SlideShare uma empresa Scribd logo
1 de 37
Baixar para ler offline
CLOUD COMPUTING IN IOT
Seminar Report
CHAPTER 1
OVERVIEW OF CLOUD COMPUTING
Salesforce is one of the leading cloud computing platforms, which offers
its services over the cloud to its customers and partners. To better
understand the salesforce concept, it is mandatory to learn the basic
concepts behind the salesforce, which is cloud-computing. In this topic,
we will understand all the basics of the cloud-computing.
1.1 WHAT IS CLOUD-COMPUTING?
Cloud computing is a technology to store, manage, process, and access
the data over the internet instead of a local server or computer hard
drives. Here, the term cloud is taken from the symbol of the internet
users in the flowcharts. The remote servers are used in cloud computing
to store the data that can be accessed from anywhere using the internet.
With the help of cloud computing, an organization can save lots of cost
of local data storage, maintenance of data, etc. The information over the
cloud can be accessed by anyone, anywhere, and anytime, with the help
of the internet.
Using cloud computing instead of traditional storage helps users with
lots of benefits such as speed, cost-effectiveness, security, global access,
etc.
FIG 1
Cloud computing involves two main concepts:
o Vendors who provide the software apps on the clouds.
o Clients who access the software apps via cloud.
1.2 TYPES OF CLOUD SERVICES
Cloud computing provides IT services through the internet. These
services are placed in different remote places. The services can be
divided into three main categories:
1. Software-as-a-Service (SaaS)
2. Platform-as-a-Service (PaaS)
3. Infrastructure-as-a-Service (IaaS)
FIG 2
From the above three services, salesforce provides two
services: SAAS and PAAS, to its users.
FIG 3
Software-as-a-Service
Software-as-a-Service is a way of providing applications as a service
over the internet. SaaS services can be directly accessed using the
internet instead of installing each application on the local drive or
system.
Salesforce.com is the SAAS service provider that provides various
online applications for CRM. There is no need to install any software or
server on a local machine; instead we can start the business on this just
by singing-up.
Platform-as-a-Service
Platform-as-a-Service or PaaS is a type of cloud computing service
where a service provider such as Salesforce.com provides a platform to
their client to work on. On such platforms, the users or clients can run,
develop, test, or manage any business applications without any IT
infrastructure.
It lies between the SaaS and IaaS services, and provides a building block
by which we can create our solutions.
Google App Engine is one of the great examples of PaaS services.
Currently, it provides online Python and Java Runtime platforms to
develop web applications without any need for complicated software &
hardware.
Force.com platform also offers PaaS services. It uses its language
proprietary.
INFRASTRUCTURE-AS-A-SERVICE
IaaS is a type of cloud-computing service that offers the rental
computing infrastructures. The cloud provider provides various
infrastructure services such as servers, virtual machines, network
storage, etc.
The services can be scaled up and down as per the client requirements.
1.3 BENEFITS OF CLOUD-COMPUTING
1. Cost-Effective: The cloud computing platform is much cost-
effective, as there is no requirement to save data on local drives or
any hardware setup.
2. 24*7 Availability: One of the most significant advantages of cloud
computing is that the data or any service available in the cloud can
be accessed any time from anywhere.
3. High-Security: The data stored in the hard drives may be lost, and
if the data is highly confidential, it can highly affect any
organization. But with the cloud platforms, the data is highly
secured in the clouds, so the risk of the data lost is reduced with
cloud computing.
4. Easy Access: Cloud applications can be accessed from anywhere
and anytime.
5. Fast Implementation: To implement any new application, it may
take a long time. But with cloud applications, this time can be
reduced a lot. With most cloud applications, we just need to sign-
up, and we can start working on it.
6. Instant Scalability: Cloud-based applications enable the
organization to easily increase or decrease user's numbers as per
the requirement. Hence, we don't need to think about the
availability or running out of capacity.
7. Automated updates: Any application can take up to many days to
upgrade, maintain, or test the application. But with cloud
applications, such things are not necessary because the cloud
application has the automated update software that can be updated
automatically.
8. Collaboration: Cloud-computing enhances collaboration. It means
that various groups of an organization can connect virtually and
share useful information and data on the cloud-platforms. It
improves the customer services and product development process
in any organization
CHAPTER 2
WHAT IS AN INTERNET OF THINGS (IOT)
The term "Things" in the Internet of Things refers to anything and
everything in day to day life which is accessed or connected through the
internet.
IoT is an advanced automation and analytics system which deals with
artificial intelligence, sensor, networking, electronic, cloud messaging
etc. to deliver complete systems for the product or services. The system
created by IoT has greater transparency, control, and performance
FIG 4
FIG 5
If there is a common platform where all these things can connect to each
other would be great because based on my preference, I can set the room
temperature. For example, if I love the room temperature to to be set at
25 or 26-degree Celsius when I reach back home from my office, then
according to my car location, my AC would start before 10 minutes I
arrive at home. This can be done through the Internet of Things (IoT)
2.1 HOW DOES INTERNET OF THING (IOT) WORK?
The working of IoT is different for different IoT echo system
(architecture). However, the key concept of there working are similar.
The entire working process of IoT starts with the device themselves,
such as smartphones, digital watches, electronic appliances, which
securely communicate with the IoT platform. The platforms collect and
analyze the data from all multiple devices and platforms and transfer the
most valuable data with applications to devices.
FIG 6
FEATURES OF IOT
The most important features of IoT on which it works are connectivity,
analyzing, integrating, active engagement, and many more. Some of
them are listed below:
Connectivity: Connectivity refers to establish a proper connection
between all the things of IoT to IoT platform it may be server or cloud.
After connecting the IoT devices, it needs a high speed messaging
between the devices and cloud to enable reliable, secure and bi-
directional communication.
Analyzing: After connecting all the relevant things, it comes to real-time
analyzing the data collected and use them to build effective business
intelligence. If we have a good insight into data gathered from all these
things, then we call our system has a smart system.
Integrating: IoT integrating the various models to improve the user
experience as well.
Artificial Intelligence: IoT makes things smart and enhances life
through the use of data. For example, if we have a coffee machine whose
beans have going to end, then the coffee machine itself order the coffee
beans of your choice from the retailer.
Sensing: The sensor devices used in IoT technologies detect and
measure any change in the environment and report on their status. IoT
technology brings passive networks to active networks. Without sensors,
there could not hold an effective or true IoT environment.
Active Engagement: IoT makes the connected technology, product, or
services to active engagement between each other.
Endpoint Management: It is important to be the endpoint management
of all the IoT system otherwise, it makes the complete failure of the
system. For example, if a coffee machine itself order the coffee beans
when it goes to end but what happens when it orders the beans from a
retailer and we are not present at home for a few days, it leads to the
failure of the IoT system. So, there must be a need for endpoint
management.
CHAPTER 3
EMBEDDED DEVICES (SYSTEM) IN (IOT)
It is essential to know about the embedded devices while learning the
IoT or building the projects on IoT. The embedded devices are the
objects that build the unique computing system. These systems may or
may not connect to the Internet.
An embedded device system generally runs as a single application.
However, these devices can connect through the internet connection, and
able communicate through other network devices.
FIG 7
3.1 EMBEDDED SYSTEM HARDWARE
The embedded system can be of type microcontroller or type
microprocessor. Both of these types contain an integrated circuit (IC).
The essential component of the embedded system is a RISC family
microcontroller like Motorola 68HC11, PIC 16F84, Atmel 8051 and
many more. The most important factor that differentiates these
microcontrollers with the microprocessor like 8085 is their internal read
and writable memory. The essential embedded device components and
system architecture are specified below.
FIG 8
3.2 EMBEDDED SYSTEM SOFTWARE
The embedded system that uses the devices for the operating system is
based on the language platform, mainly where the real-time operation
would be performed. Manufacturers build embedded software in
electronics, e.g., cars, telephones, modems, appliances, etc. The
embedded system software can be as simple as lighting controls running
using an 8-bit microcontroller. It can also be complicated software for
missiles, process control systems, airplanes etc.
CHAPTER 4
IOT DECISION FRAMEWORK
The IoT decision framework provides a structured approach to create a
powerful IoT product strategy. The IoT decision framework is all about
the strategic decision making. The IoT Decision Framework helps us to
understand the areas where we need to make decisions and ensures
consistency across all of our strategic business decision, technical and
more.
The IoT decision framework is much more important as the product or
services communicates over networks goes through five different layers
of complexity of technology.
1. Device Hardware
2. Device Software
3. Communications
4. Cloud Platform
5. Cloud Application
FIG 9
4.1 DECISION AREA
The IoT decision framework pays attention to six key decision areas in
any IoT product. These decision areas are:
1. User Experience (UX)
2. Data
3. Business
4. Technology
5. Security
6. Standards & Regulations
Each of these decision areas is evaluated at each of the IoT Technology
Stack. The User Experience will be evaluated at Device Hardware,
Device Software and so to provide the better user experience. Then at
the next step Data Decision Area, we have to explore data considerations
for all the stages of IoT Technology Stack.
FIG 10
Decision Area of the IoT Decision Framework
Let's see each of the Decision Area of IoT Decision Framework in
detail:
1. User Experience Decision Area: This is the area where we
concentrate about who are the users, what are their requirements
and how to provide a great experience at each step of IoT stack
without worrying about the technical details.
2. Data Decision Area: In this area, we make the overall data
strategy such as the data flow over the entire IoT stack to fulfill the
user's requirements.
3. Business Decision Area: Based on the previous decisions area, we
make the decision how product or services will became financial
potential. At each of the IoT Stack level are monetized about the
costs of providing services.
4. Technology Decision Area: In this area, we work with the
technology for each layer to facilitate the final solution.
5. Security Decision Area: After going through the implementation
of technology it is important to decide and provide the security at
each stage of the IoT Stack.
6. Standards & Regulations Decision Area: At the last stage of IoT
Decision Area, we identify the standards and regulations of
product or services that will affect your product at each layer of the
IoT Stack.
CHAPTER 5
IOT ARCHITECTURE
There is not such a unique or standard consensus on the Internet of
Things (IoT) architecture which is universally defined. The IoT
architecture differs from their functional area and their solutions.
However, the IoT architecture technology mainly consists of four major
components:
5.1 COMPONENTS OF IOT ARCHITECTURE
o Sensors/Devices
o Gateways and Networks
o Cloud/Management Service Layer
o Application Layer
FIG 11
5.2 STAGES OF IOT SOLUTIONS ARCHITECTURE
There are several layers of IoT built upon the capability and
performance of IoT elements that provides the optimal solution to the
business enterprises and end-users. The IoT architecture is a
fundamental way to design the various elements of IoT, so that it can
deliver services over the networks and serve the needs for the future.
Following are the primary stages (layers) of IoT that provides the
solution for IoT architecture.
1. Sensors/Actuators: Sensors or Actuators are the devices that are
able to emit, accept and process data over the network. These
sensors or actuators may be connected either through wired or
wireless. This contains GPS, Electrochemical, Gyroscope, RFID,
etc. Most of the sensors need connectivity through sensors
gateways. The connection of sensors or actuators can be through a
Local Area Network (LAN) or Personal Area Network.
2. Gateways and Data Acquisition: As the large numbers of data are
produced by this sensors and actuators need the high-speed
Gateways and Networks to transfer the data. This network can be
of type Local Area Network (LAN such as WiFi, Ethernet, etc.),
Wide Area Network (WAN such as GSM, 5G, etc.).
3. Edge IT: Edge in the IoT Architecture is the hardware and
software gateways that analyze and pre-process the data before
transferring it to the cloud. If the data read from the sensors and
gateways are not changed from its previous reading value then it
does not transfer over the cloud, this saves the data used.
4. Data center/ Cloud: The Data Center or Cloud comes under the
Management Services which process the information through
analytics, management of device and security controls. Beside this
security controls and device management the cloud transfer the
data to the end users application such as Retail, Healthcare,
Emergency, Environment, and Energy, etc.
FIG 12
CHAPTER 6
IOT - PLATFORM
As in IoT, all the IoT devices are connected to other IoT devices and
application to transmit and receive information using protocols. There is
a gap between the IoT device and IoT application. An IoT Platform fills
the gap between the devices (sensors) and application (network). Thus
we can say that an IoT platform is an integrated service that fulfills the
gap between the IoT device and application and offers you to bring
physical object online.
FIG 13
There are several IoT Platforms available that provides facility to deploy
IoT application actively. Some of them are listed below:
Amazon Web Services (AWS) IoT platform: Amazon Web Service IoT
platform offers a set of services that connect to several devices and
maintain the security as well. This platform collects data from connected
devices and performs real-time actions.
Microsoft Azure IoT platform: Microsoft Azure IoT platform offers
strong security mechanism, scalability and easy integration with
systems. It uses standard protocols that support bi-directional
communication between connected devices and platform. Azure IoT
platform has an Azure Stream Analytics that processes a large amount of
information in real-time generated by sensors. Some common features
provided by this platform are:
o Information monitoring
o A rules engine
o Device shadowing
o Identity registry
Google Cloud Platform IoT: Google Cloud Platform is a global cloud
platform that provides a solution for IoT devices and applications. It
handles a large amount of data using Cloud IoT Core by connecting
various devices. It allows to apply BigQuery analysis or to apply
Machine learning on this data. Some of the features provided by Google
Cloud IoT Platform are:
o Cloud IoT Core
o Speed up IoT devices
o Cloud publisher-subscriber
o Cloud Machine Learning Engine
IBM Watson IoT platform: The IBM Watson IoT platform enables the
developer to deploy the application and building IoT solutions quickly.
This platform provides the following services:
o Real-time data exchange
o Device management
o Secure Communication
o Data sensor and weather data services
Artik Cloud IoT platform: Arthik cloud IoT platform is developed by
Samsung to enable devices to connect to cloud services. It has a set of
services that continuously connect devices to the cloud and start
gathering data. It stores the incoming data from connected devices and
combines this information. This platform contains a set of connectors
