUTE STACK.pptxIOT DATA MANAGEMENT AND COMPUTE STACK.pptx
IOT DATA MANAGEMENT AND COMPUTE STACK.pptxMeghaShree665225
 
IoT Sensing and Actuation.pdf
 IoT Sensing and Actuation.pdf IoT Sensing and Actuation.pdf
IoT Sensing and Actuation.pdfDr. Loganathan R
 
Lecture 6: IoT Data Processing
Lecture 6: IoT Data Processing Lecture 6: IoT Data Processing
Lecture 6: IoT Data Processing PayamBarnaghi
 
M2M - Machine to Machine Technology
M2M - Machine to Machine TechnologyM2M - Machine to Machine Technology
M2M - Machine to Machine TechnologySamip jain
 
A Reference Architecture for IoT
A Reference Architecture for IoT A Reference Architecture for IoT
A Reference Architecture for IoT WSO2
 
IoT Levels and Deployment Templates
IoT Levels and Deployment TemplatesIoT Levels and Deployment Templates
IoT Levels and Deployment TemplatesPrakash Honnur
 
Spectrum and power of wbfm
Spectrum and power of wbfmSpectrum and power of wbfm
Spectrum and power of wbfmLearn By Watch
 
Object Oriented Programming with JAVA
Object Oriented Programming with JAVAObject Oriented Programming with JAVA
Object Oriented Programming with JAVADemian Antony DMello
 
M2M systems layers and designs standardizations
M2M systems layers and designs standardizationsM2M systems layers and designs standardizations
M2M systems layers and designs standardizationsFabMinds
 

What's hot (20)

Unit 2,3,4 _ Internet of Things A Hands-On Approach (Arshdeep Bahga, Vijay Ma...
Unit 2,3,4 _ Internet of Things A Hands-On Approach (Arshdeep Bahga, Vijay Ma...Unit 2,3,4 _ Internet of Things A Hands-On Approach (Arshdeep Bahga, Vijay Ma...
Unit 2,3,4 _ Internet of Things A Hands-On Approach (Arshdeep Bahga, Vijay Ma...
 
IOT DATA MANAGEMENT AND COMPUTE STACK.pptx
IOT DATA MANAGEMENT AND COMPUTE STACK.pptxIOT DATA MANAGEMENT AND COMPUTE STACK.pptx
IOT DATA MANAGEMENT AND COMPUTE STACK.pptx
 
Ch 4 Emergence of IoT.pdf
Ch 4 Emergence of IoT.pdfCh 4 Emergence of IoT.pdf
Ch 4 Emergence of IoT.pdf
 
IoT Sensing and Actuation.pdf
 IoT Sensing and Actuation.pdf IoT Sensing and Actuation.pdf
IoT Sensing and Actuation.pdf
 
DC - Unit - 4 - Context Based Compression
DC - Unit - 4 - Context Based CompressionDC - Unit - 4 - Context Based Compression
DC - Unit - 4 - Context Based Compression
 
CLE Unit - 5 - Cyber Ethics
CLE Unit - 5 - Cyber EthicsCLE Unit - 5 - Cyber Ethics
CLE Unit - 5 - Cyber Ethics
 
Lecture 6: IoT Data Processing
Lecture 6: IoT Data Processing Lecture 6: IoT Data Processing
Lecture 6: IoT Data Processing
 
CLE Unit - 2 - Information Technology Act
CLE Unit - 2 - Information Technology ActCLE Unit - 2 - Information Technology Act
CLE Unit - 2 - Information Technology Act
 
M2M - Machine to Machine Technology
M2M - Machine to Machine TechnologyM2M - Machine to Machine Technology
M2M - Machine to Machine Technology
 
A Reference Architecture for IoT
A Reference Architecture for IoT A Reference Architecture for IoT
A Reference Architecture for IoT
 
Iot architecture
Iot architectureIot architecture
Iot architecture
 
IoT Levels and Deployment Templates
IoT Levels and Deployment TemplatesIoT Levels and Deployment Templates
IoT Levels and Deployment Templates
 
IoT and m2m
IoT and m2mIoT and m2m
IoT and m2m
 
M2M technology in IOT
M2M technology in IOTM2M technology in IOT
M2M technology in IOT
 
Spectrum and power of wbfm
Spectrum and power of wbfmSpectrum and power of wbfm
Spectrum and power of wbfm
 
DC - Unit - 5 - Lossless Image Compression
DC - Unit - 5 - Lossless Image CompressionDC - Unit - 5 - Lossless Image Compression
DC - Unit - 5 - Lossless Image Compression
 
WD - Unit - 4 - PHP Basics
WD - Unit - 4 - PHP BasicsWD - Unit - 4 - PHP Basics
WD - Unit - 4 - PHP Basics
 
