The document provides information on an IoT domain specialist occupation qualification. It outlines the course objectives and expected outcomes of two related courses - ECE3501 on IoT Fundamentals and ECE3502 on IoT Domain Analysis. The courses cover topics such as IoT infrastructure, sensor technologies, networking technologies, security risks, IoT solutions development, and prototyping IoT pilots. The document also includes the course syllabus, textbooks, assessment criteria and timelines.
Security and Privacy of Sensitive Data in Cloud Computing : A Survey of Recen...csandit
Cloud computing is revolutionizing many ecosystems by providing organizations with
computing resources featuring easy deployment, connectivity, configuration, automation and
scalability. This paradigm shift raises a broad range of security and privacy issues that must be
taken into consideration. Multi-tenancy, loss of control, and trust are key challenges in cloud
computing environments. This paper reviews the existing technologies and a wide array of both
earlier and state-of-the-art projects on cloud security and privacy. We categorize the existing
research according to the cloud reference architecture orchestration, resource control, physical
resource, and cloud service management layers, in addition to reviewing the existing
developments in privacy-preserving sensitive data approaches in cloud computing such as
privacy threat modeling and privacy enhancing protocols and solutions.
Security and Privacy of Sensitive Data in Cloud Computing : A Survey of Recen...csandit
Cloud computing is revolutionizing many ecosystems by providing organizations with
computing resources featuring easy deployment, connectivity, configuration, automation and
scalability. This paradigm shift raises a broad range of security and privacy issues that must be
taken into consideration. Multi-tenancy, loss of control, and trust are key challenges in cloud
computing environments. This paper reviews the existing technologies and a wide array of both
earlier and state-of-the-art projects on cloud security and privacy. We categorize the existing
research according to the cloud reference architecture orchestration, resource control, physical
resource, and cloud service management layers, in addition to reviewing the existing
developments in privacy-preserving sensitive data approaches in cloud computing such as
privacy threat modeling and privacy enhancing protocols and solutions.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
Un approccio completo di tipo cognitivo comprende tre componenti: un metodo, un ecosistema e una piattaforma. In questa sessione scopriremo come realizzare questo approccio grazie anche a Watson Data Platform, che aiuta i data scientist e gli esperti di business analytics a far “lavorare i dati” in un’ottica cognitive. In questo modo si può dare impulso alla crescita e al cambiamento aziendale. Ci concentreremo sulla possibilità di analizzare i dati provenienti dai Social Media per valutare la percezione dell’Amministrazione da parte di studenti, genitori, stampa, blogger…
Al cuore della soluzione ci sono una serie di servizi disegnati per funzione aziendale (sviluppatori, data scientist, data engineers, comunicazione / marketing) e la capacità di imparare propria della tecnologia cognitiva, che completano l’architettura e aiutano a “comporre” nuove soluzioni di business.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
What makes the next-generation firewall better than the traditional firewalls in protecting your data from hackers? Know more information from Netmagic!
Internet of things is one of the catch words now a day.
It promises a great future for the internet. Today common types
of communications are person to person, machine to person, or
person to machine. But Internet of things brings a new
technology where a type of communication is machine to
machine. Many technology and protocols have been studied for
this new communication. One of the new and emerging
technologies is VMware Pulse IoT center which provides IoT
device management in a pretty manner. It serves as management
glue between hardware. This paper will take a look on features,
benefits and working of VMware pulse IoT center including
summary of IoT solutions by VMware pulse IoT center.
CIO's implanting digital transformation strategies are facing increasing challenges on how to migrate security integrated hybrid technologies. Find out here the future of Future Networks today
Cloud Analytics Ability to Design, Build, Secure, and Maintain Analytics Solu...YogeshIJTSRD
Cloud Analytics is another area in the IT field where different services like Software, Infrastructure, storage etc. are offered as services online. Users of cloud services are under constant fear of data loss, security threats, and availability issues. However, the major challenge in these methods is obtaining real time and unbiased datasets. Many datasets are internal and cannot be shared due to privacy issues or may lack certain statistical characteristics. As a result of this, researchers prefer to generate datasets for training and testing purposes in simulated or closed experimental environments which may lack comprehensiveness. Advances in sensor technology, the Internet of things IoT , social networking, wireless communications, and huge collection of data from years have all contributed to a new field of study Big Data is discussed in this paper. Through this analysis and investigation, we provide recommendations for the research public on future directions on providing data based decisions for cloud supported Big Data computing and analytic solutions. This paper concentrates upon the recent trends in Big Data storage and analysing, in the clouds, and also points out the security limitations. Rajan Ramvilas Saroj "Cloud Analytics: Ability to Design, Build, Secure, and Maintain Analytics Solutions on the Cloud" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-5 | Issue-5 , August 2021, URL: https://www.ijtsrd.com/papers/ijtsrd43728.pdf Paper URL: https://www.ijtsrd.com/other-scientific-research-area/other/43728/cloud-analytics-ability-to-design-build-secure-and-maintain-analytics-solutions-on-the-cloud/rajan-ramvilas-saroj
Applicazioni per mobile e cloud sviluppate in maniera rapida ed efficaceJürgen Ambrosi
Un team di sviluppo avanzato ad alta produttività ha bisogno di una vasta gamma di servizi (provisioning di ambienti, strumenti di test e sviluppo ...) ma l'integrazione limitata può rallentarlo. E’ necessario utilizzare software di alta qualità in modo più rapido e uniforme attraverso gli ambienti ibridi. Oltre questo è necessario poterle testare, monitorare e modificare in tempo reale. In questa sessione verranno presentati gli strumenti per lo sviluppo e la gestione di applicazioni in ambienti mobile e Cloud.
Towards Internet of Things: Survey and Future VisionCSCJournals
Internet of things is a promising research due to its importance in many commerce, industry, and education applications. Recently, new applications and research challenges in numerous areas of Internet of things are fired. In this paper, we discuss the history of Internet of things, different proposed architectures of Internet of things, research challenges and open problems related to the Internet of things. We also introduce the concept of Internet of things database and discuss about the future vision of Internet of things. These are the manuscript preparation guidelines used as a standard template for all journal submissions. Author must follow these instructions while preparing/modifying these guidelines.
FUTURE AND CHALLENGES OF INTERNET OF THINGS ijcsit
The world is moving forward at a fast pace, and the credit goes to ever growing technology. One such
concept is IOT (Internet of things) with which automation is no longer a virtual reality. IOT connects
various non-living objects through the internet and enables them to share information with their community
network to automate processes for humans and makes their lives easier. The paper presents the future
challenges of IoT , such as the technical (connectivity , compatibility and longevity , standards , intelligent
analysis and actions , security), business ( investment , modest revenue model etc. ), societal (changing
demands , new devices, expense, customer confidence etc. ) and legal challenges ( laws, regulations,
procedures, policies etc. ). A section also discusses the various myths that might hamper the progress of
IOT, security of data being the most critical factor of all. An optimistic approach to people in adopting the
unfolding changes brought by IOT will also help in its growth.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
Un approccio completo di tipo cognitivo comprende tre componenti: un metodo, un ecosistema e una piattaforma. In questa sessione scopriremo come realizzare questo approccio grazie anche a Watson Data Platform, che aiuta i data scientist e gli esperti di business analytics a far “lavorare i dati” in un’ottica cognitive. In questo modo si può dare impulso alla crescita e al cambiamento aziendale. Ci concentreremo sulla possibilità di analizzare i dati provenienti dai Social Media per valutare la percezione dell’Amministrazione da parte di studenti, genitori, stampa, blogger…
Al cuore della soluzione ci sono una serie di servizi disegnati per funzione aziendale (sviluppatori, data scientist, data engineers, comunicazione / marketing) e la capacità di imparare propria della tecnologia cognitiva, che completano l’architettura e aiutano a “comporre” nuove soluzioni di business.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
What makes the next-generation firewall better than the traditional firewalls in protecting your data from hackers? Know more information from Netmagic!
Internet of things is one of the catch words now a day.
It promises a great future for the internet. Today common types
of communications are person to person, machine to person, or
person to machine. But Internet of things brings a new
technology where a type of communication is machine to
machine. Many technology and protocols have been studied for
this new communication. One of the new and emerging
technologies is VMware Pulse IoT center which provides IoT
device management in a pretty manner. It serves as management
glue between hardware. This paper will take a look on features,
benefits and working of VMware pulse IoT center including
summary of IoT solutions by VMware pulse IoT center.
CIO's implanting digital transformation strategies are facing increasing challenges on how to migrate security integrated hybrid technologies. Find out here the future of Future Networks today
Cloud Analytics Ability to Design, Build, Secure, and Maintain Analytics Solu...YogeshIJTSRD
Cloud Analytics is another area in the IT field where different services like Software, Infrastructure, storage etc. are offered as services online. Users of cloud services are under constant fear of data loss, security threats, and availability issues. However, the major challenge in these methods is obtaining real time and unbiased datasets. Many datasets are internal and cannot be shared due to privacy issues or may lack certain statistical characteristics. As a result of this, researchers prefer to generate datasets for training and testing purposes in simulated or closed experimental environments which may lack comprehensiveness. Advances in sensor technology, the Internet of things IoT , social networking, wireless communications, and huge collection of data from years have all contributed to a new field of study Big Data is discussed in this paper. Through this analysis and investigation, we provide recommendations for the research public on future directions on providing data based decisions for cloud supported Big Data computing and analytic solutions. This paper concentrates upon the recent trends in Big Data storage and analysing, in the clouds, and also points out the security limitations. Rajan Ramvilas Saroj "Cloud Analytics: Ability to Design, Build, Secure, and Maintain Analytics Solutions on the Cloud" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-5 | Issue-5 , August 2021, URL: https://www.ijtsrd.com/papers/ijtsrd43728.pdf Paper URL: https://www.ijtsrd.com/other-scientific-research-area/other/43728/cloud-analytics-ability-to-design-build-secure-and-maintain-analytics-solutions-on-the-cloud/rajan-ramvilas-saroj
Applicazioni per mobile e cloud sviluppate in maniera rapida ed efficaceJürgen Ambrosi
Un team di sviluppo avanzato ad alta produttività ha bisogno di una vasta gamma di servizi (provisioning di ambienti, strumenti di test e sviluppo ...) ma l'integrazione limitata può rallentarlo. E’ necessario utilizzare software di alta qualità in modo più rapido e uniforme attraverso gli ambienti ibridi. Oltre questo è necessario poterle testare, monitorare e modificare in tempo reale. In questa sessione verranno presentati gli strumenti per lo sviluppo e la gestione di applicazioni in ambienti mobile e Cloud.
Towards Internet of Things: Survey and Future VisionCSCJournals
Internet of things is a promising research due to its importance in many commerce, industry, and education applications. Recently, new applications and research challenges in numerous areas of Internet of things are fired. In this paper, we discuss the history of Internet of things, different proposed architectures of Internet of things, research challenges and open problems related to the Internet of things. We also introduce the concept of Internet of things database and discuss about the future vision of Internet of things. These are the manuscript preparation guidelines used as a standard template for all journal submissions. Author must follow these instructions while preparing/modifying these guidelines.
FUTURE AND CHALLENGES OF INTERNET OF THINGS ijcsit
The world is moving forward at a fast pace, and the credit goes to ever growing technology. One such
concept is IOT (Internet of things) with which automation is no longer a virtual reality. IOT connects
various non-living objects through the internet and enables them to share information with their community
network to automate processes for humans and makes their lives easier. The paper presents the future
challenges of IoT , such as the technical (connectivity , compatibility and longevity , standards , intelligent
analysis and actions , security), business ( investment , modest revenue model etc. ), societal (changing
demands , new devices, expense, customer confidence etc. ) and legal challenges ( laws, regulations,
procedures, policies etc. ). A section also discusses the various myths that might hamper the progress of
IOT, security of data being the most critical factor of all. An optimistic approach to people in adopting the
unfolding changes brought by IOT will also help in its growth.
The world is moving forward at a fast pace, and the credit goes to ever growing technology. One such concept is IOT (Internet of things) with which automation is no longer a virtual reality. IOT connects various non-living objects through the internet and enables them to share information with their community network to automate processes for humans and makes their lives easier. The paper presents the future challenges of IoT , such as the technical (connectivity , compatibility and longevity , standards , intelligent analysis and actions , security), business ( investment , modest revenue model etc. ), societal (changing demands , new devices, expense, customer confidence etc. ) and legal challenges ( laws, regulations, procedures, policies etc. ). A section also discusses the various myths that might hamper the progress of IOT, security of data being the most critical factor of all. An optimistic approach to people in adopting the unfolding changes brought by IOT will also help in its growth.
The Internet of Things Training Course, IoT Training covers What the IoT is about, innovation patterns, organizations and joining. Figure out how to function with Building Connected Devices.
IoT Training Course participants will find out about the elements of the IoT markets, innovation, patterns, arranging, outline and the meeting of stages and administrations, with an exceptional spotlight on the item plan, design and execution.
This is a central IoT course covering the innovations behind the Internet of Things and associated gadgets.
IoT Training By Tonex:
Tonex covers all the IoT bases with several different courses including the 2-day Internet of Things Training course that covers a wide variety of topics such as:
Concepts and definitions of the Internet of Things
Applications
IoT standards
Requirements
IoT enabling technologies
IoT architecture
Security
Cloud computing and the Internet of Things
IoT platforms
Course Content :
What is the Internet of Things (IoT)?
Overview of IoT Connectivity Methods and Technologies
Evaluation of IoT
It is predicted that 50 to 100 billion things will be electronically connected by the year 2020. This Internet of Things (IoT) will fuel technology innovation by creating the means for machines to communicate many different types of information with one another.
