The document discusses the key concepts and technologies related to Internet of Things (IoT). It begins with defining IoT as connecting physical devices embedded with sensors to the internet and to each other. This allows the devices to collect and exchange data and be controlled remotely. The document then covers some of the main components that enable IoT including hardware, software, communication protocols, software platforms, and data analytics. It provides conceptual frameworks that illustrate how different elements work together from data gathering by sensors to data analysis in the cloud.
The Internet of things (IoT) is the extension of Internet connectivity into physical devices and everyday objects.
Presentation cover below topics
How IoT works ? IoT Key Components. Enabling technologies for IoT, IoT Connectivity , Technology Road Map. Iot architecture, How to Choose the Right IoT Platform,Benefits of IoT, IoT adoption barriers, Challenges for IoT security:
Other Challenges
In this presentation, Kavya Sree introduces the concept of IoT and associated trends. Kavya's interest lies in implementing Iot with sensors and IP network to improve the power supply of RFID devices.
The Internet of things (IoT) is the extension of Internet connectivity into physical devices and everyday objects.
Presentation cover below topics
How IoT works ? IoT Key Components. Enabling technologies for IoT, IoT Connectivity , Technology Road Map. Iot architecture, How to Choose the Right IoT Platform,Benefits of IoT, IoT adoption barriers, Challenges for IoT security:
Other Challenges
In this presentation, Kavya Sree introduces the concept of IoT and associated trends. Kavya's interest lies in implementing Iot with sensors and IP network to improve the power supply of RFID devices.
Thought Leadership Webinar - Internet of things (IoT): The Next Cyber Securit...ClicTest
We are in the age of Cybercrimes and just getting started with Internet of Things. There will be a huge demand for IoT as 50 billion connected devices will be deployed across the globe by 2020. These devices will communicate with each other where the web and the physical world will meet with different set of internet infrastructure and protocols. This in turn, will not only help us in saving money, but also provide us with more options.
Discussion Topics:
• The importance of IoT
• How will they impact in our everyday lives?
• Is Internet of Things Secure?
• Securing Internet of Things
But, the Tech buzz is all about: Security of Things (Security in the Internet of Things). How far these Internet of Things can be trusted? Can these IoT devices be hacked? How they have become the Next Cyber Security Target for hackers? How can we secure Internet of Things?
For more details, please visit www.clictest.com or drop us an email to info@clictest.com
The Internet of Things (IoT) is the network of physical objects or "things" embedded with electronics, software, sensors, and network connectivity, which enables these objects to collect and exchange data.
Forensics on the Internet of Things plays a vital role in the development of a much more secured IoT environment as the compromised nodes can be easily discovered so as the hacker who has done it.
Makers: Shubham Yadav, Aniket Dwivedi, Vedant Babade
presentation on internet of things (IOT) for seminar presentation and school projects.
included future of iot with its different application history and many more things.
In this presentation, Rushil introduces the topic of IoT and associated trends. His interest area lies implementing IoT devices that can help the small scale industries.
Advanced iot application training course Bryan Len
Price: $1,999.00
Length: 2 Days
The Internet of things (IoT) is the extension of Internet connectivity into physical devices and everyday objects.
Embedded with electronics, Internet connectivity, and other forms of hardware (such as sensors), these devices can communicate and interact with others over the Internet, and they can be remotely monitored and controlled
The course introduces you to advance concepts and design methodologies to design IoT systems. Application Protocols – HTTP, Web sockets, MQTT, CoAP, Understanding of cloud infrastructure, services, APIs, and architectures of commercial and industrial cloud platforms.
The number of things connected to the Internet and in use will grow 30 percent from this year to next, for a total of 4.9 billion, according to a new report from market research firm Gartner, and will hit over 25 billion by 2020. The IOT will have an very high economic impact.
Topics of Advanced IoT Application Training Course:
Concepts and definitions of The Internet of Things (IoT)
History of IoT
Applications
IoT standards
Requirements
Functionalists and structure
IoT enabling technologies
IoT architecture
Major components of IoT
Hardware, sensors, systems-on-a-chip, firmware, device drivers, application software, connectivity, cloud and security
Role of wired and wireless communication
IoT communication and networking protocols
IoT services and applications
Big data and analytics
Security
Cloud computing and the Internet of Things
Semantic Web 3.0 Standard for M2M and IoT
IoT Platforms
Challenges of adapting the concepts
Wireless 101
RF 101
ZigBee PRO, ZigBee 3.0 and ZigBee IP / 6LowPAN / RFID
Bluetooth and BLE (BT5.0) / Z-Wave
Home Automation (HA) Profile
Smart Energy (SE) Profile / Health Care
IEEE 802.15.4, IEEE 802.15.4e, 802.11ah
802.11ah, Wi-Fi HaLow
Relay Access Point (AP)
Grouping of stations
Target Wake Time (TWT)
Speed Frame Exchange / Sectorization
GSM, CDMA, GPRS,3G, LTE, small cells, SATCOM / LTE and 5G
Sensors and sensor networks / Serial communication
Power consumption and optimization
MIPI, M-PHY, UniPro, SPMI, BIF, SuperSpeed USB Inter-Chip (SSIC), Mobile PCIe (M-PCIe) and SPI
Wired connectivity / IPv4/IPv6/ Ethernet/GigE
Real-time systems and embedded software
Big data / Analytics
Cloud computing and storage
Augmented Reality
Request more information. Visit Tonex course link
https://www.tonex.com/training-courses/the_internet_of_things_training/
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...DanBrown980551
Do you want to learn how to model and simulate an electrical network from scratch in under an hour?
Then welcome to this PowSyBl workshop, hosted by Rte, the French Transmission System Operator (TSO)!
During the webinar, you will discover the PowSyBl ecosystem as well as handle and study an electrical network through an interactive Python notebook.
PowSyBl is an open source project hosted by LF Energy, which offers a comprehensive set of features for electrical grid modelling and simulation. Among other advanced features, PowSyBl provides:
- A fully editable and extendable library for grid component modelling;
- Visualization tools to display your network;
- Grid simulation tools, such as power flows, security analyses (with or without remedial actions) and sensitivity analyses;
The framework is mostly written in Java, with a Python binding so that Python developers can access PowSyBl functionalities as well.
What you will learn during the webinar:
- For beginners: discover PowSyBl's functionalities through a quick general presentation and the notebook, without needing any expert coding skills;
- For advanced developers: master the skills to efficiently apply PowSyBl functionalities to your real-world scenarios.
Thought Leadership Webinar - Internet of things (IoT): The Next Cyber Securit...ClicTest
We are in the age of Cybercrimes and just getting started with Internet of Things. There will be a huge demand for IoT as 50 billion connected devices will be deployed across the globe by 2020. These devices will communicate with each other where the web and the physical world will meet with different set of internet infrastructure and protocols. This in turn, will not only help us in saving money, but also provide us with more options.