Object Oriented Programming with JAVA
Object Oriented Programming with JAVAObject Oriented Programming with JAVA
Object Oriented Programming with JAVA
 
M2M systems layers and designs standardizations
M2M systems layers and designs standardizationsM2M systems layers and designs standardizations
M2M systems layers and designs standardizations
 
Sensor Cloud
Sensor CloudSensor Cloud
Sensor Cloud
 

Similar to IoT module 3- 22ETC15H-2022-23 by Dr.Suresha V1.pdf

Module 3_BETCK105H_Introduction to IoT.pdf
Module 3_BETCK105H_Introduction to IoT.pdfModule 3_BETCK105H_Introduction to IoT.pdf
Module 3_BETCK105H_Introduction to IoT.pdfRoopaDNDandally
 
IoT Processing Topologies.pptx
IoT Processing Topologies.pptxIoT Processing Topologies.pptx
IoT Processing Topologies.pptxtaruian
 
SECURITY AND PRIVACY AWARE PROGRAMMING MODEL FOR IOT APPLICATIONS IN CLOUD EN...
SECURITY AND PRIVACY AWARE PROGRAMMING MODEL FOR IOT APPLICATIONS IN CLOUD EN...SECURITY AND PRIVACY AWARE PROGRAMMING MODEL FOR IOT APPLICATIONS IN CLOUD EN...
SECURITY AND PRIVACY AWARE PROGRAMMING MODEL FOR IOT APPLICATIONS IN CLOUD EN...ijccsa
 
Data processing in Cyber-Physical Systems
Data processing in Cyber-Physical SystemsData processing in Cyber-Physical Systems
Data processing in Cyber-Physical SystemsBob Marcus
 
736 ijar 14994
736 ijar 14994736 ijar 14994
736 ijar 14994mrewaabd
 
Content an Insight to Security Paradigm for BigData on Cloud: Current Trend a...
Content an Insight to Security Paradigm for BigData on Cloud: Current Trend a...Content an Insight to Security Paradigm for BigData on Cloud: Current Trend a...
Content an Insight to Security Paradigm for BigData on Cloud: Current Trend a...IJECEIAES
 
Efficient Data Aggregation in Wireless Sensor Networks
Efficient Data Aggregation in Wireless Sensor NetworksEfficient Data Aggregation in Wireless Sensor Networks
Efficient Data Aggregation in Wireless Sensor NetworksIJAEMSJORNAL
 
A data estimation for failing nodes using fuzzy logic with integrated microco...
A data estimation for failing nodes using fuzzy logic with integrated microco...A data estimation for failing nodes using fuzzy logic with integrated microco...
A data estimation for failing nodes using fuzzy logic with integrated microco...IJECEIAES
 
Deep Learning and Big Data technologies for IoT Security
Deep Learning and Big Data technologies for IoT SecurityDeep Learning and Big Data technologies for IoT Security
Deep Learning and Big Data technologies for IoT SecurityIRJET Journal
 
Survey on Optimization of IoT Routing Based On Machine Learning Techniques
Survey on Optimization of IoT Routing Based On Machine Learning TechniquesSurvey on Optimization of IoT Routing Based On Machine Learning Techniques
Survey on Optimization of IoT Routing Based On Machine Learning TechniquesIRJET Journal
 
A Survey of Cyber foraging systems: Open Issues, Research Challenges
A Survey of Cyber foraging systems: Open Issues, Research ChallengesA Survey of Cyber foraging systems: Open Issues, Research Challenges
A Survey of Cyber foraging systems: Open Issues, Research ChallengesEswar Publications
 
Crypto Mechanism to Provide Secure to the IOT Data
Crypto Mechanism to Provide Secure to the IOT DataCrypto Mechanism to Provide Secure to the IOT Data
Crypto Mechanism to Provide Secure to the IOT DataIRJET Journal
 
A Review Paper on Emerging Areas and Applications of IoT
A Review Paper on Emerging Areas and Applications of IoTA Review Paper on Emerging Areas and Applications of IoT
A Review Paper on Emerging Areas and Applications of IoTIRJET Journal
 
IRJET-Implementation of Threshold based Cryptographic Technique over Cloud Co...
IRJET-Implementation of Threshold based Cryptographic Technique over Cloud Co...IRJET-Implementation of Threshold based Cryptographic Technique over Cloud Co...
IRJET-Implementation of Threshold based Cryptographic Technique over Cloud Co...IRJET Journal
 
IRJET- Multimedia Content Security with Random Key Generation Approach in...
IRJET-  	  Multimedia Content Security with Random Key Generation Approach in...IRJET-  	  Multimedia Content Security with Random Key Generation Approach in...
IRJET- Multimedia Content Security with Random Key Generation Approach in...IRJET Journal
 