that connect to third-party services.
Bosch IoT Suite:
Bosch cloud IoT Suit is based on Germany. It offers safe and reliable
storing of data on its server in Germany. This platform supports full app
development from prototype to application development.
6.1 HOW IOT PLATFORM HELP:
o IoT Platform connects sensors and devices.
o IoT platform handles different software communication protocol
and hardware.
o IoT platform provides security and authentication for sensors and
users.
o It collects, visualizes, and analyzes the data gathered by the sensor
and device.
CHAPTER 7
THINGWORX IN INTERNET OF THINGS
The ThingWorx platform is a complete end-to-end technology platform
that is designed for industrial IoT. It facilitates the tools and services that
are required to develop and set-up connectivity, analysis, production of
other aspects of IoT development.
FIG 14
The ThingWorx IoT platform is a collection of modules that deliver the
flexibility, capability, and agility establishment required to implement
IoT applications. ThingWorx empowers businesses to develop and
deploy powerful applications rapidly and augmented reality (AR)
experiences.
ThingWorx is the first platform that connects the people, systems,
things, connection operations, connected products, connected
applications, etc. ThingWorx reduces the time, cost, and risk which are
required to build the IoT applications. It deploys the application 10-time
faster with model-based development.
FIG 15
ThingWorx allows you to deploy how you like by providing the
complete application design, runtime, and intelligent environment. The
ThingWorx IoT platform also has flexibility and scalability to adapt that
application in future.
FIG 16
Services of the ThingWorx platform in IoT
Following are the services and benefits provided by ThingWorx in IoT:
Reason Constructed Platform
This platform specially designed to provide the functionality for the
protection as well as the scalability to develop as the commercial
enterprise expands.
Development, Rapid Improvement, and Extensibility
It includes a platform module that comes together with the ThingModel.
The ThinkModel is a truthful digital illustration of items that enables
experience, studies, and quick apps delivery without any difficulty.
Flexibility
The ThingWorx platform has the flexibility to be deployed on-premises,
inside the cloud or a hybrid or both of these platforms.
Component of ThingWorx
ThingWorx offers several key components for application building. This
component includes Composer, Mashup builder, storage, search engine,
collaboration, and connectivity. The Composer provides a modeling
environment for designing , and testing. The Mashup builder is used for
dashboard building through common components such as buttons, lists,
wikis, gauges, etc. ThingWorx uses a search engine known as SQUEAL,
for search, query, and analysis.
CHAPTER 8
IOT PROTOCOL
8.1 IoT Data Link Communication Protocol
The IoT Data Link communication protocol provides service to the
Network Layer. There are various protocols and standard technologies
specified by the different organization for data link protocols.
A . BLUETOOTH
Bluetooth is a short-range wireless communication network over a radio
frequency. Bluetooth is mostly integrated into smartphones and mobile
devices. The Bluetooth communication network works within 2.4 ISM
band frequencies with data rate up to 3Mbps.
There are three categories of Bluetooth technology:
1. Bluetooth Classic
2. Bluetooth Low Energy
3. Bluetooth SmartReady
The features of Bluetooth 5.0 version is introduced as Bluetooth 5 which
have been developed entirely for the Internet of Things.
Properties of Bluetooth network
o Standard: Bluetooth 4.2
o Frequency: 2.4GHz
o Range: 50-150m
o Data transfer rates: 3Mbps
Advantages of Bluetooth network
o It is wireless.
o It is cheap.
o It is easy to install.
o It is free to use if the device is installed with it.
Disadvantages of Bluetooth network
o It is a short-range communication network.
o It connects only two devices at a time.
B. Bluetooth Low Energy
Bluetooth low energy (BLE) is a short-range communication network
protocol with PHY (physical layer) and MAC (Medium Access Control)
layer. It is designed for low-power devices which uses less data. BLE
always remain in sleep mode except when the connection between
devices is initiated and data transmission occurs, due to this it conserves
power of the device. Bluetooth low energy follows the master/slave
architecture and offers two types of frames that are adverting and data
frames. Slave node sent the advertising frame to discover one or more
dedicated advertisement channels. Master nodes sense this
advertisement channels to find slaves and connect them.
FIG 17
C. Z-Wave
Z-Wave is a wireless communication protocol with the frequency of
900MHz. The ranges of Z-Wave lies between 30 meters to 100 meters
with the data transfer rate of 100kbps so that it is suitable for small
messages in IoT applications for home automation. This communication
protocol operates on mesh network architecture with one and several
secondary controllers.
FIG 18
Properties of Z-Wave protocol
o Standard: Z-Wave Alliance ZAD12837 / ITU-T G.9959
o Frequency: 908.42GHz
o Range: 30-100m
o Data transfer rate: 100kbps
Advantages of Z-Wave protocol
o Low power consumption
o Remote or local control
o Simple installation
o Interoperability
Application of Z-Wave protocol
o Smart product and IoT based application
o Energy saving
o Home security
D. ZigBee Smart Energy
ZigBee is a low power, low data rate wireless personal area network
communication protocol. It is mostly used in home automation and
industrial settings. Since ZigBee is a low power communication
protocol, the IoT power devices used with ZigBee technology. The
ZigBee communication protocol is based on the IEEE 802.15.4 standard
operating at the 2.4GHz frequency. The ZigBee protocol supports star,
cluster or wireless mesh technology topology.
ZigBee uses the following devices in its network:
o Zigbee Coordinator
o Zigbee End Device
o Zigbee Router
FIG 19
Properties of ZigBee protocol
o Standard: ZigBee 3.0 based on IEEE802.15.4
o Frequency: 2.4GHz
o Range: 10-100m
o Data transfer rate: 250kbps
Advantages of ZigBee protocol
o Wireless
o Mesh networking
o Direct communication
o Low power consumption
Disadvantages of ZigBee protocol
o Costly
o Works with low speed within a small distance
Application of ZigBee protocol
o Commercial and residential control
o Personal and healthcare
o Home networking
o Industrial control and management
o Consumer electronics
E . LoRaWAN
LoRaWAN refers to Long Rage Wide Area Network which is a wide
area network protocol. It is an optimized low-power consumption
protocol design to support large-scale public networks with millions of
low-power devices. A single operator operates the LoRaWAN. The
LoRaWAN network is a bi-directional communication for IoT
application with low cost, mobility, and security.
Properties of LoRaWAN protocol
o Standard: LoRaWAN
o Frequency: Various
o Range: 2-5km (urban environment), 15km (suburban environment)
o Data Rates: 0.3-50 kbps.
8.2 IOT NETWORK LAYER PROTOCOLS
The network layer is divided into two sublayers: routing layer which
handles the transfer of packets from source to destination, and an
encapsulation layer that forms the packets.
A . RPL Protocol
RPL stands for Routing Protocol for Low-Power and Lossy Network. It
is a distance-vector protocol that supports a varity of Data Link
Protocols. RPL builds a Destination Oriented Directed Acyclic Graph
(DODAG) which has only one route from each leaf node to the root. All
the traffic in this DODAG is routed through the root. Initially, each node
sends a DODAG Information Object (DIO) announcing them self as a
root. This information travels in the network, and complete DODAG is
gradually built. When a new node wants to join the network, it sends a
DODAG Information Solicitation (DIS) request and root responds back
with a DAO Acknowledgment (DAO-ACK) confirming the join.
B. CORPL Protocol
CORPL protocol is the extension of the RPL protocol, which is termed
as cognitive RPL. This network protocol is designed for cognitive
networks and uses DODAG topology. CORPL protocol makes two new
modifications in the RPL protocol. It uses opportunistic forwarding to
forward a packet between the nodes. Each node of CORPL protocol
keeps the information of forwarding set rather than parents only
maintaining it. Each node updates its changes to its neighbor using DIO
messages. On the basis of this updated message, each node frequently
updates its neighbor for constant forwarder set.
C . CARP Protocol
CARP (Channel-Aware Routing Protocol) is a distributed routing
protocol. It is designed for underwater communication. It has
lightweight packets so that it can be used for Internet of Things (IoT). It
performs two different functionalities: network initialization and data
forwarding. CARP protocol does not support previously collected data.
Hence, it is not beneficial for those IoT or other application where data
is changed frequently. The upgradation of CARP is done in E-CARP
which overcomes the limitation of CARP. The E-CARP allows the sink
node to save previously received sensory data.
D . 6LoWPAN
The 6LoWPAN protocol refers to IPv6 Low Power Personal Area
Network which uses a lightweight IP-based communication to travel
over low data rate networks. It has limited processing ability to transfer
information wirelessly using an internet protocol. So, it is mainly used
for home and building automation. The 6LoWPAN protocol operates
only within the 2.4 GHz frequency range with 250 kbps transfer rate. It
has a maximum length of 128-bit header packets.
6LowPAN Security Measure
Security is a major issue for 6LowPAN communication Protocol. There
are several attacks issues at the security level of 6LoWPAN which aim
is to direct destruction of the network. Since it is the combination of two
systems, so, there is a possibility of attack from two sides that targets all
the layer of the 6LoWPAN stack (Physical layer, Data link layer,
Adaptation layer, Network layer, Transport layer, Application layer).
Properties of 6LowPAN protocol
o Standard: RFC6282
o Frequency: Used over a variety of other networking media
including Bluetooth Smart (2.4GHz) or ZigBee or low-power RF
(sub-1GHz)
o Range: NA
o Data Rates: NA
8.3 IoT Session Layer Protocols
The session layer protocols review standards and protocols for message
passing. Different standardization organizations introduce the IoT
session layer protocols. There are different types of session layer
protocol available with different functionality and range. MQTT and
CoAP provide these needs through small message sizes, message
management, and lightweight message overhead.
A .MQTT (Message Queue Telemetry Transport)
MQTT (Message Queue Telemetry Transport) is a messaging protocol
which was introduced by IBM in 1999. It was initially built for
monitoring sensor node and faraway tracking in IoT. Its suits are small,
cheap, low-memory and low-power devices. MQTT provides embedded
connectivity between applications and middleware in one side and
another side it connects networks and communicators.
MQTT protocol is based on publish/subscribe architecture. The
publish/subscribe architecture consists of three major components:
publishers, subscribers, and a broker. According to IoT point of view,
publishers are lightweight sensor devices that send their data to
connected broker and goes back to sleep whenever possible. Subscribers
are applications, which are interested in a certain topic or sensory data,
so they are connected to brokers to be informed whenever new data are
received. The broker receives the sensory data and filters them in
different topics and sends them to subscribers according to interest in the
topics.
FIG 20
B . SMQTT (Secure Message Queue Telemetry Transport)
SMQTT (Secure Message Queue Telemetry Transport) is an extension
of MQTT protocol which uses encryption based on lightweight attribute
encryption. The main advantage of this encryption is that it has a
broadcast encryption feature. In this features, one message is encrypted
and delivered to multiple other nodes. The process of message transfer
and receiving consists of four major stages:
1. Setup: In this phase, the publishers and subscribers register
themselves to the broker and get a secret master key.
2. Encryption: When the data is published to broker, it is encrypted
by broker.
3. Publish: The broker publishes the encrypted message to the
subscribers.
4. Decryption: Finally the received message is decrypted by
subscribers with the same master key.
SMQTT is proposed only to enhance MQTT security feature.
C . CoAP
CoAP (Constrained Application Protocol) is a session layer protocol that
provides the RESTful (HTTP) interface between HTTP client and
server. It is designed by IETF Constrained RESTful Environment
(CoRE) working group. It is designed to use devices on the same
constrained network between devices and general nodes on the Internet.
CoAP enables low-power sensors to use RESTful services while
meeting their low power constraints. This protocol is specially built for
IoT systems primarily based on HTTP protocols.
This network is used within the limited network or in a constrained
environment. The whole architecture of CoAP consists of CoAP client,
CoAP server, REST CoAP proxy, and REST internet.
FIG 21
The data is sent from CoAP clients (such as smartphones, RFID sensors,
etc.) to the CoAP server and the same message is routed to REST CoAP
proxy. The REST CoAP proxy interacts outside the CoAP environment
and uploads the data over REST internet.
D .DDS
DDS (Data Distribution Service) is a middleware (sometimes called
machine-to-machine (M2M)) communication protocol. It is
implemented by the Object Management Group (OMG) standard for the
real-time system with high speed and high-performance, scalable,
dependable, and interoperable data exchange. This communication
protocol is based on a publish-subscribe pattern for sending and
receiving data, events, and commands among the nodes.
The DDS protocol has two main layers:
o Data-Centric Publish-Subscribe (DCPS): This layer delivers the
information to subscribers.
o Data-Local Reconstruction Layer (DLRL): This layer provides an
interface to DCPS functionalities, permitting the sharing of
distributed data amongst IoT enabled objects
CHAPTER 9
ADVANTAGES AND DISADVANTAGES OF (IOT)
Any technology available today has not reached to its 100 % capability.
It always has a gap to go. So, we can say that Internet of Things has a
significant technology in a world that can help other technologies to
reach its accurate and complete 100 % capability as well.
Let's take a look over the major, advantages, and disadvantages of the
Internet of Things.
9.1 ADVANTAGES OF IOT
Internet of things facilitates the several advantages in day-to-day life in
the business sector. Some of its benefits are given below:
• Efficient resource utilization: If we know the functionality and the
way that how each device work we definitely increase the efficient
resource utilization as well as monitor natural resources.
• Minimize human effort: As the devices of IoT interact and
communicate with each other and do lot of task for us, then they
minimize the human effort.
• Save time: As it reduces the human effort then it definitely saves
out time. Time is the primary factor which can save through IoT
platform.
• Enhance Data Collection:
• Improve security: Now, if we have a system that all these things
are interconnected then we can make the system more secure and
efficient.
9.2 DISADVANTAGES OF IOT
As the Internet of things facilitates a set of benefits, it also creates a
significant set of challenges. Some of the IoT challenges are given
below:
o Security: As the IoT systems are interconnected and communicate
over networks. The system offers little control despite any security
measures, and it can be lead the various kinds of network attacks.
o Privacy: Even without the active participation on the user, the IoT
system provides substantial personal data in maximum detail.
o Complexity: The designing, developing, and maintaining and
enabling the large technology to IoT system is quite complicated.
9.3 CONCLUSION
• As IoT becomes more pervasive, edge computing will do the same.
• The ability to analyze data closer to the source will minimize
latency, reduce the load on the internet, improve privacy and
security, and lower data management costs.
• The cloud will continue to play a critical role in aggregating
important data and performing analyses on this massive set of
information to glean insights that can be distributed back to the
edge devices.
• The combination of edge and cloud computing will help you better
manage and analyze your data and significantly increase the value
of your IoT efforts
9.4 REFERENCES
• https://www.javatpoint.com/iot-internet-of-things
• https://www.javatpoint.com/salesforce-overview-of-cloud-
computing