Discussion Topics:
• The importance of IoT
• How will they impact in our everyday lives?
• Is Internet of Things Secure?
• Securing Internet of Things
But, the Tech buzz is all about: Security of Things (Security in the Internet of Things). How far these Internet of Things can be trusted? Can these IoT devices be hacked? How they have become the Next Cyber Security Target for hackers? How can we secure Internet of Things?
For more details, please visit www.clictest.com or drop us an email to info@clictest.com
The Internet of Things (IoT) is the network of physical objects or "things" embedded with electronics, software, sensors, and network connectivity, which enables these objects to collect and exchange data.
Forensics on the Internet of Things plays a vital role in the development of a much more secured IoT environment as the compromised nodes can be easily discovered so as the hacker who has done it.
Makers: Shubham Yadav, Aniket Dwivedi, Vedant Babade
presentation on internet of things (IOT) for seminar presentation and school projects.
included future of iot with its different application history and many more things.
In this presentation, Rushil introduces the topic of IoT and associated trends. His interest area lies implementing IoT devices that can help the small scale industries.
Advanced iot application training course Bryan Len
Price: $1,999.00
Length: 2 Days
The Internet of things (IoT) is the extension of Internet connectivity into physical devices and everyday objects.
Embedded with electronics, Internet connectivity, and other forms of hardware (such as sensors), these devices can communicate and interact with others over the Internet, and they can be remotely monitored and controlled
The course introduces you to advance concepts and design methodologies to design IoT systems. Application Protocols – HTTP, Web sockets, MQTT, CoAP, Understanding of cloud infrastructure, services, APIs, and architectures of commercial and industrial cloud platforms.
The number of things connected to the Internet and in use will grow 30 percent from this year to next, for a total of 4.9 billion, according to a new report from market research firm Gartner, and will hit over 25 billion by 2020. The IOT will have an very high economic impact.
Topics of Advanced IoT Application Training Course:
Concepts and definitions of The Internet of Things (IoT)
History of IoT
Applications
IoT standards
Requirements
Functionalists and structure
IoT enabling technologies
IoT architecture
Major components of IoT
Hardware, sensors, systems-on-a-chip, firmware, device drivers, application software, connectivity, cloud and security
Role of wired and wireless communication
IoT communication and networking protocols
IoT services and applications
Big data and analytics
Security
Cloud computing and the Internet of Things
Semantic Web 3.0 Standard for M2M and IoT
IoT Platforms
Challenges of adapting the concepts
Wireless 101
RF 101
ZigBee PRO, ZigBee 3.0 and ZigBee IP / 6LowPAN / RFID
Bluetooth and BLE (BT5.0) / Z-Wave
Home Automation (HA) Profile
Smart Energy (SE) Profile / Health Care
IEEE 802.15.4, IEEE 802.15.4e, 802.11ah
802.11ah, Wi-Fi HaLow
Relay Access Point (AP)
Grouping of stations
Target Wake Time (TWT)
Speed Frame Exchange / Sectorization
GSM, CDMA, GPRS,3G, LTE, small cells, SATCOM / LTE and 5G
Sensors and sensor networks / Serial communication
Power consumption and optimization
MIPI, M-PHY, UniPro, SPMI, BIF, SuperSpeed USB Inter-Chip (SSIC), Mobile PCIe (M-PCIe) and SPI
Wired connectivity / IPv4/IPv6/ Ethernet/GigE
Real-time systems and embedded software
Big data / Analytics
Cloud computing and storage
Augmented Reality
Request more information. Visit Tonex course link
https://www.tonex.com/training-courses/the_internet_of_things_training/
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...DanBrown980551
Do you want to learn how to model and simulate an electrical network from scratch in under an hour?
Then welcome to this PowSyBl workshop, hosted by Rte, the French Transmission System Operator (TSO)!
During the webinar, you will discover the PowSyBl ecosystem as well as handle and study an electrical network through an interactive Python notebook.
PowSyBl is an open source project hosted by LF Energy, which offers a comprehensive set of features for electrical grid modelling and simulation. Among other advanced features, PowSyBl provides:
- A fully editable and extendable library for grid component modelling;
- Visualization tools to display your network;
- Grid simulation tools, such as power flows, security analyses (with or without remedial actions) and sensitivity analyses;
The framework is mostly written in Java, with a Python binding so that Python developers can access PowSyBl functionalities as well.
What you will learn during the webinar:
- For beginners: discover PowSyBl's functionalities through a quick general presentation and the notebook, without needing any expert coding skills;
- For advanced developers: master the skills to efficiently apply PowSyBl functionalities to your real-world scenarios.
PHP Frameworks: I want to break free (IPC Berlin 2024)Ralf Eggert
In this presentation, we examine the challenges and limitations of relying too heavily on PHP frameworks in web development. We discuss the history of PHP and its frameworks to understand how this dependence has evolved. The focus will be on providing concrete tips and strategies to reduce reliance on these frameworks, based on real-world examples and practical considerations. The goal is to equip developers with the skills and knowledge to create more flexible and future-proof web applications. We'll explore the importance of maintaining autonomy in a rapidly changing tech landscape and how to make informed decisions in PHP development.
This talk is aimed at encouraging a more independent approach to using PHP frameworks, moving towards a more flexible and future-proof approach to PHP development.
UiPath Test Automation using UiPath Test Suite series, part 3DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 3. In this session, we will cover desktop automation along with UI automation.
Topics covered:
UI automation Introduction,
UI automation Sample
Desktop automation flow
Pradeep Chinnala, Senior Consultant Automation Developer @WonderBotz and UiPath MVP
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...UiPathCommunity
💥 Speed, accuracy, and scaling – discover the superpowers of GenAI in action with UiPath Document Understanding and Communications Mining™:
See how to accelerate model training and optimize model performance with active learning
Learn about the latest enhancements to out-of-the-box document processing – with little to no training required
Get an exclusive demo of the new family of UiPath LLMs – GenAI models specialized for processing different types of documents and messages
This is a hands-on session specifically designed for automation developers and AI enthusiasts seeking to enhance their knowledge in leveraging the latest intelligent document processing capabilities offered by UiPath.
Speakers:
👨🏫 Andras Palfi, Senior Product Manager, UiPath
👩🏫 Lenka Dulovicova, Product Program Manager, UiPath
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionAggregage
Join Maher Hanafi, VP of Engineering at Betterworks, in this new session where he'll share a practical framework to transform Gen AI prototypes into impactful products! He'll delve into the complexities of data collection and management, model selection and optimization, and ensuring security, scalability, and responsible use.
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™UiPathCommunity
In questo evento online gratuito, organizzato dalla Community Italiana di UiPath, potrai esplorare le nuove funzionalità di Autopilot, il tool che integra l'Intelligenza Artificiale nei processi di sviluppo e utilizzo delle Automazioni.