IRJET- A Novel Framework for Three Level Isolation in Cloud System based ...
IRJET-  	  A Novel Framework for Three Level Isolation in Cloud System based ...IRJET-  	  A Novel Framework for Three Level Isolation in Cloud System based ...
IRJET- A Novel Framework for Three Level Isolation in Cloud System based ...IRJET Journal
 
Anonymization of data using mapreduce on cloud
Anonymization of data using mapreduce on cloudAnonymization of data using mapreduce on cloud
Anonymization of data using mapreduce on cloudeSAT Journals
 

Similar to IoT module 3- 22ETC15H-2022-23 by Dr.Suresha V1.pdf (20)

Module 3_BETCK105H_Introduction to IoT.pdf
Module 3_BETCK105H_Introduction to IoT.pdfModule 3_BETCK105H_Introduction to IoT.pdf
Module 3_BETCK105H_Introduction to IoT.pdf
 
IoT Processing Topologies.pptx
IoT Processing Topologies.pptxIoT Processing Topologies.pptx
IoT Processing Topologies.pptx
 
SECURITY AND PRIVACY AWARE PROGRAMMING MODEL FOR IOT APPLICATIONS IN CLOUD EN...
SECURITY AND PRIVACY AWARE PROGRAMMING MODEL FOR IOT APPLICATIONS IN CLOUD EN...SECURITY AND PRIVACY AWARE PROGRAMMING MODEL FOR IOT APPLICATIONS IN CLOUD EN...
SECURITY AND PRIVACY AWARE PROGRAMMING MODEL FOR IOT APPLICATIONS IN CLOUD EN...
 
Data processing in Cyber-Physical Systems
Data processing in Cyber-Physical SystemsData processing in Cyber-Physical Systems
Data processing in Cyber-Physical Systems
 
736 ijar 14994
736 ijar 14994736 ijar 14994
736 ijar 14994
 
Content an Insight to Security Paradigm for BigData on Cloud: Current Trend a...
Content an Insight to Security Paradigm for BigData on Cloud: Current Trend a...Content an Insight to Security Paradigm for BigData on Cloud: Current Trend a...
Content an Insight to Security Paradigm for BigData on Cloud: Current Trend a...
 
Efficient Data Aggregation in Wireless Sensor Networks
Efficient Data Aggregation in Wireless Sensor NetworksEfficient Data Aggregation in Wireless Sensor Networks
Efficient Data Aggregation in Wireless Sensor Networks
 
A data estimation for failing nodes using fuzzy logic with integrated microco...
A data estimation for failing nodes using fuzzy logic with integrated microco...A data estimation for failing nodes using fuzzy logic with integrated microco...
A data estimation for failing nodes using fuzzy logic with integrated microco...
 
Deep Learning and Big Data technologies for IoT Security
Deep Learning and Big Data technologies for IoT SecurityDeep Learning and Big Data technologies for IoT Security
Deep Learning and Big Data technologies for IoT Security
 
Confidential Computing in Edge- Cloud Hierarchy
Confidential Computing in Edge- Cloud HierarchyConfidential Computing in Edge- Cloud Hierarchy
Confidential Computing in Edge- Cloud Hierarchy
 
Survey on Optimization of IoT Routing Based On Machine Learning Techniques
Survey on Optimization of IoT Routing Based On Machine Learning TechniquesSurvey on Optimization of IoT Routing Based On Machine Learning Techniques
Survey on Optimization of IoT Routing Based On Machine Learning Techniques
 
A Survey of Cyber foraging systems: Open Issues, Research Challenges
A Survey of Cyber foraging systems: Open Issues, Research ChallengesA Survey of Cyber foraging systems: Open Issues, Research Challenges
A Survey of Cyber foraging systems: Open Issues, Research Challenges
 
Crypto Mechanism to Provide Secure to the IOT Data
Crypto Mechanism to Provide Secure to the IOT DataCrypto Mechanism to Provide Secure to the IOT Data
Crypto Mechanism to Provide Secure to the IOT Data
 
[IJCT V3I2P33] Authors: Karandeep Kaur
[IJCT V3I2P33] Authors: Karandeep Kaur[IJCT V3I2P33] Authors: Karandeep Kaur
[IJCT V3I2P33] Authors: Karandeep Kaur
 
A Review Paper on Emerging Areas and Applications of IoT
A Review Paper on Emerging Areas and Applications of IoTA Review Paper on Emerging Areas and Applications of IoT
A Review Paper on Emerging Areas and Applications of IoT
 
IRJET-Implementation of Threshold based Cryptographic Technique over Cloud Co...
IRJET-Implementation of Threshold based Cryptographic Technique over Cloud Co...IRJET-Implementation of Threshold based Cryptographic Technique over Cloud Co...
IRJET-Implementation of Threshold based Cryptographic Technique over Cloud Co...
 