With all objects in the world connected, lives will be transformed. But the success of IoT depends strongly on standardization, which provides interoperability, compatibility, reliability, and effective operations on a global scale.
Recognizing the value of IoT to industry and the benefits this technology innovation brings to the public, the IEEE Standards Association (IEEE-SA) has a number of standards, projects and events that are directly related to creating the environment needed for a vibrant IoT.
Why Choose Tonex?
Presenting highly customized learning solutions is what we do. For over 30 years Tonex has worked with organizations in improving their understanding and capabilities in topics often with new development, design, optimization, regulations and compliances that, frankly, can be difficult to comprehend.
Ratings tabulated from student feedback post-course evaluations show an amazing 98 percent satisfaction score.
Reasonably priced classes taught by the best trainers is the reason all kinds of organizations from Fortune 500 companies to government’s most important agencies return for updates in courses and hands-on workshops
For more information, questions, comments, Contact us.
Internet of Things ( IoT ) Training
https://www.tonex.com/training-courses/the_internet_of_things_training/
The Internet of Things (IoT), also referred to as the Internet of Objects, will change everything—including ourselves. This may seem like a bold statement, but consider the impact the Internet already had on education, science, communication, business, government, and humanity. Clearly, the Internet is one of the most important and a powerful creation in all of human history. This paper discussesIOT architecture, IOT applications and limitations of IOT.
Internet of Things (IoT) integrates billions of the heterogeneous IoT things with the Internet in which the embedded systems such as sensors and actuators linked together to improve quality of life, and becomes the future of technologies in any field of human daily life. These IoT devices cooperate with each other and generate useful information to provide better services and applications to the governments and the society. Also, there is a need to store these data on Cloud for monitoring. This paper, surveys IoT applications, new challenges and issues arise in different fields and provides IoT architecture, focuses on explanation of IoT protocols and their operations and functionalities, presents different microcontroller types used by researchers. With the huge amount of data generated from IoT devices, the integrating Cloud and IoT may helpful, Therefore, a survey on open issues faced when these two concepts integrating together is discussed. The objective of this paper is to provide a survey for everything related to IoT and direct it to all beginners in this filed or academic researchers.
IoT - Technical Regulatory Aspects and Key Challenges Dr. Mazlan Abbas
MCMC envisages that this Technical Report becomes a reference for the stakeholders
in rolling out IoT applications and services
in Malaysia, especially start-up companies, universities and Makers community who
are less than familiar with such technical regulatory requirement. This Technical Report defines the requirement and procedures to achieve compliance to the technical regulatory requirements including Spectrum Requirement, Network Numbering and Assignment, Technical Standardisation, Roaming or Mobility Requirement, and Security and Data Privacy
in order to implement IoT applications and services in Malaysia.
Immunizing Image Classifiers Against Localized Adversary Attacksgerogepatton
This paper addresses the vulnerability of deep learning models, particularly convolutional neural networks
(CNN)s, to adversarial attacks and presents a proactive training technique designed to counter them. We
introduce a novel volumization algorithm, which transforms 2D images into 3D volumetric representations.
When combined with 3D convolution and deep curriculum learning optimization (CLO), itsignificantly improves
the immunity of models against localized universal attacks by up to 40%. We evaluate our proposed approach
using contemporary CNN architectures and the modified Canadian Institute for Advanced Research (CIFAR-10
and CIFAR-100) and ImageNet Large Scale Visual Recognition Challenge (ILSVRC12) datasets, showcasing
accuracy improvements over previous techniques. The results indicate that the combination of the volumetric
input and curriculum learning holds significant promise for mitigating adversarial attacks without necessitating
adversary training.
About
Indigenized remote control interface card suitable for MAFI system CCR equipment. Compatible for IDM8000 CCR. Backplane mounted serial and TCP/Ethernet communication module for CCR remote access. IDM 8000 CCR remote control on serial and TCP protocol.
• Remote control: Parallel or serial interface.
• Compatible with MAFI CCR system.
• Compatible with IDM8000 CCR.
• Compatible with Backplane mount serial communication.
• Compatible with commercial and Defence aviation CCR system.
• Remote control system for accessing CCR and allied system over serial or TCP.
• Indigenized local Support/presence in India.
• Easy in configuration using DIP switches.
Technical Specifications
Indigenized remote control interface card suitable for MAFI system CCR equipment. Compatible for IDM8000 CCR. Backplane mounted serial and TCP/Ethernet communication module for CCR remote access. IDM 8000 CCR remote control on serial and TCP protocol.
Key Features
Indigenized remote control interface card suitable for MAFI system CCR equipment. Compatible for IDM8000 CCR. Backplane mounted serial and TCP/Ethernet communication module for CCR remote access. IDM 8000 CCR remote control on serial and TCP protocol.
• Remote control: Parallel or serial interface
• Compatible with MAFI CCR system
• Copatiable with IDM8000 CCR
• Compatible with Backplane mount serial communication.
• Compatible with commercial and Defence aviation CCR system.
• Remote control system for accessing CCR and allied system over serial or TCP.
• Indigenized local Support/presence in India.
Application
• Remote control: Parallel or serial interface.
• Compatible with MAFI CCR system.
• Compatible with IDM8000 CCR.
• Compatible with Backplane mount serial communication.
• Compatible with commercial and Defence aviation CCR system.
• Remote control system for accessing CCR and allied system over serial or TCP.
• Indigenized local Support/presence in India.
• Easy in configuration using DIP switches.
TECHNICAL TRAINING MANUAL GENERAL FAMILIARIZATION COURSEDuvanRamosGarzon1
AIRCRAFT GENERAL
The Single Aisle is the most advanced family aircraft in service today, with fly-by-wire flight controls.
The A318, A319, A320 and A321 are twin-engine subsonic medium range aircraft.
The family offers a choice of engines
Saudi Arabia stands as a titan in the global energy landscape, renowned for its abundant oil and gas resources. It's the largest exporter of petroleum and holds some of the world's most significant reserves. Let's delve into the top 10 oil and gas projects shaping Saudi Arabia's energy future in 2024.
Welcome to WIPAC Monthly the magazine brought to you by the LinkedIn Group Water Industry Process Automation & Control.
In this month's edition, along with this month's industry news to celebrate the 13 years since the group was created we have articles including
A case study of the used of Advanced Process Control at the Wastewater Treatment works at Lleida in Spain
A look back on an article on smart wastewater networks in order to see how the industry has measured up in the interim around the adoption of Digital Transformation in the Water Industry.
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptxR&R Consult
CFD analysis is incredibly effective at solving mysteries and improving the performance of complex systems!
Here's a great example: At a large natural gas-fired power plant, where they use waste heat to generate steam and energy, they were puzzled that their boiler wasn't producing as much steam as expected.
R&R and Tetra Engineering Group Inc. were asked to solve the issue with reduced steam production.
An inspection had shown that a significant amount of hot flue gas was bypassing the boiler tubes, where the heat was supposed to be transferred.
R&R Consult conducted a CFD analysis, which revealed that 6.3% of the flue gas was bypassing the boiler tubes without transferring heat. The analysis also showed that the flue gas was instead being directed along the sides of the boiler and between the modules that were supposed to capture the heat. This was the cause of the reduced performance.
Based on our results, Tetra Engineering installed covering plates to reduce the bypass flow. This improved the boiler's performance and increased electricity production.
It is always satisfying when we can help solve complex challenges like this. Do your systems also need a check-up or optimization? Give us a call!
Work done in cooperation with James Malloy and David Moelling from Tetra Engineering.
More examples of our work https://www.r-r-consult.dk/en/cases-en/
COLLEGE BUS MANAGEMENT SYSTEM PROJECT REPORT.pdfKamal Acharya
The College Bus Management system is completely developed by Visual Basic .NET Version. The application is connect with most secured database language MS SQL Server. The application is develop by using best combination of front-end and back-end languages. The application is totally design like flat user interface. This flat user interface is more attractive user interface in 2017. The application is gives more important to the system functionality. The application is to manage the student’s details, driver’s details, bus details, bus route details, bus fees details and more. The application has only one unit for admin. The admin can manage the entire application. The admin can login into the application by using username and password of the admin. The application is develop for big and small colleges. It is more user friendly for non-computer person. Even they can easily learn how to manage the application within hours. The application is more secure by the admin. The system will give an effective output for the VB.Net and SQL Server given as input to the system. The compiled java program given as input to the system, after scanning the program will generate different reports. The application generates the report for users. The admin can view and download the report of the data. The application deliver the excel format reports. Because, excel formatted reports is very easy to understand the income and expense of the college bus. This application is mainly develop for windows operating system users. In 2017, 73% of people enterprises are using windows operating system. So the application will easily install for all the windows operating system users. The application-developed size is very low. The application consumes very low space in disk. Therefore, the user can allocate very minimum local disk space for this application.
Overview of the fundamental roles in Hydropower generation and the components involved in wider Electrical Engineering.
This paper presents the design and construction of hydroelectric dams from the hydrologist’s survey of the valley before construction, all aspects and involved disciplines, fluid dynamics, structural engineering, generation and mains frequency regulation to the very transmission of power through the network in the United Kingdom.
Author: Robbie Edward Sayers
Collaborators and co editors: Charlie Sims and Connor Healey.
(C) 2024 Robbie E. Sayers
Event Management System Vb Net Project Report.pdfKamal Acharya
In present era, the scopes of information technology growing with a very fast .We do not see any are untouched from this industry. The scope of information technology has become wider includes: Business and industry. Household Business, Communication, Education, Entertainment, Science, Medicine, Engineering, Distance Learning, Weather Forecasting. Carrier Searching and so on.
My project named “Event Management System” is software that store and maintained all events coordinated in college. It also helpful to print related reports. My project will help to record the events coordinated by faculties with their Name, Event subject, date & details in an efficient & effective ways.
In my system we have to make a system by which a user can record all events coordinated by a particular faculty. In our proposed system some more featured are added which differs it from the existing system such as security.
Automobile Management System Project Report.pdfKamal Acharya
The proposed project is developed to manage the automobile in the automobile dealer company. The main module in this project is login, automobile management, customer management, sales, complaints and reports. The first module is the login. The automobile showroom owner should login to the project for usage. The username and password are verified and if it is correct, next form opens. If the username and password are not correct, it shows the error message.
When a customer search for a automobile, if the automobile is available, they will be taken to a page that shows the details of the automobile including automobile name, automobile ID, quantity, price etc. “Automobile Management System” is useful for maintaining automobiles, customers effectively and hence helps for establishing good relation between customer and automobile organization. It contains various customized modules for effectively maintaining automobiles and stock information accurately and safely.
When the automobile is sold to the customer, stock will be reduced automatically. When a new purchase is made, stock will be increased automatically. While selecting automobiles for sale, the proposed software will automatically check for total number of available stock of that particular item, if the total stock of that particular item is less than 5, software will notify the user to purchase the particular item.
Also when the user tries to sale items which are not in stock, the system will prompt the user that the stock is not enough. Customers of this system can search for a automobile; can purchase a automobile easily by selecting fast. On the other hand the stock of automobiles can be maintained perfectly by the automobile shop manager overcoming the drawbacks of existing system.
1. Internet of Things
IoT – Domain Specialist : MC_SSCQ8210_V1.0_IoT-Domain_Specialist_09.04.2019.pdf
SECTOR : IT-ITeS
SUB-SECTOR : FUTURE SKILLS
OCCUPATION : INTERNET OF THINGS
REF ID : SSC/Q8210, V1.0
NSQF LEVEL : 8
Semester V : ECE3501 – IoT Fundamentals
Semester VI : ECE3502 – IoT Domain Analyst
Syllabus is framed based on the
SSC NASSCOM Curriculum
OSI - TCP/IP - IoT
Application Layer
Physical Layer
Application Layer
Network
Layer
App. Services Platform
Network Layer
Datalink Layer
Network Layer Internet Layer
Transport Layer Transport Layer
Session Layer
Presentation Layer
Application Layer
Device Layer
App. Services Layer
App. Protocols Layer
ISO - OSI TCP/IP (Internet) IoT
TCP/IP - IoT
TCP/IP Protocol Stacks IoT Protocol Stacks
IoT
Application
Device
Management
Application Layer CoAP, MQTT, XMPP, AMQP
HTTP, DHCP, DNS, TLS/SSL
Transport Layer UDP,DTLS
TCP/UDP
IPv6/IP routing
6LoWPAN
Internet Layer
Network/Link
Layer
Ethernet(IEEE 802.3),
Wireless LAN(802.11),
Wi-Fi
IPv6, IPv4, IPSec
IEEE 802.15.4 MAC
IEEE 802.15.4 PHY
Web Application
IoT Architecture
Three Layer
Application Layer
Network Layer
Perception Layer
Four Layer
Application Layer
Middleware Layer
Network Layer
Perception Layer
Five Layer
Business Layer
Application Layer
Middleware Layer
Network Layer
Perception Layer
2. IoT Architecture
Three Layer Five Layer
What is IoT ?
An IoT is a network that connects uniquely identifiable ‘Things’ to the Internet. The ‘Things’ have sensing/actuation and
potential programmability capabilities. Through the exploitation of unique identification and sensing, information about
the ‘Thing’ can be collected and the state of the ‘Thing’ can be changed from anywhere, anytime, by anything.
- (IEEE)
How IoT works?