📕 Vedremo insieme alcuni esempi dell'utilizzo di Autopilot in diversi tool della Suite UiPath:
Autopilot per Studio Web
Autopilot per Studio
Autopilot per Apps
Clipboard AI
GenAI applicata alla Document Understanding
👨🏫👨💻 Speakers:
Stefano Negro, UiPath MVPx3, RPA Tech Lead @ BSP Consultant
Flavio Martinelli, UiPath MVP 2023, Technical Account Manager @UiPath
Andrei Tasca, RPA Solutions Team Lead @NTT Data
DevOps and Testing slides at DASA ConnectKari Kakkonen
My and Rik Marselis slides at 30.5.2024 DASA Connect conference. We discuss about what is testing, then what is agile testing and finally what is Testing in DevOps. Finally we had lovely workshop with the participants trying to find out different ways to think about quality and testing in different parts of the DevOps infinity loop.
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdfPeter Spielvogel
Building better applications for business users with SAP Fiori.
• What is SAP Fiori and why it matters to you
• How a better user experience drives measurable business benefits
• How to get started with SAP Fiori today
• How SAP Fiori elements accelerates application development
• How SAP Build Code includes SAP Fiori tools and other generative artificial intelligence capabilities
• How SAP Fiori paves the way for using AI in SAP apps
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf91mobiles
91mobiles recently conducted a Smart TV Buyer Insights Survey in which we asked over 3,000 respondents about the TV they own, aspects they look at on a new TV, and their TV buying preferences.
UiPath Test Automation using UiPath Test Suite series, part 4DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 4. In this session, we will cover Test Manager overview along with SAP heatmap.
The UiPath Test Manager overview with SAP heatmap webinar offers a concise yet comprehensive exploration of the role of a Test Manager within SAP environments, coupled with the utilization of heatmaps for effective testing strategies.
Participants will gain insights into the responsibilities, challenges, and best practices associated with test management in SAP projects. Additionally, the webinar delves into the significance of heatmaps as a visual aid for identifying testing priorities, areas of risk, and resource allocation within SAP landscapes. Through this session, attendees can expect to enhance their understanding of test management principles while learning practical approaches to optimize testing processes in SAP environments using heatmap visualization techniques
What will you get from this session?
1. Insights into SAP testing best practices
2. Heatmap utilization for testing
3. Optimization of testing processes
4. Demo
Topics covered:
Execution from the test manager
Orchestrator execution result
Defect reporting
SAP heatmap example with demo
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Securing your Kubernetes cluster_ a step-by-step guide to success !KatiaHIMEUR1
Today, after several years of existence, an extremely active community and an ultra-dynamic ecosystem, Kubernetes has established itself as the de facto standard in container orchestration. Thanks to a wide range of managed services, it has never been so easy to set up a ready-to-use Kubernetes cluster.
However, this ease of use means that the subject of security in Kubernetes is often left for later, or even neglected. This exposes companies to significant risks.
In this talk, I'll show you step-by-step how to secure your Kubernetes cluster for greater peace of mind and reliability.
Epistemic Interaction - tuning interfaces to provide information for AI supportAlan Dix
Paper presented at SYNERGY workshop at AVI 2024, Genoa, Italy. 3rd June 2024
https://alandix.com/academic/papers/synergy2024-epistemic/
As machine learning integrates deeper into human-computer interactions, the concept of epistemic interaction emerges, aiming to refine these interactions to enhance system adaptability. This approach encourages minor, intentional adjustments in user behaviour to enrich the data available for system learning. This paper introduces epistemic interaction within the context of human-system communication, illustrating how deliberate interaction design can improve system understanding and adaptation. Through concrete examples, we demonstrate the potential of epistemic interaction to significantly advance human-computer interaction by leveraging intuitive human communication strategies to inform system design and functionality, offering a novel pathway for enriching user-system engagements.
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
IoT R19 unit 1.pdf
1. Internet of Things M.kaivalya
Aditya College of Engineering & Technology
UNIT-1
Internet of things
M.KAIVALYA, M.Tech
Assistant Professor
Department of Electronics and Communication Engineering
Aditya College of Engineering & Technology
Email: kaivalya.mathamsetti@acet.ac.in
2. Internet of Things M.kaivalya
Aditya College of Engineering & Technology
CONTENTS
Introduction to IoT
Architectural Overview
Design principles and needed capabilities
Basics of Networking
M2M and IoT Technology Fundamentals
Devices and gateways
Data management
Business processes in IoT
Everything as a Service (XaaS)
Role of Cloud in IoT,
Security aspects in IoT.
3. Internet of Things M.kaivalya
Aditya College of Engineering & Technology
Introduction
Internet of Things : Definition
IoT Vision
Examples
4. Internet of Things M.kaivalya
Aditya College of Engineering & Technology
“Internet” Definition
Internet
• A vast global network of connected servers, clouds,
computers, tablets, mobiles, devices and systems
• Uses the Internationally used protocols and connecting
systems.
5. Internet of Things M.kaivalya
Aditya College of Engineering & Technology
“Internet” Usages
• Enables sending, receiving, or communicating the information,
messages, alerts, ……
• Between devices, sensors, servers Cloud services, applications,
business processes……
6. Internet of Things M.kaivalya
Aditya College of Engineering & Technology
“Things” Definition
• Thing refers to a physical object, an action, idea, situation or
activity, in case when we need not be precise.
7. Internet of Things M.kaivalya
Aditya College of Engineering & Technology
Internet of Things- Wikipedia Definition
• The network of physical objects or "things" embedded with
electronics, software, sensors.
• Connected so as to enable achieving greater value and offer
service by exchanging data with the manufacturer, operator and/or
other connected devices
• Each thing uniquely identifiable
• Things embedded with sensors and computing system
• Able to interoperate within the existing Internet
infrastructure
8. Internet of Things M.kaivalya
Aditya College of Engineering & Technology
“Internet of Things” extends Internet uses
• Internet of Things (IoT) extends the uses of Internet by
providing the communication, and thus inter-network of the
physical objects, devices, machines,vehicles; all referred as
“things”.
9. Internet of Things M.kaivalya
Aditya College of Engineering & Technology
Start of “Internet of Things” Concept Development
• Concept of IoT started with things with the communicating
devices for the identity, called RFIDs
• RFIDs connect to Internet
• RFID- Radio Frequency Identification
10. Internet of Things M.kaivalya
Aditya College of Engineering & Technology
“Internet of Things” Devices Concept
• Connected devices could be tracked, controlled or
monitored using remote computers, Applications,
Business Processes,…….
11. Internet of Things M.kaivalya
Aditya College of Engineering & Technology
Smart Devices
• Embedded devices with computing and communicating
capabilities
13. 20
Smart Hyper-connected Devices
Hyper connectivity:
• ‘use of multiple systems and devices to remain constantly
connected to networks, social networks and streams of
information’.
• Smart devices constantly connect to networks
• For example, a streetlights network constantly connected to a
central controlling station/server.
