Professional Documents
Culture Documents
Min[Ecomp, E comm]
FOG COMPUTING
Fog computing allows computing, decision-making and action-taking to happen via IoT devices and
only pushes relevant data to the cloud, Cisco coined the term “Fog computing “and gave a brilliant
definition for Fog Computing: “The fog extends the cloud to be closer to the things that produce and
act on IoT data. These devices, called fog nodes, can be deployed anywhere with a network
connection: on a factory floor, on top of a power pole, alongside a railway track, in a vehicle, or on
an oil rig. Any device with computing, storage, and network connectivity can be a fog node.
Examples include industrial controllers, switches, routers, embedded servers, and video surveillance
cameras.”
To understand Fog computing concept, the following actions define fog computing:
• Analyzes the most time-sensitive data at the network edge, close to where it is generated
instead of sending vast amounts of IoT data to the cloud.
• Sends selected data to the cloud for historical analysis and longer-term storage.
• Minimize latency
• Lower expenses of using high computing power only when needed and less bandwidth
Keep in mind that fog computing is not a replacement of cloud computing by any measure, it works
in conjunction with cloud computing, optimizing the use of available resources. But it was the
product of a need to address two challenges, real-time process and action of incoming data.
REAL-LIFE EXAMPLE:
A traffic light system in a major city is equipped with smart sensors. It is the day after the local team
won a championship game and it’s the morning of the day of the big parade. A surge of traffic into
the city is expected as revelers come to celebrate their team’s win. As the traffic builds, data are
collected from individual traffic lights. The application developed by the city to adjust light patterns
and timing is running on each edge device. The app automatically makes adjustments to light
patterns in real time, at the edge, working around traffic impediments as they arise and diminish.
Traffic delays are kept to a minimum, and fans spend less time in their cars and have more time to
enjoy their big day.
After the parade is over, all the data collected from the traffic light system would be sent up to the
cloud and analyzed, supporting predictive analysis and allowing the city to adjust and improve its
traffic application’s response to future traffic anomalies. There is little value in sending a live steady
stream of everyday traffic sensor data to the cloud for storage and analysis. The civic engineers have
a good handle on normal traffic patterns. The relevant data is sensor information that diverges from
the norm, such as the data from parade day.
Fog computing, thought of as a “low to the ground” extension of the cloud to nearby gateways, and
proficiently provides for this need. As Gartner’s Networking Analyst, Joe Skorupa puts it: “The
enormous number of devices, coupled with the sheer volume, velocity and structure of IoT data,
creates challenges, particularly in the areas of security, data, storage management, servers and the
data center network with real-time business processes at stake. Data center managers will need to
deploy more forward-looking capacity management in these areas to be able to proactively meet the
business priorities associated with IoT.”
What is the difference between edge, cloud and fog computing?
Edge computing is doing data gathering, storage, and computation on the edge devices.
Cloud computing is data storage and computation on primarily stronger server machines which are
connected to the edge devices. The edge devices send their data over the network to the cloud,
where a more capable machine can do the necessary work.
Fog computing is a mixture of the two. Sometimes the cloud servers are too far away from the edge
devices for the data analytics to occur fast enough. Thus, a fog computing intermediary device is set
up as a hub between the two. This device does the necessary computation and analytics for the edge
device.
MASS CONNECTIVITY
As one of the key technology trends in the era of digital transformation, the Internet of
Things (IoT) is expected take huge strides forward in the coming years, with nearly 50 billion
devices/things predicted to be connected to the internet by the year 2020.
Mobile technology networks in particular such as LPWA 3GPP, LTE-M and NB-IoT
have been advanced to deliver connectivity to billions of devices facilitating a superb
standard of IoT connectivity.
Fog gateway , is based open the interception of the packet in the tunnel at eNB and their
redirection to local server where fog service is running.
THE LTE ARCHITECTURE IS PROVIDED BY TWO PLANE 1. DATA PLANE and 2. CONTROL
PLANE
Full duplex radio – CSMA/CD Design at proctor stage. It improve network throughput.
Shannon capacity
-LPWAN ….. range upto 10kms and low data rate—Example- sigfox, LoRA
- THERE EXIST WIDE RANGE IOT DEVICES compatable with WIFE for high data transfer data
reange in short range communication
- THE TRADITIONAL MAC LAYER PROTOCOL ARE NOT SUITABLE FOR IOT DEVICE
- IEEE 802.15.4 DEVICES SUITABLE FRAMED MAC PROTOCOL AN EFFICIENT FRAME FORMAT
SUITABLE FOR USED AS IOT-LAN
Lastly other short range PAN networks LIKE BLE, NFC and RFID used
for personal low-power IOT devices
SESSION 2
According to intelligence and advisory firm IDC ( International Data Corporation ) about
41.6 Billion devices will connect to internet by 2025 and there would be generating data 79.4
zetabytes every year.(194.4EBper month)
After gateways, the pre-processed data is sent to data center for storage and further
processing via internet.