IoT devices gather data and send it through the internet for processing
Data is analyzed centrally
Instructions based on analysis are returned to the devices
3
1
2
Data Generation & Gathering Data Generation
Data Collection
Data Pre-
processing
Data Storage
Data Analytics
Information
Delivery
Pre-requisite: Computer Networks
ECE3501 - IoT Fundamentals
Course Objectives:
1. To impart knowledge on the infrastructure, sensor technologies and networking technologies
of IoT
2. To analyze, design and develop IoT solutions.
3. To explore the entrepreneurial aspect of the Internet of Things
4. To apply the concept of Internet of Things in the real world scenarios
Expected Course Outcome:
After successfully completing the course the student should be able to
1. Identify the main component of IoT
2. Program the controller and sensor as part of IoT
3. Assess different Internet of Things technologies and their applications
L T P J C
2 0 2 4 4
3. Module 1: Introduction: (2 Hours)
IT-ITeS/BPM Industry – An Introduction, the relevance of the IT-ITeS sector, Future Skills – An
Introduction, General overview of the Future Skills sub-sector.
Syllabus: 7 Modules; 30 Hours
Module 2: Internet of Things - An Introduction: (3 Hours)
Evolution of IoT and the trends, Impact of IoT on businesses and society, Existing IoT use
cases and applications across industries.
Module 3: IoT Security and Privacy (6 Hours)
Security and privacy risks, analyze security risks, Technologies and methods that mitigate
security, Privacy standards and regulations, Social and privacy impacts.
Module 4: IoT Solutions (6 Hours)
IoT use case development, Need and Goals for IoT solution, Adoption of IoT solutions, Planning
for IoT Solution: Evaluate costs, competition, technology challenges and internal resource
considerations, Need for stakeholder buy-in.
Module 5: Prototyping the Pilot execution (5 Hours)
Prototype developing Stages, deploy real-time UI/UX visualizations, Methods and metrics to
analyze and convey business outcomes, feedback and data obtained from execution.
Module 6: Scalability of IoT Solutions (5 Hours)
Roadmap for developing complete IoT solutions, Strategies for implementation, key Milestone,
Scalability of IoT Solutions, Methods, platforms and tools, Web and Mobile Interfaces.
Module 7: Build and Maintain Relationships at the Workplace, Team Empowerment (3 Hours)
Text Book(s)
1. Arshdeep Bahga, Vijay Madisetti, “Internet of Things: A hands-on Approach”, University Press, 2015.
2. Adrian McEwen & Hakim Cassimally, “Designing the Internet of Things”, Wiley, Nov 2013, (1 st edition)
3. Claire Rowland, Elizabeth Goodman, Martin Charlier, Ann Light, Algred Lui,” Designing Connected
Products: UX for the consumer internet of things”, O’Reilly, (1st edition),2015
Reference Books
1. Rethinking the Internet of things: A Scalable Approach to Connecting Everything by Francis daCosta,
Apress, 2014
2. Learning Internet of Things by Peter Waher, Packt Publishing, 2015
3. Designing the Internet of Things, by Adrian Mcewen, Hakin Cassimally , Wiley India Private Limited
4. Cloud Computing, Thomas Erl, Pearson Education, 2014
5. Foundations of Modern Networking: SDN, NFV, QoE, IoT, and Cloud, William Stallings, Addison-Wesley
Professional; 1 edition
6. https://nsdcindia.org/sites/default/files/MC_SSCQ8210_V1.0_IoT-Domain%20Specialist_09.04.2019.pdf
Rubrics
1. Digital Assignment I (06.09.2021) : 10 Marks
2. Quiz I (18.10.2021 - 22.10.2021) : 10 Marks
3. Quiz II (22.11.2021 - 26.11.2021) : 10 Marks
Theory – Internal Assessment
CAT II: 24.10.2021 to 30.10.2021
CAT I: 12.09.2021 to 18.09.2021
Last Instructional Day: 10.12.2021
Title Submission Review I (20 Marks) Review II (30 Marks) Review III (50 Marks)
14.08.2021 - 15.09.2021 30.08.2021 - 03.09.2021 18.10.2021 - 22.10.2021 29.11.2021 - 03.12.2021
Batch Members, Title,
Abstract, IoT
Platform/Hardware
Implementation (Google
form will be circulated)
Objectives, Problem
Statement, Block Diagram,
Devices/Components/Softw
are used
Proposed Methodology,
part of the project circuit
built, Corresponding
Results
Full project results,
Report
J Component – Internal Assessment
Batch Members: Minimum - 1; Maximum - 3
4. J Component - Report Format
i. Cover page containing the Title of the Project, Name of the Course, Semester, Students
Name, and Faculty Name.
ii. Declaration
iii. Certificate
iv. Abstract of the work
v. Index
vi. Chapters
1. Introduction
2. Description of the methodologies used
3. Results and discussion
4. Conclusion and Future Scope
5. References
vii. Appendix – Coding
Introduction to
IT – ITeS Industry
1
Introduction
Information and Communication Technology (ICT)
has become one of the basic requirements of the
modern society. In today’s digital era, we use mobile
devices to perform the tasks of our daily life. It is
difficult to think of any event without the use of
digital devices. Information Technology (IT) is one
of the world’s fastest growing economic activities,
which envisages easier flow of information at various
levels in the desired pattern. The Information
Technology enabled Services (ITeS) sector
has not only changed the way the world looks at our
country but has also made significant contributions
to the Indian economy. This session will introduce
the basic concepts and ideas related to Information
Technology (IT) and IT enabled Services (ITeS).
Information Technology
Information Technology (IT) means creating, managing,
storing and exchanging information. IT includes all
types of technology used to deal with information,
such as computer hardware and software technology
Unit 1.indd 1 9/6/2018 12:10:38 PM
Domestic Data Entry Operator – Class IX
2
used for creating, storing, and transferring information.
Computer takes data as input, processes it and
produces the results as output. The information is the
result of data processing. Data refers to the facts or raw
material, which are processed to get the information.
Number of boys and girls in a class is a factual data of
the classroom. This is an example of data related to the
students in the class. Some conclusion can be drawn
based on the data. This conclusion is information. The
decisions are taken on the basis of data and information.
IT is a tightly integrated part of business. Computers
and information systems are an essential part of every
businesstoday.Likeaccountingandlegal,everybusiness
needs to invest in technology to compete. IT has several
benefits for a business, such as it helps in reaching more
potential customers, developing a business relationship
with potential customers, streamlining operations,
reducing costs, improving efficiency, maximising profit,
minimising waste, providing better service to customers,
supporting better relationships with key partners, and
allowing customers to better guide the business.
Information Technology enabled Services
(ITeS)
Information Technology that enables the business
by improving the quality of service is Information
Technology enabled Services (ITeS). ITeS is also called
web-enabled services or remote services that cover the
entire operations which exploit Information Technology
for improving the efficiency of an organisation. These
servicesprovideawiderangeofcareeroptionsthatinclude
opportunities in all offices like call centres, payrolls,
logistics management, revenue claims processing,
medical billing, coding, medical transcription, legal
databases, back office operations, content development,
GIS (geographical information system), web services
and Human Resource (HR) services, etc.
ITeS is defined as outsourcing of processes that
can be enabled with information technology and
covers diverse areas like finance, HR, administration,
health care, telecommunication, manufacturing, etc.
Notes
Unit 1.indd 2 9/6/2018 12:10:38 PM
Introduction to IT–ITeS Industry 3
Notes
E-enabled services radically reduce costs and improve
service standards. In short, Internet service provider
aims to provide B2B e-commerce solutions. ITeS
offers different services integrated in a single delivery
mechanism to end users. The services may include:
Medical Transcription, Customer Relationship
Management, Data Entry and Data Processing,
Software development, Data Warehousing, IT Help
Desk Services, Enterprise Resource Planning and
Telecommunication Services.
BPO services
Business Process Outsourcing (BPO) services means
performing business operations through an outside
service provider. BPO also comes under IT services as
IT plays a very useful role in optimising the business
performance. The BPO industry is highly organised and
hence various kinds of jobs are outsourced in India.
India has the expertise in reducing costs with firm
control on the quality of the service.
Some of the BPO services are as follows:
(a) Financial and Accounting Services
(b) Taxation and Insurance Services
(c) E-Publishing and Web Promotion
(d) Legal Services and Content Writing
(e) Multimedia and Design Services
(f) Document Management Services
(g) Software Testing Services
(h) Health Care Services
BPM industry in India
The IT BPM (Business Process Management) industry
hasbeenfuelingIndia’sgrowth.Inadditiontocontributing
towards the country’s Gross Domestic Product (GDP)
and exports, the growth of the IT BPM industry has
provided India with a wide range of economic and social
benefits which includes creating employment, raising
income levels, and promoting exports. It has placed India
on the world map with an image of a technologically
advanced and knowledge‑based economy. This sector
attracts amongst the largest investments by venture
Unit 1.indd 3 9/6/2018 12:10:38 PM
5. Domestic Data Entry Operator – Class IX
4
Notes capitalist and has been credited with enabling the
entrepreneurial ventures of many in the country.
The IT-BPM industry has almost doubled in terms of
revenueandcontributiontoIndia’sGDPoverthelastdecade
(2008–18). BPO Service Industry is doing exceptionally
well in India because of the following advantages:
(a) BPO service providers in India invest in hi-tech
hardware and software to deliver the best of
services. They follow quality checks to ensure
error free and exceptional service.
(b) Government of India is encouraging the BPO
Industry in India by providing necessary
infrastructure and logistical support.
(c) BPO Industry in India is highly developed and
capable of delivering numerous types of BPO
services in exceptional quality.
Structure of the IT-BPM industry
The organisations within the IT‑BPM industry are
categorised along the following parameters:
• Sector the organisation is serving
• Type as well as range of offering the organisation
provides
• Geographic spread of operations
• Revenues and size of operations
(a) Multinational Companies (MNCs): MNCs have
their headquarters outside India but operate in
multiple locations worldwide including those in
India. They cater to external clients (both domestic
and/or global).
(b) Indian Service Providers (ISPs): ISPs started
with their operations in India. Most of these
organisations have their headquarters in India
while having offices in many international
locations. While most have a client base,
which is global as well as domestic, there are
some that have focussed on serving only the
Indian clients.
(c)
Global In-house Centers (GIC):
GIC
organisations cater to the needs of their parent
company only and do not serve external clients.
Unit 1.indd 4 9/6/2018 12:10:38 PM
Introduction to IT–ITeS Industry 5
This model allows the organisation the option to
keep IT Operations in-house and at the same time
take advantage of expanding their global footprint
and offering opportunities for innovation in a
cost-effective manner.
IT applications
In technologically developed nations, Information
Technology has become a part of everyday life. For a
user, computer is a tool that provides the desired
information, whenever needed. The use of computer
and Information Technology can be observed at home,
workplace, in the modern service industry and in all
aspects of our life. It includes listening to music,
watching movies, playing games, doing office work,
chatting and sending messages, managing daily planner,
reading books, paying utility bills, booking ticket to
travel, bank operations, etc. Computers and ICT is used
in industries, in offices, and in house also. The various
application areas are business, banking, insurance,
education, marketing, health care, engineering design,
military, communication, animation, research, agriculture
and government.
IT in home computing
A personal computer (PC) is used to work at home, to
do household accounts, play games, surf the web, use
Fig. 1.1: IT applications
Unit 1.indd 5 9/6/2018 12:10:38 PM
Domestic Data Entry Operator – Class IX
6
e-mail, create music, and pursue a
range of other hobbies. PC is also
used to play games. It includes action
games, role playing games, puzzles
and many more. A PC with a CD-ROM
drive, sound card, and speakers can
play audio CD. A computer can be
used from home to study a wide range
of online training courses. Computers
and digital devices are now used for
online shopping and e-commerce.
IT in everyday life
In our daily life, we use washing
machines, microwave oven and many
other products using which have
embedded software. We can store all
the information about our important
work, appointments schedules and list
of contacts in a computer. Computer
is, therefore, playing a very important
role in our lives and now we cannot
imagine the world without computers.
IT in library
Nowadays many libraries are
computerised. Each book has a
barcode associated with it. This
makes it easier for the library to
a keep track of books and the
availability of a specific book.
Computer software is used to issue
and return the book. Each book
in the library has a magnetic strip
attached to it that is deactivated
before the book can be borrowed.
IT at workplace
In the office environment, computers
and computer applications are used
to perform office work more effectively.
Fig. 1.3: IT in everyday life
Fig. 1.5: IT in library
Fig. 1.2: IT in home computing
Unit 1.indd 6 9/6/2018 12:10:39 PM
Introduction to IT–ITeS Industry 7
In assembly-line industries, where
attention to detail, speed and efficiency
are important, automation is becoming
more and more common. Internet and
Office applications form the basis of
modern business.
IT in education
Computers and Information Technology are extensively
used in education for teaching-learning and assessment.
Thesoftwareandhardwaretechnology
is used for creation and transmission
of information in various forms
including still pictures, audio, video
and animation to the learners. The
learning becomes easy and accessible
through IT. A lot of teaching resources
are available for teachers to teach
in a better way. Online assessment
helps to assess the students without
any biasness. The students, teachers and educational
administrators and every stakeholder in the education
sector has benefitted with the integration of IT in
education.
(a) ICT in the classroom
There are many ways in which the ICT is used for
education in the classroom, such as
• e-learning classrooms;
• smart-board presentations;
• videos on experiments;
• creation of images and video;
• desktop publishing of magazines, letters and
documents;
• educational games;
• learning using the CD-ROM media; and
• gathering educational information on the
Internet.
(b) Education — anywhere anytime
Any student in India can access the NCERT book online
through the website www.epathshala.nic.in or mobile app.