14. 21
IoTs Vision
• A vision where things (wearable, watch, alarm clock,
home devices, surrounding objects with) become smart
and behave alive through sensing, computing and
communicating systems
• A vision where embedded devices interact with remote
objects or persons through connectivity, for examples,
using Internet or Near Field Communication or other
technologies.
15. Internet of Things M.kaivalya
Aditya College of Engineering & Technology
Origin of Terminology:
In the 2000’s, we are heading into a new era of ubiquity, where the “users” of the
Internet will be Counted in billions and where humans may become the minority as
generators and receivers of traffic. Instead, most of the traffic will flow between devices
and all kinds of “things”, thereby creating a much wider and more complex Internet of
Things
16. Internet of Things M.kaivalya
Aditya College of Engineering & Technology
The title of the report was “Internet of Things”
Discussed the possibility of Internet connected M2M connectivity networks,
extending to common household devices
Some areas identified as IoT enablers:
• RFID,
•Nanotechnology
•Sensors
•Smart Networks
17. Internet of Things M.kaivalya
Aditya College of Engineering & Technology
Business/Manufacturing
•Real-time analytics of supply chains and equipment, robotic machinery.
Healthcare
• portable health monitoring, electronic record keeping, pharmaceutical safeguards.
Retail
• Inventory tracking, smart phone purchasing, anonymous analytics of consumer choices.
Security
•Biometric and facial recognition locks, remote sensors
18. Internet of Things M.kaivalya
Aditya College of Engineering & Technology
Characteristics:
Efficient, scalable and associated architecture
Unambiguous naming and addressing
Abundance of sleeping nodes, mobile and non –IP devices
Intermittent connectivity
19. Internet of Things M.kaivalya
Aditya College of Engineering & Technology
20. Internet of Things M.kaivalya
Aditya College of Engineering & Technology
21. Internet of Things M.kaivalya
Aditya College of Engineering & Technology
22. Internet of Things M.kaivalya
Aditya College of Engineering & Technology
23. Internet of Things M.kaivalya
Aditya College of Engineering & Technology
24. Internet of Things M.kaivalya
Aditya College of Engineering & Technology
25. Internet of Things M.kaivalya
Aditya College of Engineering & Technology
26. Internet of Things M.kaivalya
Aditya College of Engineering & Technology
27. Internet of Things M.kaivalya
Aditya College of Engineering & Technology
28. Internet of Things M.kaivalya
Aditya College of Engineering & Technology
IoT Resulting in Address Crunch
Estimated 20-50 billion devices by 2024
Reason is the integration of existing devices, smart devices as well as constrained
nodes in a singular framework.
Integration of various connectivity features such as cellular, Wi-Fi, Ethernet with
upcoming ones such as Bluetooth Low Energy (BLE), DASH7, Insteon, IEEE
802.15.4, etc.
29. Internet of Things M.kaivalya
Aditya College of Engineering & Technology
30. Internet of Things M.kaivalya
Aditya College of Engineering & Technology
31. Internet of Things M.kaivalya
Aditya College of Engineering & Technology
Internet of Things– Conceptual Frameworks
and Architecture
• Physical Object + Controller, Sensor and Actuators +
Internet = Internet of Things … (1.1)
• Source: An equation given by Adrian McEwen and
Hakim Cassimally, ‘Designing Internet of things’,
Wiley, 2014
32. Internet of Things M.kaivalya
Aditya College of Engineering & Technology
Another IoT Conceptual Architecture
• Gather + Enrich + Stream + Manage + Acquire + organize and
Analyze = Internet of Things Enterprise & Business Applications,
Integration … (1.2)
[An Equation based on Oracle IoT Architecture in Fig. 1.5 of
book]
33. Comm.
Mgmt
Stream
Gateway
Smart Sensor
Sensor
Application
Framework
IoT Comm.
Framework
Application
Framework
IoTComm.
Framework
Application
Framework
IoTComm. &
Mgmt Proxy
IoTComm.
Framework
Gather Enrich
Protocol
Handlers
Message
Router
Message
Cache
Device
Identity
Mgmt &
access
Mgmt.
Network
Network
Internet
Firewall
Device
Identity
Database
Device
Access
Mgmt
Device
Indentit y
Mgmt
Device
Mgmt.
Manage Acquire
Database
Firewall
Data Routing
&
Analysis
Mgmt.
Organize
and
Analyse
Enterprise
Integration
Database
RDBMS
Data
Centre
Mgmt.
Business
Intelligence
Server
Mgmt
Big
Data
Store
Key Value
Data Store
7
FigurePu1bl.s5.:M
Oc
G
rr
a
aw
c-
H
li
el
l
’E
sd
u
Ic
oa
t
i
To
nArchitecture
34. Internet of Things M.kaivalya
Aditya College of Engineering & Technology
Another IoT Conceptual Framework
• Gather + Consolidate + Connect + Collect + Assemble +
Manage and Analyze = Internet of Things
connected to Cloud Services … (1.3) [An Equation based on
the IBM Framework.
35. Comm.
Mgmt
Gateway
Smart Sensor
Sensor
Sensor
Application
Framework
IoT Comm.
Framework
Application
Framework
IoT Comm.
Framework
Data Consoli-
dation
Framework
IoT Comm.
Framework
Sensors Gather
Gateway
Data
consolidation
Protocol
Handlers
MQTT
Message
Router
Message
Cache
Informix
Time series
service
Network
Network
Internet
Firewall
Device
Register
and
connect
Manage
a time-
series
view of
data
Manage
connections
and
Subscriptions
Assemble
events
from
the
IoT
into
logic
flows.in
Database
i
l
l
a
w
e r
F
Spatial Storage
and Real Time
Analytics
Mgmt.
Consumer/Business
Relational
Time Series
service
In-memory
Analytics and
Intelligence
Big
Data
Store
NoSQL
Data
Centre
Mgmt.
Server
Mgmt
Message
Sight
Publish/
Subscrib
e
Collect
from
things.
Connect + Collect + Assemble +Manage
,
5
CH01 Fig. 1u
3b
l
s
I.
:
BM
Mc
G
r
a
w
I-
oH
Ti
l
lE
Cd
u
oc
nt
i
o
cn
eptualFramework
Cloud
Infrastructure
36. 6
Level 7- Collaboration and processes (involving peoples and business
processes)
Level 6- Application (Reporting, Analysis, control)
Level 5- Data Abstraction (Aggregation and Access)
Level 4- Data Accumulation (storage)
Level 3- Edge Computing (data element analysis and transformation)
Level 2- Connectivity (Communication and Processing Units)
Level 1- Physical devices and Controllers (the things in IoT) [Sensors, machines, devices,
Intelligent Edge nodes of Different Types
Ch01Fig. 1.4 An IC
Oh
a
Tp
t
e
rr
-
e1
L
f0
e2
r:
e"
I
nn
t
ce
r
en
e
t
mo
foT
h
di
n
eg
ls"
C,R
Ia
SjKCamOal,conceptualframework
38. M.kaivalya
Technology Behind the IoT
1.Hardware
2.Integrated development environment (IDE) and
Software
3.a. Embedded Devices/M2M Communication Protocols
b. Network Protocols
4.Software Platforms
5.a. Analyzing and Visualizing
b. Analytics & Machine Learning
39. M.kaivalya
1. Hardware
• Embedded Devices
• Embedded hardware/software with Sensors/Actuators
• Hardware (Arduino Raspberry Pi, Intel Edison, mBed,
Beagle Bone Black and Wireless SoC, …..)