Mais conteúdo relacionado

Mais procurados

Challenges and application of Internet of Things
Challenges and application of Internet of ThingsChallenges and application of Internet of Things
Challenges and application of Internet of ThingsAshutosh Bhardwaj
 
IoT Cloud architecture
IoT Cloud architectureIoT Cloud architecture
IoT Cloud architectureMachinePulse
 
Internet of Things(IoT) - Introduction and Research Areas for Thesis
Internet of Things(IoT) - Introduction and Research Areas for ThesisInternet of Things(IoT) - Introduction and Research Areas for Thesis
Internet of Things(IoT) - Introduction and Research Areas for ThesisWriteMyThesis
 
INTERNET OF THING PRESENTATION ON PUBLIC SPEAKING
INTERNET OF THING PRESENTATION ON PUBLIC SPEAKINGINTERNET OF THING PRESENTATION ON PUBLIC SPEAKING
INTERNET OF THING PRESENTATION ON PUBLIC SPEAKINGAYESHA JAVED
 
Internet of things (IoT)
Internet of things (IoT)Internet of things (IoT)
Internet of things (IoT)Prakash Honnur
 
Iot architecture
Iot architectureIot architecture
Iot architectureAnam Iqbal
 
Introduction to IoT Architectures and Protocols
Introduction to IoT Architectures and ProtocolsIntroduction to IoT Architectures and Protocols
Introduction to IoT Architectures and ProtocolsAbdullah Alfadhly
 
Internet of things
Internet of thingsInternet of things
Internet of thingsPalak Sood
 
IoT and its Applications
IoT and its ApplicationsIoT and its Applications
IoT and its ApplicationsAbdulla Shaheen
 
IoT Fundamentals.pdf
IoT Fundamentals.pdfIoT Fundamentals.pdf
IoT Fundamentals.pdfVishnumayaN1
 
Internet of Things Overview
Internet of Things OverviewInternet of Things Overview
Internet of Things OverviewRomin Irani
 