IRJET- Multimedia Content Security with Random Key Generation Approach in...
IRJET-  	  Multimedia Content Security with Random Key Generation Approach in...IRJET-  	  Multimedia Content Security with Random Key Generation Approach in...
IRJET- Multimedia Content Security with Random Key Generation Approach in...
 
verifiable and multi-keyword searchable attribute-based encryption scheme for...
verifiable and multi-keyword searchable attribute-based encryption scheme for...verifiable and multi-keyword searchable attribute-based encryption scheme for...
verifiable and multi-keyword searchable attribute-based encryption scheme for...
 
IRJET- A Novel Framework for Three Level Isolation in Cloud System based ...
IRJET-  	  A Novel Framework for Three Level Isolation in Cloud System based ...IRJET-  	  A Novel Framework for Three Level Isolation in Cloud System based ...
IRJET- A Novel Framework for Three Level Isolation in Cloud System based ...
 
Anonymization of data using mapreduce on cloud
Anonymization of data using mapreduce on cloudAnonymization of data using mapreduce on cloud
Anonymization of data using mapreduce on cloud
 

More from SURESHA V

RM&IPR-21RMI56 - Module 1- by Dr. Suresha Vdf
RM&IPR-21RMI56 - Module 1- by Dr. Suresha VdfRM&IPR-21RMI56 - Module 1- by Dr. Suresha Vdf
RM&IPR-21RMI56 - Module 1- by Dr. Suresha VdfSURESHA V
 
Wc & lte 4 g module 4- 2019 by prof.sv1
Wc & lte 4 g  module 4- 2019 by prof.sv1Wc & lte 4 g  module 4- 2019 by prof.sv1
Wc & lte 4 g module 4- 2019 by prof.sv1SURESHA V
 
Wc & lte 4 g module 4- 2019 by prof.sv1
Wc & lte 4 g  module 4- 2019 by prof.sv1Wc & lte 4 g  module 4- 2019 by prof.sv1
Wc & lte 4 g module 4- 2019 by prof.sv1SURESHA V
 
WC and LTE 4G Broadband module 3- 2019 by Prof.Suresha V
WC and LTE 4G Broadband module 3- 2019 by Prof.Suresha VWC and LTE 4G Broadband module 3- 2019 by Prof.Suresha V
WC and LTE 4G Broadband module 3- 2019 by Prof.Suresha VSURESHA V
 
WC & LTE 4G Broadband Module 2- 2019 by Prof.Suresha V
WC & LTE 4G Broadband  Module 2- 2019 by Prof.Suresha VWC & LTE 4G Broadband  Module 2- 2019 by Prof.Suresha V
WC & LTE 4G Broadband Module 2- 2019 by Prof.Suresha VSURESHA V
 
WC and LTE 4G module 1- 2019 by Prof. Suresha V
WC and LTE 4G  module 1- 2019 by Prof. Suresha VWC and LTE 4G  module 1- 2019 by Prof. Suresha V
WC and LTE 4G module 1- 2019 by Prof. Suresha VSURESHA V
 
CCN -UNIT 1 PDF Notes for 7th EC
CCN -UNIT 1 PDF Notes for 7th ECCCN -UNIT 1 PDF Notes for 7th EC
CCN -UNIT 1 PDF Notes for 7th ECSURESHA V
 
Wc nots final unit new 8
Wc nots final unit new  8Wc nots final unit new  8
Wc nots final unit new 8SURESHA V
 
Wc nots final unit new 7
Wc nots final unit new  7Wc nots final unit new  7
Wc nots final unit new 7SURESHA V
 
Wireless communication, UNIT 3, EC students, 8th sem
Wireless communication, UNIT 3, EC students, 8th semWireless communication, UNIT 3, EC students, 8th sem
Wireless communication, UNIT 3, EC students, 8th semSURESHA V
 
Wirleless communicatrion notes for 8th sem EC -unit 2
Wirleless communicatrion notes for 8th sem EC -unit 2Wirleless communicatrion notes for 8th sem EC -unit 2
Wirleless communicatrion notes for 8th sem EC -unit 2SURESHA V
 
Wireless communication for 8th sem EC VTU students
Wireless communication for 8th sem EC VTU studentsWireless communication for 8th sem EC VTU students
Wireless communication for 8th sem EC VTU studentsSURESHA V
 
Ccn unit-2- data link layer by prof.suresha v
Ccn unit-2- data link layer by prof.suresha vCcn unit-2- data link layer by prof.suresha v
Ccn unit-2- data link layer by prof.suresha vSURESHA V
 