43. M.kaivalya
5a. Analyzing and Visualizing
• Analyzing data, streaming data, events streaming data
• Descriptive, Prescriptive and Predictive Analytics
• Data Visualization
5b. Analytics & Machine Learning
• Learning ability to learn continuously from data, and the ability to drive
actions/Applications/Business Processes
• Machine learning algorithms, for example, GROK from Numenta Inc.
44. M.kaivalya
Design Principles and Needed Capabilities
The overall design objective of IoT architecture shall be to target a horizontal system of real-
world services that are open, service-oriented, secure, and offer trust.
Design for reuse of deployed IoT resources across application domains.
Design for a set of support services that provide open service-oriented capabilities and can be
used for application development and execution.
Design for different abstraction levels that hide underlying complexities and heterogeneities.
Design for sensing and actuators taking on different roles of providing and using services
across different business domains and value chains.
45. M.kaivalya
Design Principles and Needed Capabilities cntd…….
Design for ensuring trust, security, and privacy.
Design for scalability, performance, and effectiveness.
Design for evolvability, heterogeneity, and simplicity of integration.
Design for simplicity of management.
Design for different service delivery models.
Design for lifecycle support. The lifecycle phases are: planning, development,
deployment, and execution. Management aspects include deployment efficiency,
design time tools, and run-time management.
48. M.kaivalya
Functional components of IoT:
Component for interaction and communication with other IoT devices
Component for processing and analysis of operations.
Component for internet interaction.
Components for handling Web services of applications.
Component to integrate application services.
User interface to access IoT.
51. M.kaivalya
IoT Categories
Industrial IoT
•IoT device connects to an IP network and the glot .
•Communication between the nodes done using regular as well as industry specific
technologies.
Consumer IoT
•IpT device communicates within the locally networked devices.
•Local communication is done mainly bluetooth, Zigbee or wifi.
•Generally limited to local communication by a Gateway.
53. M.kaivalya
Considerations:
Communication between the IoT device(s) and the outside world dictates
the network architecture.
Choice of communication technology dictates the IoT device hardware
requirements and costs
Due to the presence of numerous applications of IoT enabled device, a
single networking paradigm not suffiecient
to address all the needs of the consumer or the IoT device
54. M.kaivalya
Complexity of networks
Growth of networks
Interference among devices
Network management
Heterogeneity in networks
Protocol standardization within networks
55. M.kaivalya
Wireless networks
Traffic and load management
Variations in wireless networks-Wireless body Area
networks and other personal area networks
Interoperability
Network management
Overlay networks
56. Internet of Things M.kaivalya
Aditya College of Engineering & Technology
Internet of Things– Conceptual Frameworks
and Architecture
• Physical Object + Controller, Sensor and Actuators +
Internet = Internet of Things … (1.1)
• Source: An equation given by Adrian McEwen and
Hakim Cassimally, ‘Designing Internet of things’,
Wiley, 2014
57. Internet of Things M.kaivalya
Aditya College of Engineering & Technology
Another IoT Conceptual Architecture
• Gather + Enrich + Stream + Manage + Acquire + organize and
Analyze = Internet of Things Enterprise & Business Applications,
Integration … (1.2)
[An Equation based on Oracle IoT Architecture in Fig. 1.5 of
book]
58. Comm.
Mgmt
Stream
Gateway
Smart Sensor
Sensor
Application
Framework
IoT Comm.
Framework
Application
Framework
IoTComm.
Framework
Application
Framework
IoTComm. &
Mgmt Proxy
IoT Comm.
Framework
Gather Enrich
Protocol
Handlers
Message
Router
Message
Cache
Device
Identity
Mgmt &
access
Mgmt.
Network
Network
Internet
Firewall
Device
Identity
Database
Device
Access
Mgmt
Device
Indentit y
Mgmt
Device
Mgmt.
Manage Acquire
Database
Firewall
Data Routing
&
Analysis
Mgmt.
Organize
and
Analyse
Enterprise
Integration
Database
RDBMS
Data
Centre
Mgmt.
Business
Intelligence
Server
Mgmt
Big
Data
Store
Key Value
Data Store
7
FigurePu1bl.s5.:M
Oc
G
rr
a
aw
c-
H
li
el
l
’E
sd
u
Ic
oa
t
i
To
nArchitecture
59. Internet of Things M.kaivalya
Aditya College of Engineering & Technology
Another IoT Conceptual Framework
• Gather + Consolidate + Connect + Collect + Assemble +
Manage and Analyze = Internet of Things
connected to Cloud Services … (1.3) [An Equation based on
the IBM Framework.
60. Comm.
Mgmt
Gateway
Smart Sensor
Sensor
Sensor
Application
Framework
IoT Comm.
Framework
Application
Framework
IoT Comm.
Framework
Data Consoli-
dation
Framework
IoT Comm.
Framework
Sensors Gather
Gateway
Data
consolidation
Protocol
Handlers
MQTT
Message
Router
Message
Cache
Informix
Time series
service
Network
Network
Internet
Firewall
Device
Register
and
connect
Manage
a time-
series
view of
data
Manage
connections
and
Subscriptions
Assemble
events
from
the
IoT
into
logic
flows.in
Database
i
l
l
a
w
e r
F
Spatial Storage
and Real Time
Analytics
Mgmt.
Consumer/Business
Relational
Time Series
service
In-memory
Analytics and
Intelligence
Big
Data
Store
NoSQL
Data
Centre
Mgmt.
Server
Mgmt
Message
Sight
Publish/
Subscrib
e
Collect
from
things.
Connect + Collect + Assemble +Manage
,
5
CH01 Fig. 1u
3b
l
s
I.
:
BM
Mc
G
r
a
w
I-
oH
Ti
l
lE
Cduoc
nt
i
ocn
eptualFramework
Cloud
Infrastructure
61. 6
Level 7- Collaboration and processes (involving peoples and business
processes)
Level 6- Application (Reporting, Analysis, control)
Level 5- Data Abstraction (Aggregation and Access)
Level 4- Data Accumulation (storage)
Level 3- Edge Computing (data element analysis and transformation)
Level 2- Connectivity (Communication and Processing Units)
Level 1- Physical devices and Controllers (the things in IoT) [Sensors, machines, devices,
Intelligent Edge nodes of Different Types
Ch01Fig. 1.4 An IC
Oh
a
Tp
t
e
rr
-
e1
L
f0
e2
r:
e"
I
nn
t
ce
r
en
e
t
mo
foT
h
di
n
eg
ls"
C,R
Ia
SjKCamOal,conceptualframework
63. M.kaivalya
They are the physical devices, also called as “THINGS” in IOT .