EDGE COMPUTING: VISION AND CHALLENGES
EDGE COMPUTING: VISION AND CHALLENGESEDGE COMPUTING: VISION AND CHALLENGES
EDGE COMPUTING: VISION AND CHALLENGESsuthi
 
Privacy and security in IoT
Privacy and security in IoTPrivacy and security in IoT
Privacy and security in IoTVasco Veloso
 

Mais procurados (20)

Challenges and application of Internet of Things
Challenges and application of Internet of ThingsChallenges and application of Internet of Things
Challenges and application of Internet of Things
 
IoT Cloud architecture
IoT Cloud architectureIoT Cloud architecture
IoT Cloud architecture
 
Internet of Robotic Things
Internet of Robotic ThingsInternet of Robotic Things
Internet of Robotic Things
 
Internet of Things(IoT) - Introduction and Research Areas for Thesis
Internet of Things(IoT) - Introduction and Research Areas for ThesisInternet of Things(IoT) - Introduction and Research Areas for Thesis
Internet of Things(IoT) - Introduction and Research Areas for Thesis
 
Internet of Things (IoT) - IK
Internet of Things (IoT) - IKInternet of Things (IoT) - IK
Internet of Things (IoT) - IK
 
INTERNET OF THING PRESENTATION ON PUBLIC SPEAKING
INTERNET OF THING PRESENTATION ON PUBLIC SPEAKINGINTERNET OF THING PRESENTATION ON PUBLIC SPEAKING
INTERNET OF THING PRESENTATION ON PUBLIC SPEAKING
 
Internet of things (IoT)
Internet of things (IoT)Internet of things (IoT)
Internet of things (IoT)
 
Iot architecture
Iot architectureIot architecture
Iot architecture
 
Introduction to IoT Architectures and Protocols
Introduction to IoT Architectures and ProtocolsIntroduction to IoT Architectures and Protocols
Introduction to IoT Architectures and Protocols
 
Internet of things
Internet of thingsInternet of things
Internet of things
 
Iot - Internet of Things
Iot - Internet of ThingsIot - Internet of Things
Iot - Internet of Things
 
Fog computing in IoT
Fog computing in IoTFog computing in IoT
Fog computing in IoT
 
Edge Computing.pptx
Edge Computing.pptxEdge Computing.pptx
Edge Computing.pptx
 
IoT and its Applications
IoT and its ApplicationsIoT and its Applications
IoT and its Applications
 
IoT ppt
IoT pptIoT ppt
IoT ppt
 
IoT Fundamentals.pdf
IoT Fundamentals.pdfIoT Fundamentals.pdf
IoT Fundamentals.pdf
 
Internet of Things Overview
Internet of Things OverviewInternet of Things Overview
Internet of Things Overview
 
Iot ppt
Iot pptIot ppt
Iot ppt
 
EDGE COMPUTING: VISION AND CHALLENGES
EDGE COMPUTING: VISION AND CHALLENGESEDGE COMPUTING: VISION AND CHALLENGES
EDGE COMPUTING: VISION AND CHALLENGES
 
Privacy and security in IoT
Privacy and security in IoTPrivacy and security in IoT
Privacy and security in IoT
 

Semelhante a Cloud computing in iot seminar report

cloud computing is the delivery of computing services
cloud computing is the delivery of computing servicescloud computing is the delivery of computing services
cloud computing is the delivery of computing servicesabidhassan225
 
Ultimate list of 50 Best IoT platforms of 2019
Ultimate list of 50 Best  IoT platforms of 2019Ultimate list of 50 Best  IoT platforms of 2019
Ultimate list of 50 Best IoT platforms of 2019ThingsCloud
 
Progea Cloud - Databoom eng
Progea Cloud - Databoom engProgea Cloud - Databoom eng
Progea Cloud - Databoom engSimona Giosa
 
Unit 3 - Internet of Things - www.rgpvnotes.in.pdf
Unit 3 - Internet of Things - www.rgpvnotes.in.pdfUnit 3 - Internet of Things - www.rgpvnotes.in.pdf
Unit 3 - Internet of Things - www.rgpvnotes.in.pdfShubhamYadav73126
 
Fog Computing An Empirical Study
Fog Computing An Empirical StudyFog Computing An Empirical Study
Fog Computing An Empirical Studyijtsrd
 
IoT for Everyday Life
IoT for Everyday LifeIoT for Everyday Life
IoT for Everyday Lifeijsrd.com
 
Ijirsm choudhari-priyanka-backup-and-restore-in-smartphone-using-mobile-cloud...
Ijirsm choudhari-priyanka-backup-and-restore-in-smartphone-using-mobile-cloud...Ijirsm choudhari-priyanka-backup-and-restore-in-smartphone-using-mobile-cloud...
Ijirsm choudhari-priyanka-backup-and-restore-in-smartphone-using-mobile-cloud...IJIR JOURNALS IJIRUSA
 
Virtual Private Networks Pros And Cons
Virtual Private Networks Pros And ConsVirtual Private Networks Pros And Cons
Virtual Private Networks Pros And ConsKristina Camacho
 
Cloud computing vs edge computing
Cloud computing vs edge computingCloud computing vs edge computing
Cloud computing vs edge computingAliAbdelwahab6
 
Cloud Computing Technology
Cloud Computing TechnologyCloud Computing Technology
Cloud Computing TechnologyAhmed Al Salih
 

Semelhante a Cloud computing in iot seminar report (20)

iot
iotiot
iot
 
cloud computing is the delivery of computing services
cloud computing is the delivery of computing servicescloud computing is the delivery of computing services
cloud computing is the delivery of computing services
 
Cloud Computing Neccesity
Cloud Computing  NeccesityCloud Computing  Neccesity
Cloud Computing Neccesity
 
INTERNET OF THINGS
INTERNET OF THINGSINTERNET OF THINGS
INTERNET OF THINGS
 
Ultimate list of 50 Best IoT platforms of 2019
Ultimate list of 50 Best  IoT platforms of 2019Ultimate list of 50 Best  IoT platforms of 2019
Ultimate list of 50 Best IoT platforms of 2019
 
Progea Cloud - Databoom eng
Progea Cloud - Databoom engProgea Cloud - Databoom eng
Progea Cloud - Databoom eng
 
Unit 3 - Internet of Things - www.rgpvnotes.in.pdf
Unit 3 - Internet of Things - www.rgpvnotes.in.pdfUnit 3 - Internet of Things - www.rgpvnotes.in.pdf
Unit 3 - Internet of Things - www.rgpvnotes.in.pdf
 
akashgupta(2).pptx
akashgupta(2).pptxakashgupta(2).pptx
akashgupta(2).pptx
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Fog Computing An Empirical Study
Fog Computing An Empirical StudyFog Computing An Empirical Study
Fog Computing An Empirical Study
 
VMware pulse IoT center, an IoT management suite
VMware pulse IoT center, an IoT management suiteVMware pulse IoT center, an IoT management suite
VMware pulse IoT center, an IoT management suite
 
106248842 cc
106248842 cc106248842 cc
106248842 cc
 
IoT for Everyday Life
IoT for Everyday LifeIoT for Everyday Life
IoT for Everyday Life
 
Ijirsm choudhari-priyanka-backup-and-restore-in-smartphone-using-mobile-cloud...
Ijirsm choudhari-priyanka-backup-and-restore-in-smartphone-using-mobile-cloud...Ijirsm choudhari-priyanka-backup-and-restore-in-smartphone-using-mobile-cloud...
Ijirsm choudhari-priyanka-backup-and-restore-in-smartphone-using-mobile-cloud...
 
IoT Cloud Applications | Role of Cloud Backend in IoT
IoT Cloud Applications | Role of Cloud Backend in IoTIoT Cloud Applications | Role of Cloud Backend in IoT
IoT Cloud Applications | Role of Cloud Backend in IoT
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Virtual Private Networks Pros And Cons
Virtual Private Networks Pros And ConsVirtual Private Networks Pros And Cons
Virtual Private Networks Pros And Cons
 
Cloud computing vs edge computing
Cloud computing vs edge computingCloud computing vs edge computing
Cloud computing vs edge computing
 
Cloud Computing Technology
Cloud Computing TechnologyCloud Computing Technology
Cloud Computing Technology
 
8. 9590 1-pb
8. 9590 1-pb8. 9590 1-pb
8. 9590 1-pb
 

Mais de SKS

Uses of ethical theories in professional ethics
Uses of ethical theories in professional ethicsUses of ethical theories in professional ethics
Uses of ethical theories in professional ethicsSKS
 
Deep learning seminar report
Deep learning seminar reportDeep learning seminar report
Deep learning seminar reportSKS
 
Network virtualization seminar report
Network virtualization seminar reportNetwork virtualization seminar report
Network virtualization seminar reportSKS
 
Security in IoT
Security in IoTSecurity in IoT
Security in IoTSKS
 
Reinforcement learning
Reinforcement  learningReinforcement  learning
Reinforcement learningSKS
 
Variety of moral issues
Variety of moral issuesVariety of moral issues
Variety of moral issuesSKS
 
Research ethics
Research ethicsResearch ethics
Research ethicsSKS
 
Industrial standards
Industrial standardsIndustrial standards
Industrial standardsSKS
 
Engineers are responsible experimenters
Engineers are responsible experimentersEngineers are responsible experimenters
Engineers are responsible experimentersSKS
 
Engineering as experimentation
Engineering as experimentationEngineering as experimentation
Engineering as experimentationSKS
 
Controversy and consensus
Controversy and consensusControversy and consensus
Controversy and consensusSKS
 
Codes of ethics
Codes of ethicsCodes of ethics
Codes of ethicsSKS
 
Codes of ethics
Codes of ethicsCodes of ethics
Codes of ethicsSKS
 
A balanced outlook on the law
A balanced outlook on  the lawA balanced outlook on  the law
A balanced outlook on the lawSKS
 
Theories about the right decision
Theories about the right decision Theories about the right decision
Theories about the right decision SKS
 
Safety and risk
Safety and riskSafety and risk
Safety and riskSKS
 
Risk-benefit analysis
Risk-benefit analysisRisk-benefit analysis
Risk-benefit analysisSKS
 
Reducing risk
Reducing riskReducing risk
Reducing riskSKS
 
Chernobyl case study
Chernobyl case studyChernobyl case study
Chernobyl case studySKS
 