Data processing and data mining are of several methods. 1. Clustering 2. Classifications 3.
Frequency pattern matching
Traditional data mining approaches are not suitable for IoT data.
Answer: b
Explanation: Fog computing or fog networking is also known as fogging, is an
architecture that uses one or more collaborative end-user clients or near-user
devices to carry out a substantial amount of storage, communication, control.
Answer: a
Explanation: Fog computing can be perceived both in large cloud systems and big data structures,
making reference to the growing difficulties in accessing information objectively.
Answer: a
Explanation: Fog networking consists of a control plane and Data plane. For example, on the data
plane, fog computing enables computing services to reside at the edge of the network as opposed to
servers in a data center.
a) Mist computing
b) Cloud computing
c) Edge computing
d) Fog computing
Answer: d
Explanation: Compared to cloud computing, fog computing emphasizes proximity to end user and
client objectives, dense geographical distribution and local resource pooling.
a) Quality of storage
b) Quality of service
c) Quality of security
d) Quality of swarms
Answer: b
Explanation: Quality of service is the description or measurement of the overall performance of a
service, such as telephony or computer network or a cloud computing service, particularly the
performance seen by the users of the network.
a) True
b) False
Answer: a
Explanation: Fog networking supports the Internet of Things concept, in which most of the devices
used by humans on a daily basis will be connected to each other.
8. Which computing can be heavy weight and dense form of computing power?
b) Fog computing
c) Mist computing
d) Cloud computing
Answer: d
Explanation: Cloud computing is the practice of using a network of remote servers hosted on the
Internet of store, manage, and process data, rather than a local server or a personal computer.
Cloud computing can be heavyweight and dense form of computing power.
b) Mist computing
c) Fog computing
d) Cloud computing
Answer: c
Explanation: Fog computing refers to extending cloud computing to the edge of an enterprise’s
network. Fog computing facilitates the operation of computer, storage, and networking services
between end devices and computing data centers.
a) Cloud computing
d) Fog computing
Answer: c
Explanation: Mist computing is a lightweight and rudimentary form of computing power that resides
directly within the network fabric at
Day 2
An Introduction to Arm Mbed OS
Prof. Sourav Shyam
Mbed OS is the OS for IoT Arm Cortex microcontroller. It support all RTOs API. The bare
metal profile is designed to run application that do not required complex thread management.
Mbed OS IS THE FASTEST way to build IoT products with cortex Arm Processor.
1. Modules
2. Board
3. Components
Use bare metal profile to develop IOT application using C
#include “Mbed_driver.h”
#include <stdio.h>
int main()
/* create eventQueue */
...
return 0;
4. create a new Mbed OS application and navigate to its directory that contains full
Mbed OS libraries
mbed-os/
4. open the mbed_app.json(in the root of application) and replace with following contents
“requires” | [“bare-metal”],
“target_overrites”{
}
USE SMALL C LIBRARY FOR MBED-OS BARE METAL
Arm microlib does not support return from main(), on returning it crashes bare metal
application. There are two ways to prevent crash
1. Sleeping in a loop
2. Dispatch an eventQueue
For example in case of window OS, we required to download Mbed CLI for window
Execution(threads, modes)
Bootstrap(entry point, booting sequence and retargeting)
SESSION -2
Introduction to Mbed API
1. Driver APIs
2. Platform API
3. Storage API
a. Block device
b. Filesystem
c. KVStore
4. Connectivity API
5. Security API (Mbed Crypto, Mbed TLS, Pelion device magmt)
Session – 3
IoT device management
Four fundamental device management requirements exist for any Internet of
Things (IoT) device deployment: provisioning and authentication,
configuration and control, monitoring and diagnostics, and software updates
and maintenance. Here, each of these are defined.
Any IoT system must address four fundamental categories of device management, which are:
IOT CHALLENGES
1. Complexity 2. Data 3. Trust
The Smart Grid is part of an IoT framework, which can be used to remotely monitor and manage
everything from lighting, traffic signs, traffic congestion, parking spaces, road warnings, and early
detection of things like power influxes as the result of earthquakes and extreme weather.
INTEROPERABILITY LAYERS
1. Component layer
2. Communication layer
3. Information layer
4. Function layer
5. Business layer
1. MARKET
2. OPERATIONS
3. SERVICE PROVIDERS
IOT EVOLUTION
1. connect devices
SESSION 2
CURRENT STATUS AND FUTURE ASPECT OF IOT
JAVED BAIG
FIRST IOT sensor is RFID TAG
SMART HOME
2. Smart thermostat senses the customer is awake and notices the HEM
system
2 to 14 steps
ZIGBEE
WHY ZIGBEE, it was realized that WIFI and luetooth are unsuitable for many applications.