Basically they are Embedded Devices, Embedded hardware/software like
Sensors/Actuators , RFID, Hardware (Arduino, Raspberry Pi, Intel Edison, Beagle
Bone Black and Wireless SoC…).
They are ready to send and receive the information.
Devices are unlimited, diverse and no rules about the size, location etc….
Devices are capable of Analog to digital conversion and vice versa.
IoT Reference Model Cntd…..
LAYER 1. Physical devices and controllers.
64. M.kaivalya
LAYER 2. Connectivity (Communication and processing units) Processing Units:
Processing Units:
Contains Routers and Gateways
Main task is to deliver the right information at right time and to right machine i.e. reliable transmission.
Communication:
Includes protocol handlers, message routers, message cache
It can be between smart device and network/ internet directly
It can be through gateways then to network
Therefore main task involves switching and routing, enriching, transcoding, translation between
protocols, security and self learning etc.
Communication occurs networks –EAST-WEST communication
65. M.kaivalya
Layer 3 [Edge Computing Or Fog Computing]
Edge computing is an architecture that uses edge devices / network edge like routers,
gateways, switches, multiplexers, integrated access devices to do some preprocessing
of data.
Preprocessing includes data aggregation, storage, data filtering, cleanup, analysis,
transformation (formatting, decoding, distillation) , Threshold(alert), event
generation etc.
Finally the data is routed to web servers/cloud.
66. M.kaivalya
Layer 4 [Data Accumulation and storage]
Data management is done at backend server/cloud or data base centers
Main roles of layer 4 are:
Convert data in motion to data at rest.
Convert format from network packets to database relational tables.
Convert Event based data to query based data (it bridges the gap between real time
networking and non real time)
The concept of BIG DATA is used at layer 4.
67. M.kaivalya
Layer 5 Data Abstraction
Data abstraction is done at backend server/cloud or data base centres
Abstraction means providing the essential and relevant information of the data by hiding the
irrelevant one.
Main roles are:
1)Provide multiple storage systems to accommodate data from different IOT devices.
2)Reconciling multiple data format from different sources.
3)Combining data from multiple sources and simplifying the application i.e consolidating the data into one
place.
4)Filtering, selecting, projecting and reformatting the data to serve client application.
5)Protecting the data with appropriate authentication and authorization.
68. M.kaivalya
Layer 6 Application
Layer 6 deals with reporting, analysis and control
i.e. the data is analyzed and then send to controlling device like actuator.
And then the data is passed to specific application like mobile application or
webpage or to the business enterprise which require that data.
69. M.kaivalya
Layer 7 Collaboration and processes.
It means involving people and business process.
Basically multiple people are using same applications for a range of different purpose
But in IOT the main objective is to empower people to do their work better, not the
application.
70. M.kaivalya
Architectural Overview
An architecture can be described in several different views to capture
specific properties that are of relevance to model, and the views chosen in
are
Functional view (Logical view): Description of what the system does, and
its main functions.
Deployment view (Physical view): Description of the main real-world
components of the system such as devices, network routers, servers, etc.
71. M.kaivalya
Architectural Overview Cntd…
Process view (Behavioral view): deals with the dynamic aspects of the
system, explains the system processes and how they communicate, and
focuses on the run time behavior of the system.
Implementation view (Development view): Used to capture the
architectural decisions made for the implementation.
Scenarios (use case diagram): in which your system or application
interacts with people, organizations, or external systems.
72. M.kaivalya
Design Principles and Needed Capabilities
The overall design objective of IoT architecture shall be to target a horizontal system of real-
world services that are open, service-oriented, secure, and offer trust.
Design for reuse of deployed IoT resources across application domains.
Design for a set of support services that provide open service-oriented capabilities and can be
used for application development and execution.
Design for different abstraction levels that hide underlying complexities and heterogeneities.
Design for sensing and actuators taking on different roles of providing and using services
across different business domains and value chains.
73. M.kaivalya
Design Principles and Needed Capabilities cntd…….
Design for ensuring trust, security, and privacy.
Design for scalability, performance, and effectiveness.
Design for evolvability, heterogeneity, and simplicity of integration.
Design for simplicity of management.
Design for different service delivery models.
Design for lifecycle support. The lifecycle phases are: planning, development,
deployment, and execution. Management aspects include deployment
efficiency, design time tools, and run-time management.
74. Internet of Things M.kaivalya
Aditya College of Engineering & Technology
M2M And IoT Technology Fundamentals
Devices and Gateways
Device:
A device is a hardware unit that can sense aspects of it’s environment and/or actuate,
i.e. perform tasks in its environment.
A device can be characterized as having several properties, including:
• Microcontroller: 8-, 16-, or 32-bit working memory and storage.
• Power Source: Fixed battery, energy harvesting, or hybrid.
• Sensors and Actuators: Onboard sensors and actuators, or circuitry that allows
them to be connected, sampled, conditioned, and controlled.
• Communication: Cellular, wireless, or wired for LAN and WAN communication.
75. Internet of Things M.kaivalya
Aditya College of Engineering & Technology
Types of devices
1. Basic Devices
2. Advanced Devices
Basic Devices
Devices that only provide the basic services of sensor readings and/or
actuation tasks, and in some cases limited support for user interaction.
LAN communication is supported via wired or wireless technology, thus a
gateway is needed to provide the WAN connection.
76. Internet of Things M.kaivalya
Aditya College of Engineering & Technology
These devices are often intended for a single purpose, such as measuring
air pressure or closing a valve. I
In some cases several functions are deployed on the same device, such as
monitoring humidity, temperature, etc,.
Another common goal is to enable battery as a power source, with a
lifespan of a year and upwards by using ultra-low energy microcontrollers.
77. Internet of Things M.kaivalya
Aditya College of Engineering & Technology
Advanced devices
In this case the devices also host the application logic and a WAN connection. They
may also feature device management and an execution environment for hosting
multiple applications. Gateway devices are most likely to fall into this category.
A powerful CPU or microcontroller with enough memory and storage to host advanced
applications, such as a printer offering functions for copying, faxing, printing, and
remote management.
A more advanced user interface with, for example, display and advanced user input in
the form of a keypad or touch screen.
Video or other high bandwidth functions.
78. Internet of Things M.kaivalya
Aditya College of Engineering & Technology
Gate ways:
A gateway serves as a translator between different protocols, e.g.
between IEEE 802.15.4 or IEEE 802.11, to Ethernet or cellular.
There are many different types of gateways, which can work on different
levels in the protocol layers.
A gateway refers to a device that performs translation of the physical and
link layer, but application layer gateways (ALGs) are also common.