Assessment of safety and risk
Assessment of safety and riskAssessment of safety and risk
Assessment of safety and riskSKS
 

Mais de SKS (20)

Uses of ethical theories in professional ethics
Uses of ethical theories in professional ethicsUses of ethical theories in professional ethics
Uses of ethical theories in professional ethics
 
Deep learning seminar report
Deep learning seminar reportDeep learning seminar report
Deep learning seminar report
 
Network virtualization seminar report
Network virtualization seminar reportNetwork virtualization seminar report
Network virtualization seminar report
 
Security in IoT
Security in IoTSecurity in IoT
Security in IoT
 
Reinforcement learning
Reinforcement  learningReinforcement  learning
Reinforcement learning
 
Variety of moral issues
Variety of moral issuesVariety of moral issues
Variety of moral issues
 
Research ethics
Research ethicsResearch ethics
Research ethics
 
Industrial standards
Industrial standardsIndustrial standards
Industrial standards
 
Engineers are responsible experimenters
Engineers are responsible experimentersEngineers are responsible experimenters
Engineers are responsible experimenters
 
Engineering as experimentation
Engineering as experimentationEngineering as experimentation
Engineering as experimentation
 
Controversy and consensus
Controversy and consensusControversy and consensus
Controversy and consensus
 
Codes of ethics
Codes of ethicsCodes of ethics
Codes of ethics
 
Codes of ethics
Codes of ethicsCodes of ethics
Codes of ethics
 
A balanced outlook on the law
A balanced outlook on  the lawA balanced outlook on  the law
A balanced outlook on the law
 
Theories about the right decision
Theories about the right decision Theories about the right decision
Theories about the right decision
 
Safety and risk
Safety and riskSafety and risk
Safety and risk
 
Risk-benefit analysis
Risk-benefit analysisRisk-benefit analysis
Risk-benefit analysis
 
Reducing risk
Reducing riskReducing risk
Reducing risk
 
Chernobyl case study
Chernobyl case studyChernobyl case study
Chernobyl case study
 
Assessment of safety and risk
Assessment of safety and riskAssessment of safety and risk
Assessment of safety and risk
 

Último

How to Add Existing Field in One2Many Tree View in Odoo 17
How to Add Existing Field in One2Many Tree View in Odoo 17How to Add Existing Field in One2Many Tree View in Odoo 17
How to Add Existing Field in One2Many Tree View in Odoo 17Celine George
 
How to Make a Field read-only in Odoo 17
How to Make a Field read-only in Odoo 17How to Make a Field read-only in Odoo 17
How to Make a Field read-only in Odoo 17Celine George
 
Riddhi Kevadiya. WILLIAM SHAKESPEARE....
Riddhi Kevadiya. WILLIAM SHAKESPEARE....Riddhi Kevadiya. WILLIAM SHAKESPEARE....
Riddhi Kevadiya. WILLIAM SHAKESPEARE....Riddhi Kevadiya
 
5 charts on South Africa as a source country for international student recrui...
5 charts on South Africa as a source country for international student recrui...5 charts on South Africa as a source country for international student recrui...
5 charts on South Africa as a source country for international student recrui...CaraSkikne1
 
Unveiling the Intricacies of Leishmania donovani: Structure, Life Cycle, Path...
Unveiling the Intricacies of Leishmania donovani: Structure, Life Cycle, Path...Unveiling the Intricacies of Leishmania donovani: Structure, Life Cycle, Path...
Unveiling the Intricacies of Leishmania donovani: Structure, Life Cycle, Path...Dr. Asif Anas
 
EBUS5423 Data Analytics and Reporting Bl
EBUS5423 Data Analytics and Reporting BlEBUS5423 Data Analytics and Reporting Bl
EBUS5423 Data Analytics and Reporting BlDr. Bruce A. Johnson
 
How to Add a New Field in Existing Kanban View in Odoo 17
How to Add a New Field in Existing Kanban View in Odoo 17How to Add a New Field in Existing Kanban View in Odoo 17
How to Add a New Field in Existing Kanban View in Odoo 17Celine George
 
Work Experience for psp3 portfolio sasha
Work Experience for psp3 portfolio sashaWork Experience for psp3 portfolio sasha
Work Experience for psp3 portfolio sashasashalaycock03
 
AUDIENCE THEORY -- FANDOM -- JENKINS.pptx
AUDIENCE THEORY -- FANDOM -- JENKINS.pptxAUDIENCE THEORY -- FANDOM -- JENKINS.pptx
AUDIENCE THEORY -- FANDOM -- JENKINS.pptxiammrhaywood
 
DUST OF SNOW_BY ROBERT FROST_EDITED BY_ TANMOY MISHRA
DUST OF SNOW_BY ROBERT FROST_EDITED BY_ TANMOY MISHRADUST OF SNOW_BY ROBERT FROST_EDITED BY_ TANMOY MISHRA
DUST OF SNOW_BY ROBERT FROST_EDITED BY_ TANMOY MISHRATanmoy Mishra
 
How to Show Error_Warning Messages in Odoo 17
How to Show Error_Warning Messages in Odoo 17How to Show Error_Warning Messages in Odoo 17
How to Show Error_Warning Messages in Odoo 17Celine George
 
How to Manage Cross-Selling in Odoo 17 Sales
How to Manage Cross-Selling in Odoo 17 SalesHow to Manage Cross-Selling in Odoo 17 Sales
How to Manage Cross-Selling in Odoo 17 SalesCeline George
 
Quality Assurance_GOOD LABORATORY PRACTICE
Quality Assurance_GOOD LABORATORY PRACTICEQuality Assurance_GOOD LABORATORY PRACTICE
Quality Assurance_GOOD LABORATORY PRACTICESayali Powar
 
HED Office Sohayok Exam Question Solution 2023.pdf
HED Office Sohayok Exam Question Solution 2023.pdfHED Office Sohayok Exam Question Solution 2023.pdf
HED Office Sohayok Exam Question Solution 2023.pdfMohonDas
 
How to Send Emails From Odoo 17 Using Code
How to Send Emails From Odoo 17 Using CodeHow to Send Emails From Odoo 17 Using Code
How to Send Emails From Odoo 17 Using CodeCeline George
 
Drug Information Services- DIC and Sources.
Drug Information Services- DIC and Sources.Drug Information Services- DIC and Sources.
Drug Information Services- DIC and Sources.raviapr7
 
Slides CapTechTalks Webinar March 2024 Joshua Sinai.pptx
Slides CapTechTalks Webinar March 2024 Joshua Sinai.pptxSlides CapTechTalks Webinar March 2024 Joshua Sinai.pptx
Slides CapTechTalks Webinar March 2024 Joshua Sinai.pptxCapitolTechU
 
Over the counter (OTC)- Sale, rational use.pptx
Over the counter (OTC)- Sale, rational use.pptxOver the counter (OTC)- Sale, rational use.pptx
Over the counter (OTC)- Sale, rational use.pptxraviapr7
 
CHUYÊN ĐỀ DẠY THÊM TIẾNG ANH LỚP 11 - GLOBAL SUCCESS - NĂM HỌC 2023-2024 - HK...
CHUYÊN ĐỀ DẠY THÊM TIẾNG ANH LỚP 11 - GLOBAL SUCCESS - NĂM HỌC 2023-2024 - HK...CHUYÊN ĐỀ DẠY THÊM TIẾNG ANH LỚP 11 - GLOBAL SUCCESS - NĂM HỌC 2023-2024 - HK...
CHUYÊN ĐỀ DẠY THÊM TIẾNG ANH LỚP 11 - GLOBAL SUCCESS - NĂM HỌC 2023-2024 - HK...Nguyen Thanh Tu Collection
 

Último (20)

How to Add Existing Field in One2Many Tree View in Odoo 17
How to Add Existing Field in One2Many Tree View in Odoo 17How to Add Existing Field in One2Many Tree View in Odoo 17
How to Add Existing Field in One2Many Tree View in Odoo 17
 
How to Make a Field read-only in Odoo 17
How to Make a Field read-only in Odoo 17How to Make a Field read-only in Odoo 17
How to Make a Field read-only in Odoo 17
 
Riddhi Kevadiya. WILLIAM SHAKESPEARE....
Riddhi Kevadiya. WILLIAM SHAKESPEARE....Riddhi Kevadiya. WILLIAM SHAKESPEARE....
Riddhi Kevadiya. WILLIAM SHAKESPEARE....
 
5 charts on South Africa as a source country for international student recrui...
5 charts on South Africa as a source country for international student recrui...5 charts on South Africa as a source country for international student recrui...
5 charts on South Africa as a source country for international student recrui...
 
Unveiling the Intricacies of Leishmania donovani: Structure, Life Cycle, Path...
Unveiling the Intricacies of Leishmania donovani: Structure, Life Cycle, Path...Unveiling the Intricacies of Leishmania donovani: Structure, Life Cycle, Path...
Unveiling the Intricacies of Leishmania donovani: Structure, Life Cycle, Path...
 