Fig. 1.6: IT in education
Fig. 1.4: IT at workplace
Unit 1.indd 7 9/6/2018 12:10:39 PM
6. Domestic Data Entry Operator – Class IX
8
Apart from this there are a variety of websites and mobile
apps to access educational resources on any topic.
You can also contact a teacher or a trainer via
Internet to use WBT (Web-based Training). In this way
education has reached the far flung areas by reaching
the unreached.
(c) Teaching aids and media
ICT is used mostly as a teaching aid in schools to
• use pictures, animations and audio-visuals to
explain subjects that are difficult to explain.
• make the lessons interesting using presentations.
• organise lessons using the computer.
• obtain the information relevant to the subjects.
(d) Learning Management System (LMS)
A Learning Management System (LMS) is being used by
many countries to manage school systems. A student
or teacher can register himself/herself on the official
website to access LMS and can get many services from
LMS. The student can be benefited by using LMS, as it
can be used to
• learn lessons anytime and anywhere.
• submit queries, getting replies and submit
comments through forums.
• participate in the co-curricular activities via
video.
• monitor the progress of their children (by
parents).
IT in entertainment
Information Technology has had a major
impact on the entertainment industry.
Internetisamajorsourceofentertainment.
One can download and view movies,
play games, chat, use multimedia,
incorporate visual and sound effects using
computers, etc. Digital broadcasting has
changed the way we experience television,
with more interactive programming
and participation.
Fig 1.7: IT in entertainment
Unit 1.indd 8 9/6/2018 12:10:39 PM
Introduction to IT–ITeS Industry 9
IT in communication
Communication is used to convey
messages and ideas, pictures, or
speeches. A person who receives this
must understand clearly and correctly.
Modern communication makes use
of the computer system. We use
computers for email, chatting, FTP,
telnet and video conferencing.
IT in business
Computers are used in business organisations for payroll
calculation,budgeting,salesanalysis,financialforecasting,
managing and maintaining stocks. A lot of business
transactions happen through Internet called e-commerce.
IT facilitates marketing, customer visit, product
browsing, shopping basket checkout, tax and shopping,
receipt and process order. E-commerce offers services
pertaining to processing inventory management,
transactions, documentation, presentations, and
gathering product information. Smart cards, such as
credit cards and debit cards are used in shops. These
cards have a metallic strip on which the user’s Personal
Identification Number (PIN), and account number is
stored and can be read when it is passed through a special
reader. Airlines use large-scale computer applications
for their reservations system, both in the airports and in
central reservations call-centers. Other businesses that
have large-scale computing requirements are insurance
claims systems and online banking, which both have
large numbers of users and operators interacting across
one system.
IT in science and engineering
Scientists and engineers use computers for performing
complex scientific calculations, Computer Aided
Design (CAD) or Computer Aided Manufacturing (CAM)
applications are used for drawing, designing and
for simulating and testing the designs. Computers
are used for storing large amount of data,
performing complex calculations and for visualising
Fig. 1.8: IT in Communication
Unit 1.indd 9 9/6/2018 12:10:40 PM
Domestic Data Entry Operator – Class IX
10
3-dimensional objects. Complex scientific applications
like rocket launching, space exploration, etc., are not
possible without the computers.
IT in banking
Computer is an essential part of the modern banking
system. Every activity of a bank is now online. The
customer’s data and transactions are recorded by
computers. Recurring deposits (e-RD), Fixed deposits
(e-FD), money transfer from one account to another
(NEFT, RTGS), online transactions are done using
Internet. Capital market transactions, financial
analysis and related services are available in online
platforms. Bank customers use Automated Teller
Machines (ATM) for cash deposits and withdrawal,
or to view current balance.
IT in insurance
Insurance companies keep all records up to date
with the help of computer database. Procedures for
continuation of policies, starting date, date of next
installment, maturity date, interest dues, survival
benefits, and bonus are declared by using computers
in insurance companies. Many online policies are also
available which can be purchased by using the website
of insurance companies.
IT in marketing
In marketing, computers are used for advertising
of products, by using arts and graphics facility it is
possible to create interesting advertisements of various
products so that the goal of selling can be achieved.
Using e-commerce websites, people can purchase items
even sitting at home.
IT in health care
ICT is used in the health sector in numerous ways.
Hospital Management System is used to maintain and
manage patients’ records as well as various activities
pertaining to hospital administration. The computerised
Fig. 1.9 (a) MRI machine Fig. 1.9 (b) Detailed images
Notes
Unit 1.indd 10 9/6/2018 12:10:40 PM
Introduction to IT–ITeS Industry 11
3-dimensional objects. Complex scientific applications
like rocket launching, space exploration, etc., are not
possible without the computers.
IT in banking
Computer is an essential part of the modern banking
system. Every activity of a bank is now online. The
customer’s data and transactions are recorded by
computers. Recurring deposits (e-RD), Fixed deposits
(e-FD), money transfer from one account to another
(NEFT, RTGS), online transactions are done using
Internet. Capital market transactions, financial
analysis and related services are available in online
platforms. Bank customers use Automated Teller
Machines (ATM) for cash deposits and withdrawal,
or to view current balance.
IT in insurance
Insurance companies keep all records up to date
with the help of computer database. Procedures for
continuation of policies, starting date, date of next
installment, maturity date, interest dues, survival
benefits, and bonus are declared by using computers
in insurance companies. Many online policies are also
available which can be purchased by using the website
of insurance companies.
IT in marketing
In marketing, computers are used for advertising
of products, by using arts and graphics facility it is
possible to create interesting advertisements of various
products so that the goal of selling can be achieved.
Using e-commerce websites, people can purchase items
even sitting at home.
IT in health care
ICT is used in the health sector in numerous ways.
Hospital Management System is used to maintain and
manage patients’ records as well as various activities
pertaining to hospital administration. The computerised
Fig. 1.9 (a) MRI machine Fig. 1.9 (b) Detailed images
machines are used for ECG, EEG, Ultrasound and CT
Scan. The variety of measuring instruments and surgical
equipment are used to monitor patients’ conditions
during complex surgery. Expert system is used for
diagnosis. Health care manufacturing companies use
computers to aid the production of diagnostic tools
and instruments. Computers are an integral part
of laboratories and dispensaries. They are used in
scanning and diagnosing different diseases.
(a) Use of ICT in diagnosis
With the advancements in computer hardware and
software technology, various high-tech machines are
used in the diagnosis and treatment of critical diseases.
Using expert system, diseases can be diagnosed at the
early stages and the patients can be given treatment
accordingly. Some of these machines are:
(i) Computerised Axial Tomography Machine
(CAT): Using this machine three-dimensional
(3D) images of different parts of the body can be
made. These images are helpful in the diagnosis
of diseases.
(ii) MRI (Magnetic Resonance Imaging Machine):
MRI machines are used to give the digital
impression of internal organs of the body by
using strong magnetic fields and radio waves. The
digital images are very helpful in the detection
and in deciding the treatment of diseases.
Unit 1.indd 11 9/6/2018 12:10:40 PM
7. Domestic Data Entry Operator – Class IX
12
(iii) Electrocardiogram (ECG) Machine:
The
ECG machine is used to monitor the
heartbeat. When the heart pumps blood to
different parts of the body some electrical
impulses are produced. This machine
records the electrical impulses and shows
it in the form of a graph.
(iv)
Cardiac Screening Machine:
This
machine displays the physiology of the
heart and it displays the movements
inside the heart. Through this machine
it is possible to diagnose problems of the
heart, such as thinning of veins and then
recommend treatment.
(v) EEG (Electro ‑
encephalography) Machine:
This machine is used to record the activities
of the brain. The small electrical probes
attached to the head receive the electrical
impulses of the brain and display them on
a computer screen. This device can retrieve
the data in both states where a patient is
awake or asleep.
(vi) Blood Sugar Testing Machine: This device
analyses a sample of blood and determines
the blood glucose level.
(vii) Blood Pressure Measuring Machine: This
device which is worn as a wrist band can
measure the blood pressure of a person at
Fig. 1.11: Cardiac Screening Machine
and Display
Fig. 1.12: EEG Machine and Display
Fig. 1.14: Measuring Blood
Pressure
Fig. 1.13: Sugar Testing Machine
Fig. 1.10 (a) ECG Machine Fig. 1.10 (b) ECG Graph
Unit 1.indd 12 9/6/2018 12:10:41 PM
Introduction to IT–ITeS Industry 13
Practical Exercise
(iii) Electrocardiogram (ECG) Machine:
The
ECG machine is used to monitor the
heartbeat. When the heart pumps blood to
different parts of the body some electrical
impulses are produced. This machine
records the electrical impulses and shows
it in the form of a graph.
(iv)
Cardiac Screening Machine:
This
machine displays the physiology of the
heart and it displays the movements
inside the heart. Through this machine
it is possible to diagnose problems of the
heart, such as thinning of veins and then
recommend treatment.
(v) EEG (Electro ‑
encephalography) Machine:
This machine is used to record the activities
of the brain. The small electrical probes
attached to the head receive the electrical
impulses of the brain and display them on
a computer screen. This device can retrieve
the data in both states where a patient is
awake or asleep.
(vi) Blood Sugar Testing Machine: This device
analyses a sample of blood and determines
the blood glucose level.
(vii) Blood Pressure Measuring Machine: This
device which is worn as a wrist band can
measure the blood pressure of a person at
Fig. 1.11: Cardiac Screening Machine
and Display
Fig. 1.12: EEG Machine and Display
Fig. 1.14: Measuring Blood
Pressure
Fig. 1.13: Sugar Testing Machine
rest or when he/she is involved in some
physical activity.
IT in the government and public service
The government uses large-scale computer applications
in its daily operations and is actively encouraging
e-governance practices. Digital India and e-governance
initiative of Government of India are best examples of
this. Government and Non-Governmental Organisations
(NGOs) as well as International Government Agencies
use ICT applications to communicate and provide
various services to the people and is called as
e-governance. There are various official web portals of
the Government of India for e-governance. There are
various advantages of e-governance.
The Income tax department, sales tax department,
preparations of voters list, preparation of PAN card
makes use of the computer system. Many government
services are available online. Electricity bills can now
be paid online. The government uses electronic voting
for elections, by replacing the traditional voting slip and
ballot box. People can enroll themselves in the electoral
roll through the State Election Commission portal.
Computers are common-place in modern society, and
tend to make previously laborious manual tasks of data
entry much simpler and quicker.
1. Explore the impact of IT and ITeS in various areas in
day‑to‑day life.
2. Visit Indian government websites, such as the official
web portal of Department of School Education, MHRD,
Government of India. Make a list of all the valuable
information and the services you could obtain yourself.
3. Make a list of e-government services that are provided by
other countries.
4. Visit the various websites and list the areas where ICT is used.
5. Identify the advantages of using ICT over conventional
methods in various areas.
6. Observe other instances where ICT is used in business
and manufacturing and compile a list.
Unit 1.indd 13 9/6/2018 12:10:41 PM
Domestic Data Entry Operator – Class IX
14
A. Give an example of the use of IT in the following areas.
Avoid already discussed examples.
Teacher Practice Example
Classroom content transaction
Assessment of students
Library management
Student record management
B. Short answer questions (50 words)
1. What do you understand by the term IT and ITeS?
2. What are the pros and cons of using ICT?
3. What precautions are required to ensure that ICT
use is safe?
4. What are the four main sub-sectors in the IT-BPM
industry?
5. Give examples of use of IT in everyday life.
6. How is IT used in libraries?
7. What are the various processes of education where
IT is used?
8. Which software are used in digital communication?
9. For what purpose is IT used in business?
10. Which are the prominent areas where IT is used in
science and engineering?
11. List the various uses of IT in a banking system.
12. Which are the different areas of healthcare where IT
is used? And how?
13. List any 5 websites of the Indian government which
provide IT enabled services to the people.
Check Your Progress
Notes
Unit 1.indd 14 9/6/2018 12:10:41 PM
Module 2
Internet of Things - An Introduction
Evolution of IoT and the trends
Impact of IoT on businesses and society
Existing IoT use cases and applications across industries
8. Internet of Things
Connects the Physical World to the Internet
For a given IoT application
1. Define the objectives
2. Identify the devices
a) Physical things/device – which generates
data or which is to be monitored
b) Sensors
c) Actuators
3. Process the data (Data Processing)
4. Sending actuating signal to control the
physical thing/device identified in 2(a)
Example: Smart Irrigation System
1. Objectives – To measure the moisture level of
the soil and if needed have to water the plants
2. Devices Identification
a) Physical things/device – Soil
b) Sensors - Soil moisture sensors
c) Actuators – Electrical Motor
3. Data Processing: Check if the moisture level is
below the threshold value.
4. If the level is below the threshold value send the
actuating signal to turn on the motor to increase
the moisture level of the soil(watering the plants)
Internet of Things
Connects the Physical World to the Internet
Perception/
Device Layer
Example: Smart Irrigation System
(Three Layer IoT Architecture Representation)
Network Layer
Application
Layer
Data Generation, Data Collection/
Gathering, Actuation/controlling Devices
Data Transmission, Processing
(Pre-processing, Storage, Analytics)
IoT Application, API(Web and Mobile),
Visualization
Layers
Functions Example
Soil, Sensor, Electric Motor,
Microcontroller(Computing Device)
Checking the soil moisture level
IoT based Smart Irrigation System,
communicating the moisture level to the user
Internet of Things - Definition
Connects the Physical World to the Internet
“The Internet of Things (IoT) is the networking of physical devices (also referred to as "connected devices" and
"smart devices") embedded with electronics, software, sensors, actuators and network connectivity that enable
these objects to collect and exchange data”
- as defined by Wikipedia
"A global infrastructure for the information society, enabling advanced services by interconnecting (physical and
virtual) things based on existing and evolving interoperable information and communication technologies."