79. Internet of Things M.kaivalya
Aditya College of Engineering & Technology
Some examples of ALGs include the ZigBee Gateway Device which
translates from ZigBee to SOAP and IP, or gateways that translate from
Constrained Application Protocol (CoAP) to Hyper Text Transfer
Protocol/Representational State Transfer (HTTP/REST).
The gateway device is also used for many other tasks, such as data
management, device management, and local applications.
80. Internet of Things M.kaivalya
Aditya College of Engineering & Technology
Typical functions for data management include performing sensor readings and caching
this data, as well as filtering, concentrating, and aggregating the data before transmitting
it to back-end servers.
Device management (DM) is an essential part of the IoT and provides efficient means
to perform many of the management tasks for devices:
• Provisioning: Initialization (or activation) of devices in regards to configuration and
features to be enabled.
• Device Configuration: Management of device settings and parameters.
• Software Upgrades: Installation of firmware, system software, and applications on
the device.
81. Internet of Things M.kaivalya
Aditya College of Engineering & Technology
Local applications
Examples of local applications that can be hosted on a gateway include
closed loops, home alarm logic, and ventilation control, etc,..
82. Internet of Things M.kaivalya
Aditya College of Engineering & Technology
DATA MANAGEMENT
Introduction
In the era of M2M, where billions of devices interact and generate data at exponential
growth rates, data management is of critical importance as it sets the basis upon which
any other processes can rely and operate
Some of the key characteristics of M2M data include:
• Big Data: Huge amounts of data are generated, capturing detailed aspects of the
processes where devices are involved.
• Heterogeneous Data: The data is produced by a huge variety of devices and is itself
highly heterogeneous, differing on sampling rate, quality of captured values, etc.
83. Internet of Things M.kaivalya
Aditya College of Engineering & Technology
Real-world data
Real-time data
Temporal data
Spatial data
Polymorphic data
Proprietary data
Security and privacy data aspects
84. Internet of Things M.kaivalya
Aditya College of Engineering & Technology
Business Process in IoT
Introduction
A business process refers to a series of activities, often a collection of interrelated
processes in a logical sequence, within an enterprise, leading to a specific result.
There are several types of business processes such as management, operational, and
supporting, all of which aim at achieving a specific mission objective.
As business processes usually span several systems and may get very complex, several
methods and techniques have been developed for their modeling, such as the Business
Process Model and Notation (BPMN), which graphically represents business processes
in a business process model.
85. Internet of Things M.kaivalya
Aditya College of Engineering & Technology
86. Internet of Things M.kaivalya
Aditya College of Engineering & Technology
IoT integration with enterprise systems
M2M communication and the vision of the IoT pose a new era where billions of devices
will need to interact with each other and exchange information in order to fulfill their
purpose.
In Figure, cross-layer interaction and cooperation can be pursued:
• At the M2M level, where the machines cooperate with each other (machine-focused
interactions)
• At the machine-to-business (M2B) layer, where machines cooperate also with
network-based services, business systems (business service focus), and applications.
87. Internet of Things M.kaivalya
Aditya College of Engineering & Technology
88. Internet of Things M.kaivalya
Aditya College of Engineering & Technology
Distributed business processes in IoT
89. Internet of Things M.kaivalya
Aditya College of Engineering & Technology
The first step is to minimize communication with enterprise systems to only what is
relevant for business.
With the increase in resources (e.g. computational capabilities) in the network, and
especially on the devices themselves (more memory, multi-core CPUs, etc.), it
makes sense not to host the intelligence and the computation required for it only on
the enterprise side, but actually distribute it on the network, and even on the edge
nodes (i.e. the devices themselves), as depicted on the right side of Figure 5.9.
90. Internet of Things M.kaivalya
Aditya College of Engineering & Technology
Everything As A Service(XaaS)
Cloud computing is a model for enabling ubiquitous, on-demand network access to
a shared pool of configurable computing resources (e.g. networks, servers, storage,
applications, and services) that can be provisioned, configured, and made available with
minimal management effort or service provider interaction.
All applications need access to three things: compute, storage, and data processing
capacities.
With cloud computing, a fourth element is added _ distribution services _ i.e. the
manner in which the data and computational capacity are linked together and
coordinated.
91. Internet of Things M.kaivalya
Aditya College of Engineering & Technology
92. Internet of Things M.kaivalya
Aditya College of Engineering & Technology
Characteristics of cloud computing
On-Demand Self-Service
A consumer can unilaterally provision computing capabilities, such as server time and
network storage, as needed, or automatically, without requiring human interaction with
each service provider.
Broad Network Access
Capabilities are available over the network and accessed through standard mechanisms that
promote use by heterogeneous thin or thick client platforms (e.g. mobile phones, tablets,
laptops, and workstations).
93. Internet of Things M.kaivalya
Aditya College of Engineering & Technology
Resource Pooling
The provider’s computing resources are pooled to serve multiple consumers using a
multi-tenant model, with different physical and virtual resources dynamically assigned
and reassigned according to consumer demand.
Examples of resources include storage, processing, memory, and network bandwidth.
Rapid Elasticity
Capabilities can be elastically provisioned and released, in some cases automatically, to
scale rapidly outward and inward commensurate with demand.
94. Internet of Things M.kaivalya
Aditya College of Engineering & Technology
Comparison of internet of things and cloud computing
Cloud is a centralized system helping to transfer and deliver data and files
to data centers over the Internet. A variety of data and programs are easy to
access from a centralized cloud system.
The Internet of Things refers to devices connected to the Internet. In the
IoT, data is stored in real-time, as well as historical data. The IoT can
analyze and instruct devices to make effective decisions, as well as track
how certain actions function.
95. Internet of Things M.kaivalya
Aditya College of Engineering & Technology
Cloud computing encompasses the delivery of data to data centers over the Internet. IBM
divides cloud computing into six different categories:
Software as a Service (SaaS)
In this case, applications run in the cloud and other companies operate devices that connect
to users’ computers through a web browser.
Platform as a Service (PaaS)
The cloud contains everything you need to build and deliver cloud applications so there is
no need to maintain and buy equipment, software, etc.
Infrastructure as a Service (IaaS)
IaaS is an option providing companies with storage, servers, networks and hubs processing
data for each use.
96. Internet of Things M.kaivalya
Aditya College of Engineering & Technology
Public cloud
Companies manage spaces and provide users with quick access through the
public network.
Private cloud
The same as a public cloud, but only one person has access here, which can be
an organization, an individual company, or a user.
Hybrid cloud
Based on a private cloud, but provides access to a public cloud.
97. Internet of Things M.kaivalya
Aditya College of Engineering & Technology
The Role of Cloud Computing on the Internet of Things
Cloud computing works to improve the efficiency of daily tasks in
conjunction with the Internet of Things.
Cloud computing is about providing a path for data to reach its destination
while the Internet of Things generates a huge amount of data.