EBUS5423 Data Analytics and Reporting Bl
EBUS5423 Data Analytics and Reporting BlEBUS5423 Data Analytics and Reporting Bl
EBUS5423 Data Analytics and Reporting Bl
 
How to Add a New Field in Existing Kanban View in Odoo 17
How to Add a New Field in Existing Kanban View in Odoo 17How to Add a New Field in Existing Kanban View in Odoo 17
How to Add a New Field in Existing Kanban View in Odoo 17
 
Work Experience for psp3 portfolio sasha
Work Experience for psp3 portfolio sashaWork Experience for psp3 portfolio sasha
Work Experience for psp3 portfolio sasha
 
AUDIENCE THEORY -- FANDOM -- JENKINS.pptx
AUDIENCE THEORY -- FANDOM -- JENKINS.pptxAUDIENCE THEORY -- FANDOM -- JENKINS.pptx
AUDIENCE THEORY -- FANDOM -- JENKINS.pptx
 
DUST OF SNOW_BY ROBERT FROST_EDITED BY_ TANMOY MISHRA
DUST OF SNOW_BY ROBERT FROST_EDITED BY_ TANMOY MISHRADUST OF SNOW_BY ROBERT FROST_EDITED BY_ TANMOY MISHRA
DUST OF SNOW_BY ROBERT FROST_EDITED BY_ TANMOY MISHRA
 
How to Show Error_Warning Messages in Odoo 17
How to Show Error_Warning Messages in Odoo 17How to Show Error_Warning Messages in Odoo 17
How to Show Error_Warning Messages in Odoo 17
 
How to Manage Cross-Selling in Odoo 17 Sales
How to Manage Cross-Selling in Odoo 17 SalesHow to Manage Cross-Selling in Odoo 17 Sales
How to Manage Cross-Selling in Odoo 17 Sales
 
March 2024 Directors Meeting, Division of Student Affairs and Academic Support
March 2024 Directors Meeting, Division of Student Affairs and Academic SupportMarch 2024 Directors Meeting, Division of Student Affairs and Academic Support
March 2024 Directors Meeting, Division of Student Affairs and Academic Support
 
Quality Assurance_GOOD LABORATORY PRACTICE
Quality Assurance_GOOD LABORATORY PRACTICEQuality Assurance_GOOD LABORATORY PRACTICE
Quality Assurance_GOOD LABORATORY PRACTICE
 
HED Office Sohayok Exam Question Solution 2023.pdf
HED Office Sohayok Exam Question Solution 2023.pdfHED Office Sohayok Exam Question Solution 2023.pdf
HED Office Sohayok Exam Question Solution 2023.pdf
 
How to Send Emails From Odoo 17 Using Code
How to Send Emails From Odoo 17 Using CodeHow to Send Emails From Odoo 17 Using Code
How to Send Emails From Odoo 17 Using Code
 
Drug Information Services- DIC and Sources.
Drug Information Services- DIC and Sources.Drug Information Services- DIC and Sources.
Drug Information Services- DIC and Sources.
 
Slides CapTechTalks Webinar March 2024 Joshua Sinai.pptx
Slides CapTechTalks Webinar March 2024 Joshua Sinai.pptxSlides CapTechTalks Webinar March 2024 Joshua Sinai.pptx
Slides CapTechTalks Webinar March 2024 Joshua Sinai.pptx
 
Over the counter (OTC)- Sale, rational use.pptx
Over the counter (OTC)- Sale, rational use.pptxOver the counter (OTC)- Sale, rational use.pptx
Over the counter (OTC)- Sale, rational use.pptx
 
CHUYÊN ĐỀ DẠY THÊM TIẾNG ANH LỚP 11 - GLOBAL SUCCESS - NĂM HỌC 2023-2024 - HK...
CHUYÊN ĐỀ DẠY THÊM TIẾNG ANH LỚP 11 - GLOBAL SUCCESS - NĂM HỌC 2023-2024 - HK...CHUYÊN ĐỀ DẠY THÊM TIẾNG ANH LỚP 11 - GLOBAL SUCCESS - NĂM HỌC 2023-2024 - HK...
CHUYÊN ĐỀ DẠY THÊM TIẾNG ANH LỚP 11 - GLOBAL SUCCESS - NĂM HỌC 2023-2024 - HK...
 