Ccn unit1-Prof .suresha v
Ccn unit1-Prof .suresha vCcn unit1-Prof .suresha v
Ccn unit1-Prof .suresha vSURESHA V
 
Ccn unit1 for 7th SEM EC by Prof. suresha V
Ccn unit1 for 7th SEM EC by Prof. suresha VCcn unit1 for 7th SEM EC by Prof. suresha V
Ccn unit1 for 7th SEM EC by Prof. suresha VSURESHA V
 

More from SURESHA V (15)

RM&IPR-21RMI56 - Module 1- by Dr. Suresha Vdf
RM&IPR-21RMI56 - Module 1- by Dr. Suresha VdfRM&IPR-21RMI56 - Module 1- by Dr. Suresha Vdf
RM&IPR-21RMI56 - Module 1- by Dr. Suresha Vdf
 
Wc & lte 4 g module 4- 2019 by prof.sv1
Wc & lte 4 g  module 4- 2019 by prof.sv1Wc & lte 4 g  module 4- 2019 by prof.sv1
Wc & lte 4 g module 4- 2019 by prof.sv1
 
Wc & lte 4 g module 4- 2019 by prof.sv1
Wc & lte 4 g  module 4- 2019 by prof.sv1Wc & lte 4 g  module 4- 2019 by prof.sv1
Wc & lte 4 g module 4- 2019 by prof.sv1
 
WC and LTE 4G Broadband module 3- 2019 by Prof.Suresha V
WC and LTE 4G Broadband module 3- 2019 by Prof.Suresha VWC and LTE 4G Broadband module 3- 2019 by Prof.Suresha V
WC and LTE 4G Broadband module 3- 2019 by Prof.Suresha V
 
WC & LTE 4G Broadband Module 2- 2019 by Prof.Suresha V
WC & LTE 4G Broadband  Module 2- 2019 by Prof.Suresha VWC & LTE 4G Broadband  Module 2- 2019 by Prof.Suresha V
WC & LTE 4G Broadband Module 2- 2019 by Prof.Suresha V
 
WC and LTE 4G module 1- 2019 by Prof. Suresha V
WC and LTE 4G  module 1- 2019 by Prof. Suresha VWC and LTE 4G  module 1- 2019 by Prof. Suresha V
WC and LTE 4G module 1- 2019 by Prof. Suresha V
 
CCN -UNIT 1 PDF Notes for 7th EC
CCN -UNIT 1 PDF Notes for 7th ECCCN -UNIT 1 PDF Notes for 7th EC
CCN -UNIT 1 PDF Notes for 7th EC
 
Wc nots final unit new 8
Wc nots final unit new  8Wc nots final unit new  8
Wc nots final unit new 8
 
Wc nots final unit new 7
Wc nots final unit new  7Wc nots final unit new  7
Wc nots final unit new 7
 
Wireless communication, UNIT 3, EC students, 8th sem
Wireless communication, UNIT 3, EC students, 8th semWireless communication, UNIT 3, EC students, 8th sem
Wireless communication, UNIT 3, EC students, 8th sem
 
Wirleless communicatrion notes for 8th sem EC -unit 2
Wirleless communicatrion notes for 8th sem EC -unit 2Wirleless communicatrion notes for 8th sem EC -unit 2
Wirleless communicatrion notes for 8th sem EC -unit 2
 
Wireless communication for 8th sem EC VTU students
Wireless communication for 8th sem EC VTU studentsWireless communication for 8th sem EC VTU students
Wireless communication for 8th sem EC VTU students
 
Ccn unit-2- data link layer by prof.suresha v
Ccn unit-2- data link layer by prof.suresha vCcn unit-2- data link layer by prof.suresha v
Ccn unit-2- data link layer by prof.suresha v
 
Ccn unit1-Prof .suresha v
Ccn unit1-Prof .suresha vCcn unit1-Prof .suresha v
Ccn unit1-Prof .suresha v
 
Ccn unit1 for 7th SEM EC by Prof. suresha V
Ccn unit1 for 7th SEM EC by Prof. suresha VCcn unit1 for 7th SEM EC by Prof. suresha V
Ccn unit1 for 7th SEM EC by Prof. suresha V
 

Recently uploaded

Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingrakeshbaidya232001
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxJoão Esperancinha
 
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝soniya singh
 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )Tsuyoshi Horigome
 
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerStudy on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerAnamika Sarkar
 
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).pptssuser5c9d4b1
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024hassan khalil
 
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSCAESB
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxwendy cai
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130Suhani Kapoor
 
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxupamatechverse
 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxAsutosh Ranjan
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escortsranjana rawat
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130Suhani Kapoor
 
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSMANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSSIVASHANKAR N
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile servicerehmti665
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 

Recently uploaded (20)

Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writing
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
 
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )
 
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerStudy on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
 
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024
 
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentation
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptx
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
 
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptx
 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptx
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
 
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSMANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile service
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 

IoT module 3- 22ETC15H-2022-23 by Dr.Suresha V1.pdf

  • 1. Introduction to Internet of Things (IoT) (Emerging Technology Course for 1st Year: VTU) Course Code: 22ETC15H/25H MODULE - 3 IoT Processing Topologies and Types Dr. SURESHA V Professor, Department of E&CE K.V.G. College of Engineering, Sullia, D.K-574 327
  • 2. Introduction to IoT (22ETC15H) - Module 3: IoT Processing Topologies &Types Dr. Suresha V, Professor, Dept. of E&C. K V G C E, Sullia, D.K-57432 Page 1 Module 3 IoT Processing Topologies &Types  Learning Outcomes After reading this Module, the student will be able to:  List common data types in IoT applications  Understand the importance of processing  Explain the various processing topologies in IoT  Understand the importance of processing offloading toward achieving scalability and cost-effectiveness of IoT solutions.  Determine the importance of choosing the right processing topologies and associated considerations while designing IoT applications  Determine the requirements that are associated with IoT-based processing of sensed and communicated data. Chapter 6: IoT Processing Topologies and Types (Textbook: Page 115-125)  Data Format: Structured data, Unstructured data.  Importance of Processing in IoT  Processing Topologies: On-site processing, Off-site processing.  IoT Device Design and Selection Considerations  Processing Offloading: - Offload location - Offload decision making - Offloading considerations Text Book: Sudip Misra, Anandarup Mukherjee, Arijit Roy, “Introduction to IoT”, Cambridge University Press 2021.
  • 3. Introduction to IoT (22ETC15H) - Module 3: IoT Processing Topologies &Types Dr. Suresha V, Professor, Dept. of E&C. K V G C E, Sullia, D.K-57432 Page 2 Chapter 6: IoT Processing Topologies and Types 6.1 Data Format: In an IoT system, a massive volume of data is generated by a huge number of diversified users. These data can be broadly grouped into TWO types based on how they can be accessed and stored: * 1. Structured data 2. Unstructured data 1. Structured data: Structured data is highly specific, typically text data, and is stored in a predefined format. Typical examples are product databases, contact lists, etc. These are primarily created by using length-limited data fields such as phone numbers, social security numbers, and other such information. Common usage of this type of data is associated with flight or train reservation systems, banking systems, inventory controls, and other similar systems. Languages such as Structured Query Language (SQL) are used for accessing these data in database management systems. 2. Unstructured data: These data types have no pre-defined structure and can vary according to applications and data-generating sources. Examples are documents, videos, audio files, posts on social media, and emails. In simple words, all the data on the internet is categorized as unstructured. Querying languages such as NoSQL are generally used for this data type. 6.2 Importance of Processing in IoT:*** Data processing is more crucial with the rapid advancements in IoT. Intelligent and resourceful processing techniques are required to process vast amounts and types of data flowing through the Internet. it is also important to decide when to process and what to process. We first divide the data to be processed into THREE types based on the urgency of processing: 1. Very time-critical data 2. Time critical data 3. Normal data 1. Very time-critical data: These data have a very low processing latency, typically in the range of a few milliseconds. Data from sources such as flight control systems, healthcare, etc need immediate decision support. Processing requirements are exceptionally high. Processing the data in place or nearer to the source is crucial.
  • 4. Introduction to IoT (22ETC15H) - Module 3: IoT Processing Topologies &Types Dr. Suresha V, Professor, Dept. of E&C. K V G C E, Sullia, D.K-57432 Page 3 2. Time-critical data: Data from sources that can tolerate normal processing latency are deemed as time-critical data. These data, generally associated with sources such as vehicles, traffic, smart home systems, surveillance systems, and others, can tolerate a latency of a few seconds. These data are to be processed in remote locations processors such as clouds. 3. Normal data: These data, can tolerate a processing latency of a few minutes to a few hours and are typically associated with less data-sensitive domains such as agriculture, environmental monitoring, and others. Typically have no particular time requirements for processing urgently. 6.3 Processing Topologies:*** The various processing solutions are divided into two large topologies: 1. On-site processing topologies 2. Off-site processing topologies: It further divides into i. Remote processing topologies ii. Collaborative processing topologies 1. On-site processing topologies: In this topology, the data is processed at the source itself. It is used in applications that have a very low tolerance for latencies. These latencies may result from the processing hardware or the network. Applications such as healthcare and flight control systems (real-time systems). The processing infrastructure is fast and robust enough to handle such data (See figure 6.2)