6LoWPAN Network Layers
3. cloud connector(MQTT,AMQP,XMPP,COAP)
Accenture ESTIMATES THAT IOT could add $14.2 trilion to the global economy by 2030.
sensor types
1. temperature sensors
2. magnetic sensors
3. humidity sensors
4. current sensors
5. speciality sensors
mmWaveSensor monitor driver alertness.
Challenges of IoT
1. Connectivity
2. continuity
3. compliance
4. coexistence
5. cyber security
Session 3
IOT ENABLED 5G NETWORK
Prof. Ajay Pratap
2. Smart transport
3. Waste management
System Model
1. Computation
2. Communication and
3. control
DAY 4
LIFI FUTURE OF INTERNET
Dr. Mayank Swayrnk
LiFi Spectrum
Architecture of Lifi
WORKING
3. Digital encoding
NXP BY PRADEEP
True
False
CORRECT ANSWER - False
IoT deployments typically spread beyond traditional IT infrastructure, which creates more entry
points for a cyber-attack. The lack of IoT standards not only makes management of IoT devices on
the edge more difficult for administrators, it also make them vulnerable.
1. Bandwidth issues
2. Complex connectivity issues
3. Legacy-system bridge issues
4. Data sovereignty compliance issues
Q4. One application of IoT edge computing is using sensors, real-time data analytics
and data operations to run a self-driving car.
True
Self-driving cars require real-time data analytics at the edge because even the milliseconds it
takes to transmit data to the cloud is too much latency when lives are at stake. Cars with IoT
edge computing combined with AI will make immediate decisions where the data is created.
Q5. What connects IoT devices to the cloud in order to aggregate data, translate
between protocols and process data before sending it on?
1. IoT sensors
2. IoT standards
3. IoT gateways
4. IoT processors
Q6. How will the edge change organizations' relationship with the cloud?
YOUR ANSWER - The edge will reduce the amount of data sent to the cloud, potentially
saving organizations money
Q7. How much enterprise data does Gartner predict will be created and processed at
the edge by 2025?
45%
55%
75%
85%
Introduction
ARM, IBM and NXP/Freescale combined forces a while back in order to bring out their IoT starter
kit bundle.
1. What is the role of Bigdata in smart grid architecture of IoT?
a) Store data
b) Manage data
c) Collect data
d) Security
View Answer
Answer: a
Explanation: Bigdata stores time series data, unstructured data, provided context for analytics, API
for enterprise applications.
a) Store data
b) Manage data
c) Collect data
d) Security
View Answer :
Answer: b
Explanation: Cloud to edge Middleware: manage data and edge devices, data streaming and event
processing, control authorized access.
a) Store data
b) Manage data
c) Collect data
d) Security
View Answer :
Answer: c
Explanation: Gateway: collects data from sensors, abstract protocols, perform local autonomous
decision, transfer information.
6. Which of the following is IoT device manageability?
a) Protocol abstraction
d) Data storage
View Answer
Answer: b
a) Protocol abstraction
d) Data storage
View Answer
Answer: c
Improves security with hardware;Enable secure communication to sensors;End to End Security from
Sensor to Cloud.
a) Protocol abstraction
d) Data storage
View Answer
Answer: d
Explanation: IoT Data Scalability: Data and Event processing at the edge;Data storage at the edge
9. What is the example for smart grid edge device for utility?
a) Smart Meters
b) Smart Home
c) Smart Car
d) Smart Collage
View Answer
Answer: a
Explanation: Examples of Smart Grid Edge Devices for Utilities: Voltage and Current sensors;Smart
Inverters;Smart Motors.
Security in IOT
Q. _________ is an attack which forces an end user to execute unwanted actions on a web
application in which he/she is currently authenticated.
c. Two-factor authentication
d. Cross-site scripting
A Web site that allows users to enter text, such as a comment or a name, and then stores it and later
displays it to other users, is potentially vulnerable to a kind of attack called a ___________________
attack.
a. Cross-site scripting
Q. AES uses a 128 bit block size and a key size of __________ bits.
a. 128 or 192
b. 128 or 256
Q. An encryption scheme is unconditionally secure if the ciphertext generated does not contain
enough information to determine uniquely the corresponding plaintext, no matter how much cipher
text is available.
a. True
Q. Even with two-factor authentication, users may still be vulnerable to_____________attacks.
a. Scripting
b. Cross attack
c. Man-in-the-middle
d. Radiant
a. 64 Bits
b. 128 Bits
c. 16 Bits
d. 32 Bits
Q. If the sender and receiver use different keys, the system is referred to as conventional cipher
system.
a. True
b. False
a. Receiver
c. Sender
IOT Quiz
Q1. 1. Which of the following is the java extension file in IoT? ANS. .jar
Q2. Which of the following category is used for business to consumer process? IIOT
Q3. Which is the future application of IoT? Na. green IOT system