Cloud computing in iot seminar report

  • 1. CLOUD COMPUTING IN IOT Seminar Report
  • 2. CHAPTER 1 OVERVIEW OF CLOUD COMPUTING Salesforce is one of the leading cloud computing platforms, which offers its services over the cloud to its customers and partners. To better understand the salesforce concept, it is mandatory to learn the basic concepts behind the salesforce, which is cloud-computing. In this topic, we will understand all the basics of the cloud-computing. 1.1 WHAT IS CLOUD-COMPUTING? Cloud computing is a technology to store, manage, process, and access the data over the internet instead of a local server or computer hard drives. Here, the term cloud is taken from the symbol of the internet users in the flowcharts. The remote servers are used in cloud computing to store the data that can be accessed from anywhere using the internet. With the help of cloud computing, an organization can save lots of cost of local data storage, maintenance of data, etc. The information over the cloud can be accessed by anyone, anywhere, and anytime, with the help of the internet. Using cloud computing instead of traditional storage helps users with lots of benefits such as speed, cost-effectiveness, security, global access, etc.
  • 3. FIG 1 Cloud computing involves two main concepts: o Vendors who provide the software apps on the clouds. o Clients who access the software apps via cloud. 1.2 TYPES OF CLOUD SERVICES Cloud computing provides IT services through the internet. These services are placed in different remote places. The services can be divided into three main categories: 1. Software-as-a-Service (SaaS) 2. Platform-as-a-Service (PaaS) 3. Infrastructure-as-a-Service (IaaS)
  • 4. FIG 2 From the above three services, salesforce provides two services: SAAS and PAAS, to its users. FIG 3 Software-as-a-Service Software-as-a-Service is a way of providing applications as a service over the internet. SaaS services can be directly accessed using the internet instead of installing each application on the local drive or system.
  • 5. Salesforce.com is the SAAS service provider that provides various online applications for CRM. There is no need to install any software or server on a local machine; instead we can start the business on this just by singing-up. Platform-as-a-Service Platform-as-a-Service or PaaS is a type of cloud computing service where a service provider such as Salesforce.com provides a platform to their client to work on. On such platforms, the users or clients can run, develop, test, or manage any business applications without any IT infrastructure. It lies between the SaaS and IaaS services, and provides a building block by which we can create our solutions. Google App Engine is one of the great examples of PaaS services. Currently, it provides online Python and Java Runtime platforms to develop web applications without any need for complicated software & hardware. Force.com platform also offers PaaS services. It uses its language proprietary. INFRASTRUCTURE-AS-A-SERVICE IaaS is a type of cloud-computing service that offers the rental computing infrastructures. The cloud provider provides various infrastructure services such as servers, virtual machines, network storage, etc. The services can be scaled up and down as per the client requirements. 1.3 BENEFITS OF CLOUD-COMPUTING
  • 6. 1. Cost-Effective: The cloud computing platform is much cost- effective, as there is no requirement to save data on local drives or any hardware setup. 2. 24*7 Availability: One of the most significant advantages of cloud computing is that the data or any service available in the cloud can be accessed any time from anywhere. 3. High-Security: The data stored in the hard drives may be lost, and if the data is highly confidential, it can highly affect any organization. But with the cloud platforms, the data is highly secured in the clouds, so the risk of the data lost is reduced with cloud computing. 4. Easy Access: Cloud applications can be accessed from anywhere and anytime. 5. Fast Implementation: To implement any new application, it may take a long time. But with cloud applications, this time can be reduced a lot. With most cloud applications, we just need to sign- up, and we can start working on it. 6. Instant Scalability: Cloud-based applications enable the organization to easily increase or decrease user's numbers as per the requirement. Hence, we don't need to think about the availability or running out of capacity. 7. Automated updates: Any application can take up to many days to upgrade, maintain, or test the application. But with cloud applications, such things are not necessary because the cloud application has the automated update software that can be updated automatically. 8. Collaboration: Cloud-computing enhances collaboration. It means that various groups of an organization can connect virtually and share useful information and data on the cloud-platforms. It improves the customer services and product development process in any organization
  • 7. CHAPTER 2 WHAT IS AN INTERNET OF THINGS (IOT) The term "Things" in the Internet of Things refers to anything and everything in day to day life which is accessed or connected through the internet. IoT is an advanced automation and analytics system which deals with artificial intelligence, sensor, networking, electronic, cloud messaging etc. to deliver complete systems for the product or services. The system created by IoT has greater transparency, control, and performance FIG 4 FIG 5 If there is a common platform where all these things can connect to each other would be great because based on my preference, I can set the room temperature. For example, if I love the room temperature to to be set at 25 or 26-degree Celsius when I reach back home from my office, then according to my car location, my AC would start before 10 minutes I arrive at home. This can be done through the Internet of Things (IoT)
  • 8. 2.1 HOW DOES INTERNET OF THING (IOT) WORK? The working of IoT is different for different IoT echo system (architecture). However, the key concept of there working are similar. The entire working process of IoT starts with the device themselves, such as smartphones, digital watches, electronic appliances, which securely communicate with the IoT platform. The platforms collect and analyze the data from all multiple devices and platforms and transfer the most valuable data with applications to devices. FIG 6 FEATURES OF IOT The most important features of IoT on which it works are connectivity, analyzing, integrating, active engagement, and many more. Some of them are listed below: Connectivity: Connectivity refers to establish a proper connection between all the things of IoT to IoT platform it may be server or cloud. After connecting the IoT devices, it needs a high speed messaging between the devices and cloud to enable reliable, secure and bi- directional communication. Analyzing: After connecting all the relevant things, it comes to real-time analyzing the data collected and use them to build effective business
  • 9. intelligence. If we have a good insight into data gathered from all these things, then we call our system has a smart system. Integrating: IoT integrating the various models to improve the user experience as well. Artificial Intelligence: IoT makes things smart and enhances life through the use of data. For example, if we have a coffee machine whose beans have going to end, then the coffee machine itself order the coffee beans of your choice from the retailer. Sensing: The sensor devices used in IoT technologies detect and measure any change in the environment and report on their status. IoT technology brings passive networks to active networks. Without sensors, there could not hold an effective or true IoT environment. Active Engagement: IoT makes the connected technology, product, or services to active engagement between each other. Endpoint Management: It is important to be the endpoint management of all the IoT system otherwise, it makes the complete failure of the system. For example, if a coffee machine itself order the coffee beans when it goes to end but what happens when it orders the beans from a retailer and we are not present at home for a few days, it leads to the failure of the IoT system. So, there must be a need for endpoint management.
  • 10. CHAPTER 3 EMBEDDED DEVICES (SYSTEM) IN (IOT) It is essential to know about the embedded devices while learning the IoT or building the projects on IoT. The embedded devices are the objects that build the unique computing system. These systems may or may not connect to the Internet. An embedded device system generally runs as a single application. However, these devices can connect through the internet connection, and able communicate through other network devices. FIG 7 3.1 EMBEDDED SYSTEM HARDWARE
  • 11. The embedded system can be of type microcontroller or type microprocessor. Both of these types contain an integrated circuit (IC). The essential component of the embedded system is a RISC family microcontroller like Motorola 68HC11, PIC 16F84, Atmel 8051 and many more. The most important factor that differentiates these microcontrollers with the microprocessor like 8085 is their internal read and writable memory. The essential embedded device components and system architecture are specified below. FIG 8 3.2 EMBEDDED SYSTEM SOFTWARE The embedded system that uses the devices for the operating system is based on the language platform, mainly where the real-time operation would be performed. Manufacturers build embedded software in electronics, e.g., cars, telephones, modems, appliances, etc. The embedded system software can be as simple as lighting controls running
  • 12. using an 8-bit microcontroller. It can also be complicated software for missiles, process control systems, airplanes etc.
  • 13. CHAPTER 4 IOT DECISION FRAMEWORK The IoT decision framework provides a structured approach to create a powerful IoT product strategy. The IoT decision framework is all about the strategic decision making. The IoT Decision Framework helps us to understand the areas where we need to make decisions and ensures consistency across all of our strategic business decision, technical and more. The IoT decision framework is much more important as the product or services communicates over networks goes through five different layers of complexity of technology. 1. Device Hardware 2. Device Software 3. Communications 4. Cloud Platform 5. Cloud Application FIG 9 4.1 DECISION AREA The IoT decision framework pays attention to six key decision areas in any IoT product. These decision areas are: 1. User Experience (UX)
  • 14. 2. Data 3. Business 4. Technology 5. Security 6. Standards & Regulations Each of these decision areas is evaluated at each of the IoT Technology Stack. The User Experience will be evaluated at Device Hardware, Device Software and so to provide the better user experience. Then at the next step Data Decision Area, we have to explore data considerations for all the stages of IoT Technology Stack. FIG 10 Decision Area of the IoT Decision Framework Let's see each of the Decision Area of IoT Decision Framework in detail: 1. User Experience Decision Area: This is the area where we concentrate about who are the users, what are their requirements and how to provide a great experience at each step of IoT stack without worrying about the technical details.
  • 15. 2. Data Decision Area: In this area, we make the overall data strategy such as the data flow over the entire IoT stack to fulfill the user's requirements. 3. Business Decision Area: Based on the previous decisions area, we make the decision how product or services will became financial potential. At each of the IoT Stack level are monetized about the costs of providing services. 4. Technology Decision Area: In this area, we work with the technology for each layer to facilitate the final solution. 5. Security Decision Area: After going through the implementation of technology it is important to decide and provide the security at each stage of the IoT Stack. 6. Standards & Regulations Decision Area: At the last stage of IoT Decision Area, we identify the standards and regulations of product or services that will affect your product at each layer of the IoT Stack.
  • 16. CHAPTER 5 IOT ARCHITECTURE There is not such a unique or standard consensus on the Internet of Things (IoT) architecture which is universally defined. The IoT architecture differs from their functional area and their solutions. However, the IoT architecture technology mainly consists of four major components: 5.1 COMPONENTS OF IOT ARCHITECTURE o Sensors/Devices o Gateways and Networks o Cloud/Management Service Layer o Application Layer FIG 11 5.2 STAGES OF IOT SOLUTIONS ARCHITECTURE There are several layers of IoT built upon the capability and performance of IoT elements that provides the optimal solution to the business enterprises and end-users. The IoT architecture is a fundamental way to design the various elements of IoT, so that it can deliver services over the networks and serve the needs for the future.
  • 17. Following are the primary stages (layers) of IoT that provides the solution for IoT architecture. 1. Sensors/Actuators: Sensors or Actuators are the devices that are able to emit, accept and process data over the network. These sensors or actuators may be connected either through wired or wireless. This contains GPS, Electrochemical, Gyroscope, RFID, etc. Most of the sensors need connectivity through sensors gateways. The connection of sensors or actuators can be through a Local Area Network (LAN) or Personal Area Network. 2. Gateways and Data Acquisition: As the large numbers of data are produced by this sensors and actuators need the high-speed Gateways and Networks to transfer the data. This network can be of type Local Area Network (LAN such as WiFi, Ethernet, etc.), Wide Area Network (WAN such as GSM, 5G, etc.). 3. Edge IT: Edge in the IoT Architecture is the hardware and software gateways that analyze and pre-process the data before transferring it to the cloud. If the data read from the sensors and gateways are not changed from its previous reading value then it does not transfer over the cloud, this saves the data used. 4. Data center/ Cloud: The Data Center or Cloud comes under the Management Services which process the information through analytics, management of device and security controls. Beside this security controls and device management the cloud transfer the data to the end users application such as Retail, Healthcare, Emergency, Environment, and Energy, etc.
  • 19. CHAPTER 6 IOT - PLATFORM As in IoT, all the IoT devices are connected to other IoT devices and application to transmit and receive information using protocols. There is a gap between the IoT device and IoT application. An IoT Platform fills the gap between the devices (sensors) and application (network). Thus we can say that an IoT platform is an integrated service that fulfills the gap between the IoT device and application and offers you to bring physical object online. FIG 13 There are several IoT Platforms available that provides facility to deploy IoT application actively. Some of them are listed below: Amazon Web Services (AWS) IoT platform: Amazon Web Service IoT platform offers a set of services that connect to several devices and maintain the security as well. This platform collects data from connected devices and performs real-time actions.
  • 20. Microsoft Azure IoT platform: Microsoft Azure IoT platform offers strong security mechanism, scalability and easy integration with systems. It uses standard protocols that support bi-directional communication between connected devices and platform. Azure IoT platform has an Azure Stream Analytics that processes a large amount of information in real-time generated by sensors. Some common features provided by this platform are: o Information monitoring o A rules engine o Device shadowing o Identity registry Google Cloud Platform IoT: Google Cloud Platform is a global cloud platform that provides a solution for IoT devices and applications. It handles a large amount of data using Cloud IoT Core by connecting various devices. It allows to apply BigQuery analysis or to apply Machine learning on this data. Some of the features provided by Google Cloud IoT Platform are: o Cloud IoT Core o Speed up IoT devices o Cloud publisher-subscriber o Cloud Machine Learning Engine IBM Watson IoT platform: The IBM Watson IoT platform enables the developer to deploy the application and building IoT solutions quickly. This platform provides the following services: o Real-time data exchange o Device management o Secure Communication o Data sensor and weather data services