-as defined by 'The International Telecommunication Unit’
“The Internet of Things is a network of physical objects accessed through internet. These objects contains
embedded technology to interact with the internal states or external environment "
-as defined by ‘Cisco’
An IoT is a network that connects uniquely identifiable ‘Things’ to the Internet. The ‘Things’ have sensing/actuation
and potential programmability capabilities. Through the exploitation of unique identification and sensing, information
about the ‘Thing’ can be collected and the state of the ‘Thing’ can be changed from anywhere, anytime, by anything.
- (IEEE)
Evolution of IoT
Phases of Evolution
Network The Internet Mobile - Internet PCs + Mobile + People Internet of things
Web Web Web Web
9. Potential of IoT
Anything Any Device
Anyone Anybody
Any Service Any Business
Any Place Anywhere
Any Path Any Network
Anytime Any Context
History
of
IoT
History of IoT
1969-1995: Internet of Boffins
1969 - TCP/IP
1974 -Telenet
1980 - Ethernet
1994 - Full text web search engines
1995-2000: Internet of Geeks
Started with the proposal of IP
1995 - Amazon started its first online retail
service, followed by eBay
1996 - Hotmail
1998 - Google search, PayPal
Internet penetration was low in the market until
2000
2000-2007: Internet of Masses
Many people across the globe started using
internet
2001 - Wikipedia
2004 - Facebook, followed by Youtube,
Twitter
2007-2011: Mobile Internet
Access to the Internet via cellular phone
service provider. The era got a boost with
introduction of smartphones
2012 onwards: Internet of Things
Things connected to each other using
internet
IoT Historical Timeline
10. IoT Trends
1. Rise in Number and Types of IoT Devices
IoT connected devices worldwide from 2015 to 2025(in billions)
Connected
devices
(in
billions)
It is not just the number of connected devices which is on a rise but also the types.
Voice Assistants
GPS Trackers
Smart Bands or Fitness Bands
Smart Locks
Smart Smoke Alarms
Smoke Detectors
Child Monitor
Doorbell Cameras
Fitness Devices
Wearables
IoT based Security Systems
Security Cameras
Different types of IoT device
2. Consumer IoT (CIoT) and Industrial IoT (IIoT)
Consumer IoT aims to improve life
quality and well-being of individual
users by automating and simplifying
day-to-day tasks. Devices often have
a short lifespan and are quickly
replaced by new versions
Industrial IoT targets complex industrial
processes and systems with distinct
network requirements. It focuses on
optimizing operational efficiency, safety
and sustainability through remote
monitoring and control capabilities
Consumer IoT VS Commercial IoT
Industrial IoT
Commercial IoT applications are
deployed in environments like
office buildings, retail, hotels,
hospitality, healthcare facilities
and entertainment venues.
Use cases: Asset Tracking,
Smart Office and Buildings,
Connected Lighting, Sensing &
Monitoring, and Location
Services
Industry 4.0: Automation of manufacturing and industrial practices, using modern smart
technology. Large-scale machine-to-machine communication (M2M) and the internet of
things (IoT) are integrated for increased automation, improved communication and self-
monitoring, and production of smart machines that can analyze and diagnose issues
without the need for human intervention.
VS
Consumer IoT Industrial IoT
VS
Number of Connected Devices
Consumer IoT Industrial IoT
VS
Key Verticals
Viable Wireless Option Major Application
11. Industrial IoT Consumer IoT 3. Cloud & Edge Computing
Physical Things,
Sensors, Devices,
Actuators
Physical Environment
Pre-
Processing,
Storage, Data
Analytics, API
Cloud
Most of the data is transferred to
the Cloud
Requires more Bandwidth
Results in High Latency
Bandwidth – It is the measure of amount of data transferred between two nodes per unit time. Measured in Bits/Sec
Latency – It is the measure of delay in transmitting the data between two nodes per unit time.
Physical Things,
Sensors, Devices,
Actuators
Physical Environment
Advanced
Data
Analytics, API
Cloud
Pre-Processing,
Storage, Basic
Analytics
Edge Node
Edge Computing
Computation takes places nearer to the devices.
Less Bandwidth, Low Latency
3. Cloud & Edge Computing
IoT devices have been relying on the cloud for storing the data
Instead of sending the data from IoT devices to cloud, the data can be transferred to local devices which are
closer to the edge of the network.
The local storage helps in sorting, filtering, and calculating the data and sending a part or the whole data to
the cloud, thus reducing the traffic to network.
Edge computing offers a series of benefits
Better management of large amount of data which every device sends
Lowered dependency on cloud helping apps perform faster with reduced latency
IoT based mobile apps consumes less bandwidth
4. A greater focus on IoT security
With an IoT adoption being on a rise, more and more devices are getting connected to the internet. As
the network is expanding, the volume of data is also expanding and there is more information which is
at risk.
5. Incorporation of Artificial Intelligence, Big Data, and Machine Learning
Using the data analytics tools in the connected devices, businesses will be able to decisions around
both predictive and preventive measures. If more amount of data is given as a training data set to ML,
it will be easy to predict the things.
Big Data
Structured and
unstructured
data
Artificial
Intelligence
Machine
Learning
Deep
Neural
N/w
Artificial Intelligence: Machines with seemingly
human capabilities
Machine Learning: Computational and statistical tools
12. Vibration Level
Indicates the average vibration data points
of the pumps that failed and those that did
not fail within a period of time.
Its clear from the indication that, vibration
level alone does not predict device failure
Vibration
level
Did not Fail Failed
Example - Prediction of Failure of Pump Vibration vs Temperature
While adding temperature dimension
with the vibration, it is clear that high
pump vibration level coupled with high
temperature is an indicator of pump
failure.
Similarly, low pump vibration level
coupled with low temperature is an
indicator of pump not failed
However, it is less obvious to identify the
data points in the area corresponding to
low temperature and high vibration level
subjects to pump fail or not through only
vibration and temperature
Vibration
level
Temperature
Failed Did not Fail
Decision Tree
With vibration, time since last service and
temperature dimension, a decision tree
can be created to predict when a pump
will fail
+ value too high - Value within normal value
Vibration, Temperature
and Time since last
serviced
6. Blockchain for IoT security and BaaS will become mainstream
Blockchain:
It is a distributed ledger that is completely open to anyone. Once the data has been recorded inside a
blockchain, it becomes very difficult to change it.
Hash: ABCD
Previous Hash: -
Hash: EFGH
Previous Hash: ABCD
Hash: WXYZ
Previous Hash: EFGH
Genesis Block
1 2 3
Cloud Computing
13. Hash: ABCD
Previous Hash: -
Hash: EFGH
Previous Hash: ABCD
Hash: WXYZ
Previous Hash: EFGH
1 2 3
LMNO
Proof-of-work : It is the mechanism that slows down the creation of new blocks. It’s makes it very hard to
tamper with the blocks,
Because if you tamper one block, you’ll need to recalculate the proof – of – work for all the following
blocks. So the security of a blockchain comes from its creative use of hashing and the proof – of – work
mechanism.
Distributed service: Instead of using a central entity to mange the chain, blockchains use a peer-to-peer
network and anyone is allowed to join.
IoT depends on centralized communication models to interact with the system.
It can also be said that all the devices in IoT setup are identified, connected and validated via
centralized cloud servers.
However, centralized clouds and networking equipment used in the existing IoT solutions have high
maintenance and infrastructure cost.
As IoT systems are connected through these services, scalability can become a significant issue.
As the number of IoT devices increases, the number of interactions between the server and devices
increases the cost.
That is the reason why current systems cannot support large IoT networks.
Also, cloud servers are vulnerable to a single point of failure which means the failure at one point can
affect the entire ecosystem.
Therefore, using a peer-to-peer model instead of a client/server model can be the right solution that
IoT industry needs today.
With decentralization in place, storage needs and computation can be distributed across millions of
IoT devices and central failure cannot have an impact on the whole network.
Use of blockchain in IoT can help the IoT devices to scale up and improve the security
7. IoT based Smart Projects
Improve the quality of living and sustainability
8. Location tracking and wireless sensing
Efficient tracking of location and wireless sensing
9. Better Workforce Management
IoT devices can be used to monitor personnel and schedule tasks. All the data from all these
systems can readily be used to populate the solutions of performance management.
IoT devices can also be widely used to monitor the safety of the employee.
Example: Smart cities
14. 10. IoT for Territory Monitoring
Smart tools do a loT in agriculture. They can measure soil moisture and control water supplies, or
monitor the state of ripe fruits and vegetables and inform the farmer of the time to harvest. These
smart methods can reduce costs, improve forecasting, planning, and harvesting.
Another use case is a forest fire. Devices like infrared cameras and air filters can save our forests in
the summer. It is already used in countries where summer forest fires are well known.
11. Voice will become the new mode of communication
Voice based-search, instructions or commands, and dominate the IoT markets. More and more
languages are being incorporated and their databases are being prepared to allow even a child or
uneducated person to use the IoT system.
Impact of IoT on Businesses
Proven safe operating model
Hierarchical organization structure
Established market place
Compete on price and service
Consolidated and repeatable business rules
Annual business planning
Traditional Business - Rigid & Rule Driven
IoT provides companies a digital interface to the physical world
Digital businesses are Agile & Data Driven
Products Suppliers
Logistics Operations
Marketing
Sales
&
Distribution
Procurem
ent
Customer
Services
Innovation
Process
Monitoring
Access
from
anywhere
Accurate
Prediction
Cost
Savings(T
(Time,
resource,
money)
Information
Management
Preventive
Measures
Control &
Automati
on
Artificial
Intelligence
Cloud
Computing
Mobility
Open API
& Micro
Services
Big Data
Faster
Revenue
Growth
Social
Collabora
tion
Impact of IoT on business
Traditional
Business
IoT
Impacts of IoT on
Business
Channel
Integration
Improved
Business
Model
Access from Anywhere
The definition of IoT says that the devices are connected over a network, virtually.
An example of this is August smart lock where the IoT user has access to the smart lock via the
technology and this makes it easy for the user. Any person with access to this technology, who
wishes to manage this lock sitting miles away can easily do so by connecting the personal electronic
device (be it a mobile phone or any electronic device) to the smart lock. This lets us access a device
remotely also.
Process Monitoring
Another use of IoT, which is highly beneficial for businesses in manufacturing and production of
goods, is the monitoring of processes. Manufacturing processes that follow assembly lines are
currently also highly monitored. But with the addition of IoT, these processes can be monitored in
greater detail.
A lot of data that is recorded can be analyzed to improve processes, make them more efficient and
also help cut down costs.
15. Accurate Prediction
As an environmental sensor, IoT helps predict natural disasters. This technology is used in sensors, for
a real-time prediction of natural disasters.
Not only in businesses, but also for the world as a whole, predicting natural disaster and analyzing what
all can occur in the near future is possible with the help of technological advancement, one of them
being the IOT. A real-time example of this is smart sensors used in Dublin, Ireland. They are already
creating a real-time picture of what is happening and can help predict any natural disasters, which will
be of great help to their city in the time of crisis.
Transfer of Data
In IoT, where devices are connected virtually, transfer of data packets is an easy task. This is beneficial
for both businesses and people living in this society. With the IoT, various devices connected to the
internet can collect, receive, communicate with each other via IP. To increase the efficiency and to
simplify the processes, IoT can be of great help for the businesses.
Cost Savings (time, resources, money)
The connectivity and fast communication among devices reduces response time and human labor,
thus increase productivity and efficiency. Many of the appliances that make our homes “smart” save
electricity, resources and money. Nowadays a lot of investments are made for predictive maintenance
that will help to predict and avoid failures in IoT ecosystem
Control and Automation
All Internet of Things consumers (users and businesses) through applications installed on their
mobile devices such as phones, tablets, etc. can remotely control smart devices, adjust different
metrics, and choose specific options. In many cases, systems send automatic messages and
warnings or take actions. For example, the fridge can order food from the supermarket if some of
the products are down, the car can send a request for the spoiled part that needs to be replaced,
and the user can adjust the temperature at their homes while they are away.
More Data Gathering
Improved Business Model
Problem
Traditional
Solution
IoT
Solution
IoT
Business
Solution
Luggage lost in air transit
The airline would try to find the lost luggage using manual processes which are costly, timing
consuming and generates customer dissatisfaction
A tracking device is placed inside the luggage and transmits its location using internet. The
user can track the luggage using a smartphone app
The airline charges a fee to its customer for using the luggage tracking service, or offers the
service for no charge to premium customers. A share of the revenue generated is paid to the
IoT company, which maintains the IoT solution.
Impact of IoT on Society
Cost Saving
Smart homes and offices can save energy costs.
Security
Offers better security by constant surveillance
Quick transfer of data
Takes active action, such as alerting the local police body in case of a security breach
Improved health care
Remote monitoring of patients and providing medication for them
Automation
Reminders of daily tasks such as payment of utility bills
Smart lighting of streets and auto-sensing as well as control of traffic signal
Remote Monitoring of assembly line and production system to maximize efficiency, safety, and
reliability in a manufacturing firm
Smart automobiles that can provide assistance if required, assist in controlling vehicle speed on the
basis of traffic and environmental conditions
16. IoT Solution Architecture - Stages IoT Solution Architecture - Stages
No matter the use case and number of layers, the key building blocks of any IoT structure are always the same, namely:
Smart things
Networks and gateways enabling low-power devices (which is often the case in IoT) to enter the big Internet;
Middleware or IoT platforms providing data storage spaces and advanced computing engines along with analytical capabilities
Applications, allowing end users to benefit from IoT and manipulate the physical world.