  • 5. Introduction to IoT (22ETC15H) - Module 3: IoT Processing Topologies &Types Dr. Suresha V, Professor, Dept. of E&C. K V G C E, Sullia, D.K-57432 Page 4 Figure 6.2 shows the on-site processing topology, where an event (here, fire) is detected utilizing a temperature sensor connected to a sensor node. The sensor node processes the information from the sensed event and generates an alert. The node additionally has the option of forwarding the data to a remote infrastructure for further analysis and storage. 2. Off-site processing: Here processing is not done at the source point. It allows for latencies and is significantly cheaper than on-site processing topologies. In this topology, the sensor node is responsible for the collection and framing of data to be transmitted to another location for processing. Simpler sensor node borrows processing from high processing enabled device to accomplish their task. Multiple nodes can come together to share their processing power to collaboratively process the data. It is divided into TWO types i. Remote processing: It is the most common processing topology used in present-day IoT solutions. It encompasses sensing data by various sensor nodes; the data is then forwarded to a remote server or a cloud-based infrastructure for further processing and analytics. Figure 6.3 shows the outline of one such paradigm, where the sensing of an event is performed locally, and the decision-making is outsourced to a remote processor.
  • 6. Introduction to IoT (22ETC15H) - Module 3: IoT Processing Topologies &Types Dr. Suresha V, Professor, Dept. of E&C. K V G C E, Sullia, D.K-57432 Page 5 o Advantages: - Massive cost and energy savings by enabling the reuse and reallocation of the same processing resource. - It ensures the massive scalability of solutions, without significantly affecting the cost of the deployment. o Drawback: - It requires a lot of network bandwidth - Need good network connectivity between the sensor nodes and the remote processing infrastructure. ii. Collaborative processing: Here Sensors cooperatively process data from multiple sources to serve a high-level task. It typically finds use in scenarios with limited or no network connectivity. Figure 6.4 shows the collaborative processing topology for collaboratively processing data locally. o Advantages: - This topology can be quite economical for large-scale deployments spread over vast areas where remote infrastructure is not viable. - This approach also reduces latencies due to the transfer of data over the network. - It conserves the bandwidth of the network, especially those connecting to the Internet. - This topology can be quite beneficial for applications such as agriculture. o Drawback: - This topology needs costlier mesh networks for implementation. Collaborative
  • 7. Introduction to IoT (22ETC15H) - Module 3: IoT Processing Topologies &Types Dr. Suresha V, Professor, Dept. of E&C. K V G C E, Sullia, D.K-57432 Page 6 6.4 IoT Device Design and Selection Considerations:***** The processor is the main factor for IoT device design and selection for various applications. Other important considerations to design an IoT device are 1. Size 2. Energy 3. Cost 4. Memory 5. Processing power 6. I/O rating 7. Add-ons 1. Size: Size and energy consumption are crucial factors of a sensor node. The larger the size factor consumes more energy. Additionally, large-size factors are not suitable for many IoT applications. 2. Energy: Energy efficient processor is the most important factor in designing IoT- based sensing solutions. The higher the energy requirements, the higher the battery replacement frequency. This principle is not a good option for IoT-based applications. 3. Cost: Cheaper cost of the hardware enables a much higher density of hardware deployment. For example, cheaper gas and fire detection solutions would enable users to include much more sensing hardware for a lesser cost. 4. Memory: devices with higher memory tend to be costlier. But features such as local data processing, data storage, data filtering, data formatting, and a host of other features rely heavily on the memory capabilities of devices. 5. Processing power: In deciding what type of sensors can be accommodated with the IoT device/node, and what processing features can integrate on-site. The processing power also decides the type of applications the device can be associated with. For example, if the application involves video or audio needs more processing power than other simple sensing IoT applications. 6. Input /output (I/O) rating: Primarily the processor, is the deciding factor in determining the circuit complexity, energy usage, and requirements for support of various sensing solutions and sensor types. Some processors have a meager I/O voltage rating of 3.3 V, as compared to 5 V for somewhat older processors. This
  • 8. Introduction to IoT (22ETC15H) - Module 3: IoT Processing Topologies &Types Dr. Suresha V, Professor, Dept. of E&C. K V G C E, Sullia, D.K-57432 Page 7 needs additional voltage and logic conversion circuitry and increases the cost and complexity of the node. 7. Add-ons: IoT device provides, such analog to digital conversion (ADC) units, connections to USB and ethernet, and inbuilt wireless access capabilities for various IoT applications. These add-ons also decide how fast a solution can be developed others helps in defining the robustness and usability of a processor or IoT devicein various application scenarios. 6.5 Processing Offloading: This technique in the IoT context is the transfer of resource-intensive computational tasks to a separate external device in the network. It is important for the development of densely deployable, energy-conserving, miniaturized, and cheap IoT-based solutions for sensing tasks. Figure 6.5 shows the typical outline of an IoT deployment with the various layers of processing that are encountered spanning vastly different application domains— from as near as sensing the environment to as far as cloud-based infrastructure. For the majority of IoT applications, the bulk of the processing is carried out remotely to keep the on-site devices simple, small, and economical.