  • 21. Artik Cloud IoT platform: Arthik cloud IoT platform is developed by Samsung to enable devices to connect to cloud services. It has a set of services that continuously connect devices to the cloud and start gathering data. It stores the incoming data from connected devices and combines this information. This platform contains a set of connectors that connect to third-party services. Bosch IoT Suite: Bosch cloud IoT Suit is based on Germany. It offers safe and reliable storing of data on its server in Germany. This platform supports full app development from prototype to application development. 6.1 HOW IOT PLATFORM HELP: o IoT Platform connects sensors and devices. o IoT platform handles different software communication protocol and hardware. o IoT platform provides security and authentication for sensors and users. o It collects, visualizes, and analyzes the data gathered by the sensor and device.
  • 22. CHAPTER 7 THINGWORX IN INTERNET OF THINGS The ThingWorx platform is a complete end-to-end technology platform that is designed for industrial IoT. It facilitates the tools and services that are required to develop and set-up connectivity, analysis, production of other aspects of IoT development. FIG 14 The ThingWorx IoT platform is a collection of modules that deliver the flexibility, capability, and agility establishment required to implement IoT applications. ThingWorx empowers businesses to develop and deploy powerful applications rapidly and augmented reality (AR) experiences. ThingWorx is the first platform that connects the people, systems, things, connection operations, connected products, connected applications, etc. ThingWorx reduces the time, cost, and risk which are required to build the IoT applications. It deploys the application 10-time faster with model-based development.
  • 23. FIG 15 ThingWorx allows you to deploy how you like by providing the complete application design, runtime, and intelligent environment. The ThingWorx IoT platform also has flexibility and scalability to adapt that application in future. FIG 16 Services of the ThingWorx platform in IoT Following are the services and benefits provided by ThingWorx in IoT:
  • 24. Reason Constructed Platform This platform specially designed to provide the functionality for the protection as well as the scalability to develop as the commercial enterprise expands. Development, Rapid Improvement, and Extensibility It includes a platform module that comes together with the ThingModel. The ThinkModel is a truthful digital illustration of items that enables experience, studies, and quick apps delivery without any difficulty. Flexibility The ThingWorx platform has the flexibility to be deployed on-premises, inside the cloud or a hybrid or both of these platforms. Component of ThingWorx ThingWorx offers several key components for application building. This component includes Composer, Mashup builder, storage, search engine, collaboration, and connectivity. The Composer provides a modeling environment for designing , and testing. The Mashup builder is used for dashboard building through common components such as buttons, lists, wikis, gauges, etc. ThingWorx uses a search engine known as SQUEAL, for search, query, and analysis.
  • 25. CHAPTER 8 IOT PROTOCOL 8.1 IoT Data Link Communication Protocol The IoT Data Link communication protocol provides service to the Network Layer. There are various protocols and standard technologies specified by the different organization for data link protocols. A . BLUETOOTH Bluetooth is a short-range wireless communication network over a radio frequency. Bluetooth is mostly integrated into smartphones and mobile devices. The Bluetooth communication network works within 2.4 ISM band frequencies with data rate up to 3Mbps. There are three categories of Bluetooth technology: 1. Bluetooth Classic 2. Bluetooth Low Energy 3. Bluetooth SmartReady The features of Bluetooth 5.0 version is introduced as Bluetooth 5 which have been developed entirely for the Internet of Things. Properties of Bluetooth network o Standard: Bluetooth 4.2 o Frequency: 2.4GHz o Range: 50-150m o Data transfer rates: 3Mbps Advantages of Bluetooth network o It is wireless. o It is cheap.
  • 26. o It is easy to install. o It is free to use if the device is installed with it. Disadvantages of Bluetooth network o It is a short-range communication network. o It connects only two devices at a time. B. Bluetooth Low Energy Bluetooth low energy (BLE) is a short-range communication network protocol with PHY (physical layer) and MAC (Medium Access Control) layer. It is designed for low-power devices which uses less data. BLE always remain in sleep mode except when the connection between devices is initiated and data transmission occurs, due to this it conserves power of the device. Bluetooth low energy follows the master/slave architecture and offers two types of frames that are adverting and data frames. Slave node sent the advertising frame to discover one or more dedicated advertisement channels. Master nodes sense this advertisement channels to find slaves and connect them. FIG 17
  • 27. C. Z-Wave Z-Wave is a wireless communication protocol with the frequency of 900MHz. The ranges of Z-Wave lies between 30 meters to 100 meters with the data transfer rate of 100kbps so that it is suitable for small messages in IoT applications for home automation. This communication protocol operates on mesh network architecture with one and several secondary controllers. FIG 18 Properties of Z-Wave protocol o Standard: Z-Wave Alliance ZAD12837 / ITU-T G.9959 o Frequency: 908.42GHz o Range: 30-100m o Data transfer rate: 100kbps Advantages of Z-Wave protocol o Low power consumption o Remote or local control o Simple installation o Interoperability
  • 28. Application of Z-Wave protocol o Smart product and IoT based application o Energy saving o Home security D. ZigBee Smart Energy ZigBee is a low power, low data rate wireless personal area network communication protocol. It is mostly used in home automation and industrial settings. Since ZigBee is a low power communication protocol, the IoT power devices used with ZigBee technology. The ZigBee communication protocol is based on the IEEE 802.15.4 standard operating at the 2.4GHz frequency. The ZigBee protocol supports star, cluster or wireless mesh technology topology. ZigBee uses the following devices in its network: o Zigbee Coordinator o Zigbee End Device o Zigbee Router FIG 19 Properties of ZigBee protocol o Standard: ZigBee 3.0 based on IEEE802.15.4
  • 29. o Frequency: 2.4GHz o Range: 10-100m o Data transfer rate: 250kbps Advantages of ZigBee protocol o Wireless o Mesh networking o Direct communication o Low power consumption Disadvantages of ZigBee protocol o Costly o Works with low speed within a small distance Application of ZigBee protocol o Commercial and residential control o Personal and healthcare o Home networking o Industrial control and management o Consumer electronics E . LoRaWAN LoRaWAN refers to Long Rage Wide Area Network which is a wide area network protocol. It is an optimized low-power consumption protocol design to support large-scale public networks with millions of low-power devices. A single operator operates the LoRaWAN. The LoRaWAN network is a bi-directional communication for IoT application with low cost, mobility, and security. Properties of LoRaWAN protocol o Standard: LoRaWAN
  • 30. o Frequency: Various o Range: 2-5km (urban environment), 15km (suburban environment) o Data Rates: 0.3-50 kbps. 8.2 IOT NETWORK LAYER PROTOCOLS The network layer is divided into two sublayers: routing layer which handles the transfer of packets from source to destination, and an encapsulation layer that forms the packets. A . RPL Protocol RPL stands for Routing Protocol for Low-Power and Lossy Network. It is a distance-vector protocol that supports a varity of Data Link Protocols. RPL builds a Destination Oriented Directed Acyclic Graph (DODAG) which has only one route from each leaf node to the root. All the traffic in this DODAG is routed through the root. Initially, each node sends a DODAG Information Object (DIO) announcing them self as a root. This information travels in the network, and complete DODAG is gradually built. When a new node wants to join the network, it sends a DODAG Information Solicitation (DIS) request and root responds back with a DAO Acknowledgment (DAO-ACK) confirming the join. B. CORPL Protocol CORPL protocol is the extension of the RPL protocol, which is termed as cognitive RPL. This network protocol is designed for cognitive networks and uses DODAG topology. CORPL protocol makes two new modifications in the RPL protocol. It uses opportunistic forwarding to forward a packet between the nodes. Each node of CORPL protocol keeps the information of forwarding set rather than parents only maintaining it. Each node updates its changes to its neighbor using DIO
  • 31. messages. On the basis of this updated message, each node frequently updates its neighbor for constant forwarder set. C . CARP Protocol CARP (Channel-Aware Routing Protocol) is a distributed routing protocol. It is designed for underwater communication. It has lightweight packets so that it can be used for Internet of Things (IoT). It performs two different functionalities: network initialization and data forwarding. CARP protocol does not support previously collected data. Hence, it is not beneficial for those IoT or other application where data is changed frequently. The upgradation of CARP is done in E-CARP which overcomes the limitation of CARP. The E-CARP allows the sink node to save previously received sensory data. D . 6LoWPAN The 6LoWPAN protocol refers to IPv6 Low Power Personal Area Network which uses a lightweight IP-based communication to travel over low data rate networks. It has limited processing ability to transfer information wirelessly using an internet protocol. So, it is mainly used for home and building automation. The 6LoWPAN protocol operates only within the 2.4 GHz frequency range with 250 kbps transfer rate. It has a maximum length of 128-bit header packets. 6LowPAN Security Measure Security is a major issue for 6LowPAN communication Protocol. There are several attacks issues at the security level of 6LoWPAN which aim is to direct destruction of the network. Since it is the combination of two systems, so, there is a possibility of attack from two sides that targets all the layer of the 6LoWPAN stack (Physical layer, Data link layer, Adaptation layer, Network layer, Transport layer, Application layer). Properties of 6LowPAN protocol o Standard: RFC6282
  • 32. o Frequency: Used over a variety of other networking media including Bluetooth Smart (2.4GHz) or ZigBee or low-power RF (sub-1GHz) o Range: NA o Data Rates: NA 8.3 IoT Session Layer Protocols The session layer protocols review standards and protocols for message passing. Different standardization organizations introduce the IoT session layer protocols. There are different types of session layer protocol available with different functionality and range. MQTT and CoAP provide these needs through small message sizes, message management, and lightweight message overhead. A .MQTT (Message Queue Telemetry Transport) MQTT (Message Queue Telemetry Transport) is a messaging protocol which was introduced by IBM in 1999. It was initially built for monitoring sensor node and faraway tracking in IoT. Its suits are small, cheap, low-memory and low-power devices. MQTT provides embedded connectivity between applications and middleware in one side and another side it connects networks and communicators. MQTT protocol is based on publish/subscribe architecture. The publish/subscribe architecture consists of three major components: publishers, subscribers, and a broker. According to IoT point of view, publishers are lightweight sensor devices that send their data to connected broker and goes back to sleep whenever possible. Subscribers are applications, which are interested in a certain topic or sensory data, so they are connected to brokers to be informed whenever new data are received. The broker receives the sensory data and filters them in different topics and sends them to subscribers according to interest in the topics.
  • 33. FIG 20 B . SMQTT (Secure Message Queue Telemetry Transport) SMQTT (Secure Message Queue Telemetry Transport) is an extension of MQTT protocol which uses encryption based on lightweight attribute encryption. The main advantage of this encryption is that it has a broadcast encryption feature. In this features, one message is encrypted and delivered to multiple other nodes. The process of message transfer and receiving consists of four major stages: 1. Setup: In this phase, the publishers and subscribers register themselves to the broker and get a secret master key. 2. Encryption: When the data is published to broker, it is encrypted by broker. 3. Publish: The broker publishes the encrypted message to the subscribers. 4. Decryption: Finally the received message is decrypted by subscribers with the same master key. SMQTT is proposed only to enhance MQTT security feature.
  • 34. C . CoAP CoAP (Constrained Application Protocol) is a session layer protocol that provides the RESTful (HTTP) interface between HTTP client and server. It is designed by IETF Constrained RESTful Environment (CoRE) working group. It is designed to use devices on the same constrained network between devices and general nodes on the Internet. CoAP enables low-power sensors to use RESTful services while meeting their low power constraints. This protocol is specially built for IoT systems primarily based on HTTP protocols. This network is used within the limited network or in a constrained environment. The whole architecture of CoAP consists of CoAP client, CoAP server, REST CoAP proxy, and REST internet. FIG 21 The data is sent from CoAP clients (such as smartphones, RFID sensors, etc.) to the CoAP server and the same message is routed to REST CoAP proxy. The REST CoAP proxy interacts outside the CoAP environment and uploads the data over REST internet.
  • 35. D .DDS DDS (Data Distribution Service) is a middleware (sometimes called machine-to-machine (M2M)) communication protocol. It is implemented by the Object Management Group (OMG) standard for the real-time system with high speed and high-performance, scalable, dependable, and interoperable data exchange. This communication protocol is based on a publish-subscribe pattern for sending and receiving data, events, and commands among the nodes. The DDS protocol has two main layers: o Data-Centric Publish-Subscribe (DCPS): This layer delivers the information to subscribers. o Data-Local Reconstruction Layer (DLRL): This layer provides an interface to DCPS functionalities, permitting the sharing of distributed data amongst IoT enabled objects
  • 36. CHAPTER 9 ADVANTAGES AND DISADVANTAGES OF (IOT) Any technology available today has not reached to its 100 % capability. It always has a gap to go. So, we can say that Internet of Things has a significant technology in a world that can help other technologies to reach its accurate and complete 100 % capability as well. Let's take a look over the major, advantages, and disadvantages of the Internet of Things. 9.1 ADVANTAGES OF IOT Internet of things facilitates the several advantages in day-to-day life in the business sector. Some of its benefits are given below: • Efficient resource utilization: If we know the functionality and the way that how each device work we definitely increase the efficient resource utilization as well as monitor natural resources. • Minimize human effort: As the devices of IoT interact and communicate with each other and do lot of task for us, then they minimize the human effort. • Save time: As it reduces the human effort then it definitely saves out time. Time is the primary factor which can save through IoT platform. • Enhance Data Collection: • Improve security: Now, if we have a system that all these things are interconnected then we can make the system more secure and efficient.
  • 37. 9.2 DISADVANTAGES OF IOT As the Internet of things facilitates a set of benefits, it also creates a significant set of challenges. Some of the IoT challenges are given below: o Security: As the IoT systems are interconnected and communicate over networks. The system offers little control despite any security measures, and it can be lead the various kinds of network attacks. o Privacy: Even without the active participation on the user, the IoT system provides substantial personal data in maximum detail. o Complexity: The designing, developing, and maintaining and enabling the large technology to IoT system is quite complicated. 9.3 CONCLUSION • As IoT becomes more pervasive, edge computing will do the same. • The ability to analyze data closer to the source will minimize latency, reduce the load on the internet, improve privacy and security, and lower data management costs. • The cloud will continue to play a critical role in aggregating important data and performing analyses on this massive set of information to glean insights that can be distributed back to the edge devices. • The combination of edge and cloud computing will help you better manage and analyze your data and significantly increase the value of your IoT efforts 9.4 REFERENCES • https://www.javatpoint.com/iot-internet-of-things • https://www.javatpoint.com/salesforce-overview-of-cloud- computing