These elements make up the backbone of any IoT system upon which effective, multi-layered architecture can be developed. Most
commonly, these layers are:
Perception layer - hosting smart things
Connectivity or transport layer - transferring data from the physical layer to the cloud and vice versa via networks and gateways;
Processing layer- employing IoT platforms to accumulate and manage all data streams; and
Application layer - delivering solutions like analytics, reporting, and device control to end users.
Perception layer: Converting analog signals into digital data and vice versa
The initial stage of any IoT system embraces a wide range of “things” or endpoint devices that act as a bridge between the real and digital
worlds. They vary in form and size, from tiny silicon chips to large vehicles. By their functions, IoT things can be divided into the following
large groups.
Sensors such as probes, gauges, meters, and others. They collect physical parameters like temperature or humidity, turn them into
electrical signals, and send them to the IoT system. IoT sensors are typically small and consume little power.
Actuators, translating electrical signals from the IoT system into physical actions. Actuators are used in motor controllers, lasers,
robotic arms.
Machines and devices connected to sensors and actuators or having them as integral parts.
The edge-side layer includes just a few “things” physically placed in one room or myriads of sensors and devices distributed across the
world
Connectivity layer: Enabling data transmission
Server Side Cloud
NFC
Bluetooth Low
Energy
LPWAN Zigbee
The second level is in charge of all communications across devices, networks, and cloud services that
make up the IoT infrastructure. The connectivity between the physical layer and the cloud is achieved
directly using TCP or UDP/IP stack or via gateways — hardware or software modules performing
translation between different protocols as well as encryption and decryption of IoT data.
Ethernet connects stationary or fixed IoT devices like security and video cameras, permanently installed
industrial equipment, and gaming consoles.
WiFi, the most popular technology of wireless networking, is a great fit for data-intensive IoT solutions
that are easy to recharge and operate within a small area. A good example of use is smart home devices
connected to the electrical grid.
NFC (Near Field Communication) enables simple and safe data sharing between two devices over a
distance of 4 inches (10 cm) or less.
Bluetooth is widely used by wearables for short-range communications. To meet the needs of low-power
IoT devices, the Bluetooth Low-Energy (BLE) standard was designed. It transfers only small portions of
data and doesn’t work for large files.
LPWAN (Low-power Wide-area Network) was created specifically for IoT devices. It provides long-range wireless connectivity on low
power consumption with a battery life of 10+ years. Sending data periodically in small portions, the technology meets the requirements of
smart cities, smart buildings, and smart agriculture (field monitoring).
ZigBee is a low-power wireless network for carrying small data packages over short distances. The outstanding thing about ZigBee is
that it can handle up to 65,000 nodes. Created specifically for home automation, it also works for low-power devices in industrial,
scientific, and medical sites.
Cellular networks offer reliable data transfer and nearly global coverage. There are two cellular standards developed specifically for IoT
things. LTE-M (Long Term Evolution for Machines) enables devices to communicate directly with the cloud and exchange high volumes
of data. NB-IoT or Narrowband IoT uses low-frequency channels to send small data packages.
Network Connectivity Pros Cons Popular use cases
Ethernet Wired, Short-range
High speed
Security
Range limited to wire length
Limited Mobility
Stationary IoT-Video Camera, game
consoles, fixed equipment
WiFi
Wireless, Short-
range
High Speed
Great Compatibility
Smart home, devices that can be
easily recharged
NFC
Wireless, ultra-short-
range
Reliability
Low power Consumption
Limited range
Lack of availability
Payment systems, Smart Home
Bluetooth Low-
Energy
Wireless, Short-
range
High Speed
Low power Consumption
Limited range
Low bandwidth
Smart home devices, wearables,
beacons
LPWAN
Wireless, long-range Long range
Low power Consumption
Low bandwidth
High Latency
Smart home, smart city, smart
agriculture(Field monitoring)
Zigbee
Wireless, Short-
range
Low power Consumption
Scalability
Limited range
Compliance Issues
Home automation, healthcare and
industrial sites
Cellular
Networks
Wireless, long-range
Nearly global coverage
High Speed
Reliability
High Cost
High power Consumption Drones sending video and images
17. Once parts of the IoT solution are networked, they still need messaging protocols to share data across devices and with the cloud. The
most popular protocols used in the IoT ecosystems are:
AMQP (the Advanced Message Queuing Protocol) aiming at peer-to-peer data exchange between servers;
CoAP (the Constrained Application Protocol), a software protocol designed for constrained devices — end nodes limited in memory and
power (for example, wireless sensors). It feels much like HTTP but uses fewer resources;
MQTT (the Message Queue Telemetry Transport), a lightweight messaging protocol built on top of TCP/IP stack for centralized data
collection from low-powered devices.
Edge or fog computing layer: reducing system latency
This level is essential for enabling IoT systems to meet the speed,
security, and scale requirements of the 5th generation mobile
network or 5G. The new wireless standard promises faster speeds,
lower latency, and the ability to handle many more connected
devices, than the current 4G standard.
The idea behind edge or fog computing is to process and store
information as early and as close to its sources as possible. This
approach allows for analyzing and transforming high volumes of
real-time data locally, at the edge of the networks. Thus, you save the
time and other resources that otherwise would be needed to send all
data to cloud services. The result is reduced system latency that
leads to real-time responses and enhanced performance.
Edge computing occurs on gateways, local servers, or other edge nodes scattered across the network. At this level, data can be:
evaluated to determine if it needs further processing at higher levels,
formatted for further processing
decoded
filtered and
redirected to an additional destination
To sum up, the first three layers see data in motion, as it is constantly moving and altering. Only on hitting the next level, is data finally at
rest and available for use by consumer applications.
Processing layer: making raw data useful
The processing layer accumulates, stores, and processes data that comes from the previous layer. All these tasks are commonly handled
via IoT platforms and include two major stages.
Data accumulation stage
The real-time data is captured via an API and put at rest to meet the requirements of non-real-time applications. The data accumulation
component stage works as a transit hub between event-based data generation and query-based data consumption.
Among other things, the stage defines whether data is relevant to the business requirements and where it should be placed. It saves data
to a wide range of storage solutions, from data lakes capable of holding unstructured data like images and video streams to event stores
and telemetry databases. The total goal is to sort out a large amount of diverse data and store it in the most efficient way.
Data abstraction stage
Here, data preparation is finalized so that consumer applications can use it to generate insights. The entire process involves the following
steps:
combining data from different sources, both IoT and non-IoT, including ERM, ERP, and CRM systems;
reconciling multiple data formats; and
aggregating data in one place or making it accessible regardless of location through data virtualization.
Similarly, data collected at the application layer is reformatted here for sending to the physical level so that devices can “understand” it.
Together, the data accumulation and abstraction stages veil details of the hardware, enhancing the interoperability of smart devices.
What’s more, they let software developers focus on solving particular business tasks — rather than on delving into the specifications of
devices from different vendors.
Application layer: addressing business requirements
At this layer, information is analyzed by software to give answers to key business questions. There are hundreds of IoT applications that
vary in complexity and function, using different technology stacks and operating systems. Some examples are:
device monitoring and control software,
mobile apps for simple interactions,
business intelligence services, and
analytic solutions using machine learning.
Currently, applications can be built right on top of IoT platforms that offer software development infrastructure with ready-to-use
instruments for data mining, advanced analytics, and data visualization. Otherwise, IoT applications use APIs to integrate with
middleware.
Business layer: implementing data-driven solutions
The information generated at the previous layers brings value if only it results in problem-solving solution and achieving business goals.
New data must initiate collaboration between stakeholders who in turn introduce new processes to enhance productivity.
The decision-making usually involves more than one person working with more than one software solution. For this reason, the business
layer is defined as a separate stage, higher than a single application layer.
Security layer: preventing data breaches
It goes without saying that there should be a security layer covering all the above-mentioned layers. IoT security is a broad topic worthy of
a separate article. Here we’ll only point out the basic features of the safe architecture across different levels.
Device security - Modern manufacturers of IoT devices typically integrate security features both in the hardware and firmware installed on
it. This includes
embedded TPM (Trusted Platform Module) chips with cryptographic keys for authentication and protection of endpoint devices;
a secure boot process that prevents unauthorized code from running on a powered-up device;
updating security patches on a regular basis; and
physical protection like metal shields to block physical access to the device.
Connection security – Whether data is being sent over devices, networks, or applications, it should be encrypted. Otherwise, sensitive
information can be read by anybody who intercepts information in transit. IoT-centric messaging protocols like MQTT, AMQP, and DDS may
use standard Transport Layer Security (TSL) cryptographic protocol to ensure end-to-end data protection.
Cloud security - Data at rest stored in the cloud must be encrypted as well to mitigate risks of exposing sensitive information to intruders.
Cloud security also involves authentication and authorization mechanisms to limit access to the IoT applications. Another important
security method is device identity management to verify the device’s credibility before allowing it to connect to the cloud.
18. How IoT Works
Mobile App
Sensor
i. Sensors/Devices
First, sensors or devices help in collecting very minute data from the surrounding environment. All of
this collected data can have various degrees of complexities ranging from a simple temperature
monitoring sensor or a complex full video feed.
ii. Connectivity
Next, that collected data is sent to a cloud infrastructure but it needs a medium for transport.
The sensors can be connected to the cloud through various mediums of communication and transports
such as cellular networks, satellite networks, Wi-Fi, Bluetooth, wide-area networks (WAN), low power
wide area network and many more.
iii. Data Processing
Once the data is collected and it gets to the cloud, the software performs processing on the acquired
data.
This can range from something very simple, such as checking that the temperature reading on devices
such as AC or heaters is within an acceptable range. It can sometimes also be very complex, such as
identifying objects (such as intruders in your house) using computer vision on video.
iv. User Interface
Next, the information made available to the end-user in some way. This can achieve by triggering alarms
on their phones or notifying through texts or emails.
Also, a user sometimes might also have an interface through which they can actively check in on their
IOT system. For example, a user has a camera installed in his house, he might want to check the video
recordings and all the feeds through a web server.
How IoT Works
Principal Technologies that Drive IoT System
Wireless Sensor Networks
Embedded Systems
Communication Protocols
Cloud Computing
Big Data Analytics
A Wireless Sensor Network (WSN)
It is a network formed by a large number of sensor nodes where each node is equipped with a sensor to
detect physical phenomenon such as light, heat, pressure, etc. With the rapid technological development
of sensors, WSNs will become the key technology for IoT.
A sensor has the ability to capture anything from location to the device orientation. Collectively, these
sensors produce a huge amount of data, both in unstructured form (such as picture or videos) as well as
structured (such as GPS or acceleration data). These “devices” are perpetually connected to the Internet
over WiFi, 3G or 4G.
Embedded Systems
Embedded hardware devices, micro controllers etc, are the ones that process the data. The data from the
sensors are not directly usable and a process for using them is implemented by the embedded system.
Their main function is to process the data from the sensors according to an algorithm to extract the
valuable information like status, parameter values, alerts etc., and control actuators in some cases in the
system
19. Cloud computing
Cloud computing is the on-demand delivery of compute power,
database, storage, applications, and other IT resources via the
internet with pay-as-you-go pricing. These resources run on server
computers that are located in large data centers in different locations
around the world. When you use a cloud service provider like AWS,
that service provider owns the computers that you are using. These
resources can be used together like building blocks to build solutions
that help meet business goals and satisfy technology requirements.
Infrastructure as a service (IaaS): Services in this category eliminate the need
for you to procure and maintain the hardware related to networking, storage,
servers, etc. Services in this category are the basic building blocks for cloud
IT and typically provide you with access to networking features, computers
(virtual or on dedicated hardware), and data storage space.
Platform as a service (PaaS): Services in this category
reduce the need for you to manage the underlying
infrastructure (usually hardware and operating
systems) and enable you to focus on the deployment
and management of your applications.
Software as a service (SaaS): Services in this category provide you with a
completed product that the service provider runs and manages. In most
cases, software as a service refers to end-user applications. With a SaaS
offering, you do not have to think about how the service is maintained or how
the underlying infrastructure is managed. You need to think only about how
you plan to use that particular piece of software. A common example of a
SaaS application is web-based email
On-premises
Big Data analytics
Big data analytics is the process of examining large and varied data sets i.e., big data to uncover hidden
patterns, unknown correlations, market trends, customer preferences and other useful information that
can help organizations make more-informed business decisions. Big data analysis and cloud computing
go hand in hand, particularly in IoT applications.
Analysis of the data coming from a device or other sources can be used to send information to a
remote/local user regarding the device operation, or this analysis can be translated into commands sent to
the device to influence its operation. For example, the connected lamp can be turned on from the Cloud
when analysis shows that it is dark in the lamp's location and a remote lock shows that someone has
entered the house.
Communication Protocols
OSI MODEL
20. Bits, Frames, Packet and Segment
MAC, IP and Port Address
MAC: Physical Address of the device(system/Laptop). Does not change. Unique for the given device
IP: Address provided by the internet service providers when the device is connected to internet. Address changes w,r.t
to the service providers.
Port Address: Final destination address. Indicates which process to be carried out.