  • 9. Introduction to IoT (22ETC15H) - Module 3: IoT Processing Topologies &Types Dr. Suresha V, Professor, Dept. of E&C. K V G C E, Sullia, D.K-57432 Page 8  The processing procedure is as follows: - For off-site processing, data from the sensing layer can be forwarded to the fog or cloud or contained within the edge layer. - The edge layer makes use of devices within the local network to process data that is similar to the collaborative processing topology as shown in fig 6.4 - Fog nodes are localized within a geographic area and serve the IoT node within a small coverage area. - Forwarding data to a cloud or a remote server requires the device to be connected to the internet.  Data offloading is divided into THREE parts: 1. Offload location: ( where all the processing can be offloaded in the IoT architecture) 2. Offload decision: (How to choose where to offload the processing to and by how much) 3. Offloading considerations: (Deciding when to offload) 1. Offload location: The choice of offload location decides the applicability, cost, and sustainability of the IoT application and deployment. The offload location into FOUR types: (a) Edge (b) Fog (c) Remote server (d) Cloud i. Edge: Offloading processing to the edge implies that the data processing is facilitated to a location at or near the source of data generation itself. ii. Fog: Fog computing is a decentralized computing infrastructure. The data, computing, storage, and applications are shifted to a place between the data source and the cloud resulting in significantly reduced latencies and network bandwidth usage. iii. Remote Server: A simple remote server with good processing power may be used with IoT-based applications to offload the processing from resource- constrained IoT devices. iv. Cloud: A cloud is provisioned for processing offloading so that processing resources can be rapidly provisioned with minimal effort over the Internet, which can be accessed globally. Cloud enables massive scalability of solutions.
  • 10. Introduction to IoT (22ETC15H) - Module 3: IoT Processing Topologies &Types Dr. Suresha V, Professor, Dept. of E&C. K V G C E, Sullia, D.K-57432 Page 9 2. Offload decision making: The choice of where to offload and how much to offload is addressed considering data generation rate, network bandwidth, the criticality of applications, processing resource available at the offload site, and other factors. Main three approaches are as follows. a) Naive Approach b) Bargaining-based approach c) Learning-based approach a. Naive Approach: This rule-based approach, in which the data from IoT devices are offloaded to the nearest location based on the achievement of certain offload criteria. Statistical measures are consulted for generating the rules. b. Bargaining-based approach: To maximize the quality of service(bandwidth, latencies) by reaching a point where the qualities of certain parameters are reduced, while the others are enhanced. QoS is achieved collaboratively for better full implementation. c. Learning-based approach: It relies on past behavior and trends of data flow through the IoT architecture. The optimization of QoS parameters is done by learning from historical trends and trying to optimize previous solutions further and enhance the collective behavior of the IoT implementation. 3. Offloading considerations:*** offloading parameters need to be considered while deciding upon the offloading type to choose arising from the nature of the IoT application and the hardware being used to interact with the application. These parameters are as follows. - Bandwidth - Latency - Criticality - Resources - Data volume  Bandwidth: The maximum amount of data that can be simultaneously transmitted over the network between two points. The bandwidth of a wired or wireless network is also considered to be its data-carrying capacity and often used to describe the data rate of that network.
  • 11. Introduction to IoT (22ETC15H) - Module 3: IoT Processing Topologies &Types Dr. Suresha V, Professor, Dept. of E&C. K V G C E, Sullia, D.K-57432 Page 10  Latency: It is the time delay between the start and completion of an operation, which is due to physical limitations of the infrastructure in the network or the processor which is associated with an operation.  Criticality: It defines importance of a task being pursued by an IoT application. The more critical a task is, the lesser latency is expected. For example, detection of fires using an IoT solution has higher criticality than detection of agricultural field parameters.  Resources: It signifies the actual capabilities(like processing power, the analytical algorithm, etc) of an offload location.  Data volume: The amount of data generated by a source or sources that can be simultaneously handled by the offload location. Typically, for large and dense IoT deployments, the offload location should be robust enough to address the processing issues related to massive data volumes.  Acknowledgment: My sincere thanks to the author Prof. Sudip Misra, because the above contents are prepared from his textbook “Introduction to IoT” published by Cambridge University Press 2021. Prepared by: Dr. Suresha V Principal & Professor Dept. of Electronics and Communication Engineering. Reach me at: suresha.vee@gmail.com WhatsApp: +91 8310992434