98. Internet of Things M.kaivalya
Aditya College of Engineering & Technology
According to Amazon Web Services, there are some benefits of cloud computing
No need to pre-guess infrastructure capacity needs
Saves money, because you only need to pay for those resources that you use,
the larger the scale, the more savings
In a few minutes, platforms can be deployed around the world
Flexibility and speed in providing resources to developers
Thus, the role of cloud computing in IoT is to work together to store IoT data, providing
easy access when needed. It’s important to note that cloud computing is an easy way to
move large data packets across the Internet generated by the IoT.
99. Internet of Things M.kaivalya
Aditya College of Engineering & Technology
Security aspects in IoT
Physical security
Physical security of IoT systems prevents unauthorized physical access to servers,
storage, and network devices.
In IoT solutions, physical security also includes unauthorized access to IoT devices, for
example, to redirect or manipulate data from devices, read credentials from devices or
change a device’s configuration.
Network security
Network security prevents unauthorized access to data transmitted over the network and
tampering with or unauthorized modification of data. It also ensures that network services
are available.
100. Internet of Things M.kaivalya
Aditya College of Engineering & Technology
Unencrypted communications
IoT platform allows old or low-power devices to connect to it over unencrypted
protocols like HTTP since such devices are not capable of doing encryption or
only provide weak encryption methods (e.g. TLSv1.0). Using old devices and
unencrypted communications is discretionary and considering the risk that such
communications are prone to attacks.
Hence, it is recommended to use transport-level encryption (SSL/TLS) to protect
all communications passing between the device and the platform.
101. Internet of Things M.kaivalya
Aditya College of Engineering & Technology
Application security:
Application security addresses security at the software level.
IoT follows standard practices for application-level hardening as making
sure that only properly upgraded operating systems and web servers are
in use. A number of additional “best practices” are employed to make
IoT secure by design.
102. Internet of Things M.kaivalya
Aditya College of Engineering & Technology
Everything As A Service(XaaS)
Cloud computing is a model for enabling ubiquitous, on-demand network access to
a shared pool of configurable computing resources (e.g. networks, servers, storage,
applications, and services) that can be provisioned, configured, and made available with
minimal management effort or service provider interaction.
All applications need access to three things: compute, storage, and data processing
capacities.
With cloud computing, a fourth element is added _ distribution services _ i.e. the
manner in which the data and computational capacity are linked together and
coordinated.
103. Internet of Things M.kaivalya
Aditya College of Engineering & Technology
104. Internet of Things M.kaivalya
Aditya College of Engineering & Technology
Characteristics of cloud computing
On-Demand Self-Service
A consumer can unilaterally provision computing capabilities, such as server time and
network storage, as needed, or automatically, without requiring human interaction with
each service provider.
Broad Network Access
Capabilities are available over the network and accessed through standard mechanisms that
promote use by heterogeneous thin or thick client platforms (e.g. mobile phones, tablets,
laptops, and workstations).
105. Internet of Things M.kaivalya
Aditya College of Engineering & Technology
Resource Pooling
The provider’s computing resources are pooled to serve multiple consumers using a
multi-tenant model, with different physical and virtual resources dynamically assigned
and reassigned according to consumer demand.
Examples of resources include storage, processing, memory, and network bandwidth.
Rapid Elasticity
Capabilities can be elastically provisioned and released, in some cases automatically, to
scale rapidly outward and inward commensurate with demand.
106. Internet of Things M.kaivalya
Aditya College of Engineering & Technology
Comparison of internet of things and cloud computing
Cloud is a centralized system helping to transfer and deliver data and files
to data centers over the Internet. A variety of data and programs are easy to
access from a centralized cloud system.
The Internet of Things refers to devices connected to the Internet. In the
IoT, data is stored in real-time, as well as historical data. The IoT can
analyze and instruct devices to make effective decisions, as well as track
how certain actions function.
107. Internet of Things M.kaivalya
Aditya College of Engineering & Technology
Cloud computing encompasses the delivery of data to data centers over the Internet. IBM
divides cloud computing into six different categories:
Software as a Service (SaaS)
In this case, applications run in the cloud and other companies operate devices that connect
to users’ computers through a web browser.
Platform as a Service (PaaS)
The cloud contains everything you need to build and deliver cloud applications so there is
no need to maintain and buy equipment, software, etc.
Infrastructure as a Service (IaaS)
IaaS is an option providing companies with storage, servers, networks and hubs processing
data for each use.
108. Internet of Things M.kaivalya
Aditya College of Engineering & Technology
Public cloud
Companies manage spaces and provide users with quick access through the
public network.
Private cloud
The same as a public cloud, but only one person has access here, which can be
an organization, an individual company, or a user.
Hybrid cloud
Based on a private cloud, but provides access to a public cloud.
109. Internet of Things M.kaivalya
Aditya College of Engineering & Technology
The Role of Cloud Computing on the Internet of Things
Cloud computing works to improve the efficiency of daily tasks in
conjunction with the Internet of Things.
Cloud computing is about providing a path for data to reach its destination
while the Internet of Things generates a huge amount of data.
110. Internet of Things M.kaivalya
Aditya College of Engineering & Technology
According to Amazon Web Services, there are some benefits of cloud computing
No need to pre-guess infrastructure capacity needs
Saves money, because you only need to pay for those resources that you use,
the larger the scale, the more savings
In a few minutes, platforms can be deployed around the world
Flexibility and speed in providing resources to developers
Thus, the role of cloud computing in IoT is to work together to store IoT data, providing
easy access when needed. It’s important to note that cloud computing is an easy way to
move large data packets across the Internet generated by the IoT.
111. Internet of Things M.kaivalya
Aditya College of Engineering & Technology
Security aspects in IoT
Physical security
Physical security of IoT systems prevents unauthorized physical access to servers,
storage, and network devices.
In IoT solutions, physical security also includes unauthorized access to IoT devices, for
example, to redirect or manipulate data from devices, read credentials from devices or
change a device’s configuration.
Network security
Network security prevents unauthorized access to data transmitted over the network and
tampering with or unauthorized modification of data. It also ensures that network services
are available.
112. Internet of Things M.kaivalya
Aditya College of Engineering & Technology
Unencrypted communications
IoT platform allows old or low-power devices to connect to it over unencrypted
protocols like HTTP since such devices are not capable of doing encryption or
only provide weak encryption methods (e.g. TLSv1.0). Using old devices and
unencrypted communications is discretionary and considering the risk that such
communications are prone to attacks.
Hence, it is recommended to use transport-level encryption (SSL/TLS) to protect
all communications passing between the device and the platform.
113. Internet of Things M.kaivalya
Aditya College of Engineering & Technology
Application security:
Application security addresses security at the software level.
IoT follows standard practices for application-level hardening as making
sure that only properly upgraded operating systems and web servers are
in use. A number of additional “best practices” are employed to make
IoT secure by design.