Example: 1880 is for Node-RED
Physical Address: F1-E3-C8-77-40-12
DHCP Enabled: Yes
IPv4 Address: 172.15.221.207
IPv4 Subnet Mask: 255.255.248.0
IPv4 Default Gateway: 172.15.215.1
Iv4 DHCP Server: 172.15.215.1
IPv4 DNS Server: 172.15.215.1
OSI MODEL
OSI Model Function
IoT
Host
Layers
7 Application
Human-computer interaction layer, where
applications can access the network services
Application
6 Presentation
Ensure that data is in a usable format where data
encryption occurs
5 Session
Maintain connections and is responsible for
controlling ports and sessions
4 Transport
Transmits data using transmission protocols
including TCP and UDP
Transport
Media
Layers
3 Network Decides which physical path the data will take Network/Internet
2 Data Link Defines the format of data on the network
Link
1 Physical Transmits raw bit stream over the physical medium
Communication Protocols
IoT connects various devices through Internet and devices talk to each other through a communication channel. The
defined communication channel is called as Communication Protocol
802.3 - Ethernet
Coaxial cables, twisted pair wire or optical fibre as
a medium
10Mbps to 40Gbps+ data rate
802.11 – Wi-Fi
Wireless LAN; 802.11 b/g/n
2.4GHz / 5GHz band
1 Mbps to up to 6.75 Gbps data rate
802.16 – WiMax
Collection of wireless broadband standards
1.5Mbps to 1Gbps data rate
802.15.4 – LR-WPAN
IEEE 802.15.4 is a standard which specifies the physical layer and
media access control for Low-rate wireless personal area networks
(LR-WPANs)
Example: LoRa
40bps to 250Kbps data rate
Provides low-cost, low-speed communication for low-power devices
2G/3G/4G - Mobile Communication
Date rates - 9.6 Kbps to 100 Mbps
2G - GSM and CDMA
3G - UMTS and CDMA2000
4G - LTE
Link Layer Protocols
Wireless IoT Connectivity Technologies have a range from a few centimeters to many kilometers:
Wireless Personal and Local Area Network technologies (WPANLAN) such as Bluetooth, ZigBee, 6LowPAN, RFID and Wi-Fi are ideal for
short to medium range communication like home or indoor applications.
Wireless Wide Area Network technologies (WWAN) are divided into two types: Cellular (3G/4G and 5G) and Low-Power Wide Area
Networks (LPWANs), themselves split into licensed (LTE-M, NB-IoT EC-GSM) or unlicensed long-range technologies (LPWA LoRa, Sigfox
and other). They are best suited for long-range communication such as smart meters, animal or assets tracking.
21. Wireless Personal Area Network (WPAN)
WPAN does not exceed a maximum range of 100m. Devices include Bluetooth-connected headsets for example, but also Zigbee and Z-
wave connected devices mostly used in home applications such as building control systems, smart alarms, or smart thermostats also
Industry 4.0 applications.
ZigBee and 6LoWPAN protocols are designed for low power consumption applications such as low power wireless sensor networks.
However, the transmission time for those protocols is longer than the low power Wi-Fi, due to its low data rate (250 Kb/s). The average
consumption profile is therefore considered as low to medium depending on the application and the module used.
Wireless Local Area Networks (WLAN)
WLAN, a network that enables connectivity of up to 1 kilometer. In this category, Wi-Fi is the most common standard. The technology is
supporting devices such as home assistants, smart TVs, and smart speakers and is sometimes used in industrial settings like factories.
Wi-Fi was historically designed for laptops or PCs, where the power requirements were not so important. It was deemed too power
hungry for battery-powered smart objects which led manufacturers to develop new standards for the Internet of Things. New generation,
low power Wi-Fi operates at much higher data rates ranging from 1 Mb/s to 54 Mb/s. This allows Wi-Fi enabled sensors to spend very
little time with actual transmission or reception. The chips ‘sleep mode’ power consumption was also greatly reduced (convenient for
IoT applications since these devices are mostly in the sleep state) thus reducing the modules overall power consumption.
Low Power Wide Area Networks (LPWAN)
IoT applications’ requirements have driven the emergence of LPWAN.
The technology offers low power, long range (up to 10–50 km in rural zones and 1–10 km in urban zones) together with low-cost
specifications. Four main competing standards are currently sharing the market: Sigfox, LoRaWAN, LTE-M and NB-IoT. They are
presently being rolled-out worldwide with more than 25 million devices already connected, the majority of which are smart meters.
These protocols may be based on cellular technology, such as LTE-M and NB-IoT or radio-based (LoRa, Sigfox),they can be licensed
(NB-IoT, LTE-M) or unlicensed (LoRa, Sigfox) which also differentiates their availability and prices.
In long range connectivity, LoRaWAN requires more transmission time compared to small range connectivity protocols because of its
low rate data rate. However, the optimizations brought to power savings mode, small data maximization, and flexible sleep all reduce the
power consumption of devices which makes LoRaWAN a good candidate for numerous IoT applications.
Cellular technology (2G, 3G, 4G and 5G)
Before the advent of LPWAN, cellular technology (2G, 3G, and 4G) was the only option for long-range remote device connectivity (up to
100km). The new, much talked about, 5G technology that is currently being deployed, promises a massive bandwidth and extremely
low latency which could favor its adoption. Cellular connectivity has historically been focused on range and bandwidth at the expense
of power consumption. The high amount of data produced by devices was hard to process quickly and the amount of time between
when data is sent from a connected device to when it returns to the same device—the latency—was high. However, new cellular
technologies like 5G transmit data about 10 times faster than 4G, promising ultra-low latency and lower power consumption.
Wireless Neighborhood Area Networks (WNAN)
WNAN lies between WLAN and long-range technologies. A medium range technology that covers areas between 5-10 km with its typical
proponents, Mesh networks (Wi-Sun (6LoWPAN), JupiterMesh or ZigBee-NAN). The technology can be used as an alternative for
LPWA/Cellular (e.g, in Utilities Field Area Networks) or as a complimentary element (e.g., for remote metering where other protocols do
not have sufficient range to be implemented) such as gas metering applications).
WNAN networks are generally deemed as high-energy consumers but mesh technologies such as Wi-SUN can provide high data rates
and low latency. Additionally, Wi-SUN modules use less power for listening which enable customers to configure devices to listen
frequently and still maintain a long-life.
Cellular
There are a lot of IoT
applications that may call
for operation over a
longer remoteness. These
IoT applications can take
the help of Cellular
communication
capabilities like
GSM/3G/4G. Cellular is
one of the IoT
Communication Protocols
which can send or
transfer a high amount of
data. The fee for sending
a high quantity of data
will be high too. Cellular
does need not only high
cost but also to need high
power consumption for
several applications. This
Internet of Things
Protocol is amazing for
sensor-based data
projects of low-
bandwidth. This is
because they can send a
very insignificant amount
of data or information on
the Internet.
22. RFID
The Radio Frequency Identification uses the electromagnetic fields to identify objects.
NFC
The NFC or Near Field Communication allows the clients to connect to the electronic devices, to use digital contents
and to do the contactless payment transaction. The essential work of NFC is to expand the “contactless” card
technology. It works within 4cm (between devices) by enabling the devices for sharing information.
SigFox
Sigfox is known as one of the best alternative technologies which bear the attributes of both Cellular and WiFi. As
Sigfox IoT Protocol was developed and designed for the M2M applications, it can only send data of low-level. By
taking the help of Ultra Narrow Band(UNB), Sigfox can hold speeds of 10 to 1000 bits per second for transferring low-
data. It only consumes 50 microwatts of the power.
The frequency of the IoT Connectivity Protocols Sigfox is 900MHz, and it has Could-access. In rural environments,
Sigfox IoT Protocol covers a range of 30 km to 50 km. In the urban areas, the range of this protocol is 3-10 km.
Internet Protocol (IPv4 and IPv6)
6LowPAN
Network Layer Protocols
The Internet Protocol is the protocol that defines and enables internetworking at the internet layer of the Internet
Protocol Suite. It uses a logical addressing system and performs routing, which is the forwarding of packets from a
source host to the next router that is one hop closer to the intended destination host on another network.
IPv4 IPv6
Address Size 32-bit 128-bit
Address format
Dot Decimal Notation
12.244.233.165
Hexadecimal Notation
2001:0db8:0000:0000:0000:ff00:0042:7879
Number of addresses 4.29×109 3.4×1038
Enable IPv6 standards to be used in low-power wireless networks, specifically with IEEE 802.15.4
6LowPAN protocol is an adaptation layer allowing to transport IPv6 packets over 802.15.4 links
Transmission Control Protocol (TCP) User Datagram Protocol (UDP)
Transport Layer Protocols
TCP UDP
A connection-oriented protocol A connectionless protocol
Uses specific handshake protocols (generally, SYN, SYN-ACK, ACK) No handshake
Guarantees the delivery of data to the destination router, thus making it reliable. Doesn’t guarantee the delivery of data to the destination
Packet sequence is verified Data is processed in order of arrival
Slower speed of transmission due to reordering and retransmission Faster because integrity is checked at the arrival time using checksum
Performs error checking and attempts error recovery.
Performs basic error checking and discards erroneous packets without
attempting error recovery.
TCP is heavy. It needs three packets to set up a socket connection before data
can be sent.
UDP is lightweight. There is no tracking of connections, ordering of
messages, etc.
Applications: File Transfer, Web Browsing, Email Live Streaming, online games, VoIP
Request Data
Response
23. UDP
UDP is a connectionless protocol which means the sender just transmits the data without waiting for the connection with the receiver. It
is an unreliable protocol when compared with TCP.
There is no error checking mechanism or correcting mechanism involved in data transmission which results in using less bandwidth.
UDP protocol just sends the packets (or datagram). There is no acknowledgement guarantee of packet received by the other end.
It allows for less data overhead and delays.
To achieve higher performance, the protocol allows individual packets to be dropped (with no retries) and UDP packets to be received in
a different order than they were sent, as dictated by the application.
Features of UDP
UDP can be used when acknowledgement of data does not hold any significance.
It is great for data flowing in one direction.
It is connectionless protocol.
It does not provide any congestion control mechanism.
It is a suitable protocol for streaming applications such as video conference applications, computer games etc.
UDP Datagrams
UDP traffic works through packets called datagram, with every datagram consisting of a single message unit. The header details are stored
in the first eight bytes, but the rest is what holds onto the actual message. The UDP datagram header can be divided into four parts: 1)
Source Port – 2) Destination Port – 3) Length – 4) Checksum –In UDP, checksum is optional, as opposed to TCP where checksum is
mandatory.
Advantages of UDP over TCP/IP Stack
It is better than TCP for applications that require constant data flow, bulk data and which require more swiftness than reliability.
For multicast and broadcast purposes, UDP is best suited because it supports point to multipoint transmission method. The sender does
not need to keep track of retransmission of data for multiple receivers in contrast with the TCP/IP where sender needs to take care of each
packet.
Both TCP and UDP run on the top of Internet Protocol (IP) that is why they are referred as TCP/IP and UDP/IP.
Multicast
Unicast
Broadcast
Hyper Text Transfer Protocol (HTTP)
Application Layer Protocols
Message Queuing Telemetry Transport (MQTT)
HTTP Request
HTTP Response
(Web Page, Image, PDF)
MQTT
MQTT HTTP
It works on publish/subscribe model It works on request/response model
It runs over Transmission Control Protocol It runs over Transmission Control Protocol
It has less complexity It is more complex
This protocol’s design is Data centric This protocol’s design is Document centric
The message size generated is less as it uses
binary format
The message size generated is more as it
uses ASCII format
It provides data security with SSL/TLS
It does not provide security but Https is built
for that
24. CoAP is a specialized Internet Application Protocol for constrained devices
It is intended for use in resource-constrained internet devices, such as wireless sensor network
nodes
It enables those constrained devices (nodes) to communicate with the wider Internet using similar
protocols.
CoAP is designed for use between devices on the same constrained network (e.g., low-power,
lossy networks), between devices and general nodes on the Internet, and between devices on
different constrained networks both joined by an internet
CoAP is designed to easily translate to HTTP for simplified integration with the web, while also
meeting specialized requirements such as multicast support, very low overhead, and simplicity.
Multicast, low overhead, and simplicity are extremely important for Internet of Things (IoT) and
Machine-to-Machine (M2M) devices.
CoAP can run on most devices that support UDP
It uses ACK messages so that it will become reliable like TCP. It has low latency and consumes
lesser power compare to HTTP
Constrained Application Protocol (CoAP)
Reliable Transmission Unreliable Transmission
Confirmable Request & Response Non-Confirmable Request & Response
Extensible Messaging and Presence
Protocol (XMPP)
Advanced Message Queuing
Protocol (AMQP)
Designed for instant messaging (IM),
presence information, and contact list
maintenance. Based on XML (Extensible
Markup Language), it enables the near-
real-time exchange of structured data
between two or more network entities.
The defining features of AMQP are message orientation,
queuing, routing (including point-to-point and publish-and-
subscribe)
25. Features CoAP HTTP
Protocol It uses UDP It uses TCP
Network layer It uses IPv6 along with 6LoWPAN It uses IP layer
Multicast support It supports It does not support
Architecture model
CoAP uses both client-Server &
Publish-Subscribe models
HTTP uses client and server
architecture
Synchronous communication CoAP does not need this HTTP needs this
Overhead Less overhead and it is simple
More overhead compare to
CoAP and it is complex
Application
Designed for resource constrained
networking devices such as
WSN/IoT/M2M
Designed for internet devices
where there is no issue of any
resources
MQTT CoAP XMPP AMQP
TCP UDP TCP TCP
Publish-Subscribe
Request-Response
Publish-Subscribe
Request-Response
Publish-Subscribe
Request-Response
Publish-Subscribe
Power Consumption -
Less
Power Consumption -
Medium
Power Consumption -High
Power Consumption -
Medium
A parking lot where
there are a number of
parking sensors
installed to identify the
number and location of
empty or vacant
parking spots.
Constrained devices
A smart thermostat that
can be accessed from a
smartphone via a web
server
AMQP is mostly used in
business messaging. It
usually defines devices
like mobile handsets,
communicating with
back-office data centers
IoT Communication Protocol Stack
IoT Protocols Stacks Communication protocols
IoT Layered Architecture
(3 Layer)
Application HTTP CoAP MQTT AMQP Application Layer
Transport TCP UDP TCP TCP
Network Layer
Network IP IP IP IP
Link Ethernet Link
Constrained
Link
WiFi Hart LR-WPAN Perception Layer
Existing IoT Use Cases
Financial Services Government and
Non-profit
Utilities and Resources Banking
Travel and Transportation
Healthcare and
Life Science
Manufacturing Retail and CPG
Insurance Telecom, Media and
Entertainment
26. Financial Services
Fraud detection
Protect trading data
Smart algorithm trading
Government and Non-profit
Public Safety
National Defence
Smart Cities
Asset Tracking
Flood monitoring
Infrastructure maintenance
Military personnel safety
Utilities and Resources
Energy Conservation
Water management
Smart metering
Smart Lighting
Power grid optimization
Waste management
Pipeline monitoring
Travel and Transportation
Delivery status monitoring
Fleet availability
Fuel indicators
Auto toll debits
Vehicle safety
Route optimization
Vehicle to vehicle communication
Healthcare and Life Science
Remote Patient monitoring
Hospital Asset management
Drug management
Workflow optimization
Virtual care
Manufacturing
Predictive maintenance
Asset Tracking
Supply Chain Management
Asset Tracking
Flood monitoring
Infrastructure maintenance
Military personnel safety
Retail
Theft Prevention
Indoor Navigation
Inventory monitoring
Product Recommendation
Power grid optimization
Smart Ordering & Payment
Vending Machines
Insurance
Claim management
Telecom, Media and Entertainment
Smart TV
Natural Resources
Agriculture
Mining
Oil and Gas
IoT in Transportation Smart Parking System
Every wireless node on a IEEE 802.15.4e mesh network has routing capabilities,
so data can travel to the network gateway via any combination of nodes. If one
path is blocked the network will simply find another. This means that network
gateway doesn’t need to be within range of every node on the network, making
the network incredibly scalable.
The most useful network
gateways can connect to
your computer, or to your
cloud applications on the
Internet, via both wired
and cellular data
connections. That means
you can put your gateways
just about anywhere.
Parking system network
gateways are often placed
at locations like entrances
and exits. There they can
connect to the wireless
mesh network as well as
nearby wired devices like
security cameras, card
readers and digital
signage. The gateway then
connects the entire system
to your controlling
software, whether your
software is on your
computer or up in the
cloud.
27. Smart Home System
IoT in an Integrated Smart Energy System
Energy
Democratization
Virtual Power
Plant
Smart Mobility
Energy Efficiency
Smart Building
Demand &
Response
Energy
Management
Distributed Energy
System
Optimized Energy
Grid
Preventive & Fault
Maintenance
Digitalized Energy
Generation
Utilities & Generation
Transmission & Distribution
Demand Side Services
Energy Supply
Regulation and Market
Regulation & market
Application Sector Description Benefits
Energy democratization Regulation
Providing access to the grid
for many small end users for peer to peer
electricity trade and choosing the
supplier freely.
Alleviating the hierarchy in the energy supply chain, market
power, and centralized supply; liquefying the energy market and
reducing the prices for consumers; and creating awareness on
energy use and efficiency
Aggregation of small
prosumers (virtual power
plants
Energy market
Aggregating load and generation of a group of
end users to offer to electricity, balancing, or
reserve markets
Mobilizing small loads to participate in competitive markets;
helping the grid by reducing load in peak times; Hedging the risk
of high electricity bills at peak hours; and improving flexibility of
the grid and reducing the need for balancing assets; Offering
profitability to consumers
Energy supply
Application Sector Description Benefits
Preventive maintenance
Upstream oil and
gas industry/utility
companies
Fault, leakage, and fatigue monitoring by
analyzing of big data collected through static
and mobile sensors or cameras
Reducing the risk of failure, production loss and maintenance
downtime; reducing the cost of O&M; and preventing accidents
and increasing safety.
Fault maintenance Energy market
Identifying failures and problems in energy
networks and possibly fixing them virtually
Improving reliability of a service; improving speed in fixing
leakage in district heating or failures in electricity grids; and
reducing maintenance time and risk of health/safety
Energy storage and
analytics
Industrial suppliers
or utility companies
Analyzing market data and possibilities for
activating flexibility options such as energy
storage in the systems
Reducing the risk of supply and demand imbalance; increasing
profitability in energy trade by optimal use of flexible and storage
options; and ensuring an optimal strategy for storage assets.
Digitalized power
generation
Utility companies &
system operator
Analyzing big data of and controlling many
generation units at different time scales
Improving security of supply; improving asset usage and
management; reducing the cost of provision of backup capacity;
accelerating the response to the loss of load; and reducing the
risk of blackout.
Transmission and Distribution (T&D) grid
Application Sector Description Benefits
Smart grids
Electric grid
management
A platform for operating the grid using big data and
ICT technologies as opposed to traditional grids.
Improving energy efficiency and integration of distributed generation
and load; improving security of supply; and reducing the need for
backup supply capacity and costs
Network management
Electric grid
operation
&management
Using big data at different points of the grid to
manage the grid more optimally
Identifying weak points and reinforcing the grid accordingly and
reducing the risk of blackout
Integrated control of electric
vehicle fleet (EV)
Electric grid
operation &
management
Analyzing data of charging stations and
charge/discharge cycles of EVs.
Improving the response to charging demand at peak times;
analyzing and forecasting the impact of EVs on load; and identifying
areas for installing new charging stations and reinforcement of the
distribution grid.
Control and management of
vehicle to grid (V2G)
residential/comme
rcial &industry
Central control (i.e., by shedding, shifting, or
leveling; load of many consumers by analyzing the
load and operation of appliances
Reducing demand at peak time, which itself reduces the grid
congestion; reducing consumer electricity bills; and reducing the
need for investment in grid backup capacity.
Microgrids Electricity grid
Platforms for managing a grid independent from
the central grid
Improving security of supply; creating interoperability and flexibility
between microgrids and the main grid; and offering stable electricity
prices for the consumers connected to the microgrid.
28. Demand side
Application Sector Description Benefits
Demand response
Residential/comm
ercial &industry
Central control (i.e., by shedding, shifting, or
leveling.
Reducing demand at peak time, which itself reduces the grid
congestion
Demand response(demand
side management
Residential/comm
ercial &industry
Central control (i.e., by shedding, shifting, or
leveling; load of many consumers by analyzing the
load and operation of appliances
Reducing demand at peak time, which itself reduces the grid
congestion; reducing consumer electricity bills; and reducing the
need for investment in grid backup capacity
Advanced metering
infrastructure
End users
Using sensors and devices to collect and analyze
the load and temperature data in a consumer site
Having access to detailed load variations indifferent time scale;
identifying areas for improving energy efficiency (for example overly
air-conditioned rooms or extra lights when there is no occupants);
and reducing the cost of energy use
Battery energy management End users
Data analytics for activating battery at the most
suitable time
Optimal strategy for charge/discharge of battery in different time
scale; improving energy efficiency and helping the grid at peak
times; and reducing the cost of energy use
Smart buildings End users
Centralized and remote control of appliances and
device
Improving comfort by optimal control of appliances and HVAC
systems; reducing manual intervention, saving time and energy;
increasing knowledge on energy use and environmental impact;
improving readiness for joining a smart grid or virtual power plant;
and improved integration of distributed generation and storage
systems
https://iot-analytics.com/top-10-iot-applications-in-2020/
Top Ten IoT Application Areas in 2020
Existing IoT Use Cases
Module 3
IoT Security and Privacy
Security and Privacy Risks
Analyze Security Risks
Technologies and Methods that Mitigate Security
Privacy Standards and Regulations
Social and Privacy impacts
IoT Applications
Vehicles
Devices (Medical,
Security, Data
Collection)
Smart office
Smart Tracking
Smart
Advertisement
Smart Appliances
Smart Kitchen
Security System
Smart Phone
Tablets
Wearable Objects
Smart Grid
Smart Road
Smart Traffic
Smart Parking
Smart Transport
Smart Agriculture
Smart Energy
Human Objects Homes Cities Trades Industries
29. IoT Solution Architecture - Stages Level 1-Edge Nodes: This level is composed of computing nodes such as sensors, micro-controllers, RFID readers, and several
types of RFID tags. Several security goals like integrity, confidentiality, and privacy should be taken into consideration from this level
upwards.
Level 2-Communication: This level consists of all enabler technologies (e.g., connectivity and communication protocols ) which
allow transportation of commands and data between objects in the first level and objects located at the third level.
Level 3-Edge Computing: The main objective of this level is to perform simple data processing which in turn decreases the
computation load in the higher level and offers a quick response. It is wise for real-time applications to process data closer to the
edge of the network, rather than to process data in the cloud. Many factors (e.g., service providers and computing nodes) can be used
to define the amount of data processing at this level.
Level 4-Data Accumulation: As most of IoT applications may not require immediate data processing, this level converts data in
motion to data at rest. It provides several functions, the most popular of which are changing packets to database tables, deciding if
data is of importance to higher levels, and minimizing data via filtering process.
Level 5- Data Abstraction: This level is used to store data for further processing. In general, this level provides several functions
such as normalization/denormalization, indexing, and access control to different data centers.
Level 6-Applications: The list of IoT applications operated at this level is almost endless in both sectors ( industries and markets).
Information interpretation can be provided as a result of cooperation between different applications, which in turn depends on data
either at rest or in motion at this level.
Level 7- Data Centers (DC) and Users: In this level, only authorized users should be allowed to communicate with IoT
applications to make use of their data. Such data may be stored remotely in DCs for further processing.
CIA Security Model
IoT Generic Model with Privacy and
Security Policies
Privacy and Security Policies
CIA
Confidentiality
Integrity
Availability
Confidentiality measures protect information, data, system, resources etc., from unauthorized view, access and misuse
Confidentiality
Passwords, access control lists and authentication procedures use software to control access to resources. These access control
methods are complemented by the use encryption to protect information that can be accessed despite the controls, such as emails that
are in transit. Additional confidentiality countermeasures include administrative solutions such as policies and training, as well as
physical controls that prevent people from accessing facilities and equipment.
Countermeasures:
Integrity measures protect information/data from unauthorized alteration. These measures provide assurance in the accuracy and
completeness of data.
Integrity
Countermeasures:
Access control and rigorous authentication can help prevent authorized users from making unauthorized changes. Hash verifications
and digital signatures can help ensure that transactions are authentic.
Aims to provide data for users whenever needed. User should be able to access data not only in normal conditions but also in
disastrous conditions. Some of the most fundamental threats to availability are non-malicious in nature and include hardware failures,
unscheduled software downtime and network bandwidth issues.
Availability
Countermeasures:
Backup servers and Data storage
Countermeasures to protect against DoS attacks include firewalls and routers.
30. External
Internal
Agent IoT Layers(3 Layers
Architecture)
Threats
Physical Layer
Network Layer
Data Process
Application
Layer
DoS
Tampering Jamming
Eavesdropping
De- synchronization
MITM Spoofing
Selective forwarding
Collision
Exhaustion Malware
System integrity
Client application Communication
Modifications
Unfairness Wormhole
Flooding
Multi-user access
Data access
IoT Threats
Tampering
Eavesdropping
Physical Layer - Threats
The hardware or software features of IoT objects are modified by the attackers via physical or cyber
methods.
Jamming
Fundamental security policies violation: Tampering targets the integrity of IoT systems.
It is the type of attack in which the data integrity is damaged by interfering the network traffic during the
communication of the objects. The jammer positioned between the sender and the receiver transmits a
high-power signal across the sensitive band range to disrupt the communication medium between the
objects.
Fundamental security policies violation: Integrity and Accessibility.
A passive listening attack. It is a technique that is used to access and retrieve the communication traffic
between IoT objects
Fundamental security policies violation: Confidentiality.
Denial-of-service(DoS)
Jamming
Eavesdropping
Physical Layer - Threats
DoS attacks are being made to disrupt the services of IoT platforms. In detail, the communication network
between IoT objects is blocked resulting in being non-communicating. IoT has a weakness against
attacks that disrupt its functioning, occupy resources and consume the energy of devices. The most
important type of attack affected by such weaknesses is the DoS attacks. Likewise, DoS attacks can
target all of the physical, data link, network, transmission and application layers of TCP/IP. The attacker
gets control of the target system by sending a continuous data request to the target IoT platform from
different locations
Fundamental security policies violation: Dos targets the accessibility of IoT systems.
Denial-of-service(DoS)
Denial-of-service attacks are characterized by an explicit attempt by attackers to prevent legitimate use
of a service.
Distributed DoS(DDoS) (Form of DoS attacks)
A distributed denial-of-service (DDoS) attack occurs when multiple systems flood the bandwidth or
resources of a targeted system, usually one or more web servers. A DDoS attack uses more than one
unique IP address or machines, often from thousands of hosts infected with malware. A distributed
denial of service attack typically involves more than around 3–5 nodes on different networks; fewer
nodes may qualify as a DoS attack but is not a DDoS attack