You are on page 1of 32

Day 1

NEXT GENERATION WIRELESS TECHNOLOGY: FOG COMPUTING


V. MAHENDRAN, IIT TIRUPATI
Fog Computation rate

Cf / Total Clock Cycles requires to compute the task


Ergodic Computation Rate (E)

Min[Ecomp, E comm]
FOG COMPUTING

Fog computing allows computing, decision-making and action-taking to happen via IoT devices and
only pushes relevant data to the cloud, Cisco coined the term “Fog computing “and gave a brilliant
definition for Fog Computing: “The fog extends the cloud to be closer to the things that produce and
act on IoT data. These devices, called fog nodes, can be deployed anywhere with a network
connection: on a factory floor, on top of a power pole, alongside a railway track, in a vehicle, or on
an oil rig. Any device with computing, storage, and network connectivity can be a fog node.
Examples include industrial controllers, switches, routers, embedded servers, and video surveillance
cameras.”

FOG Node closest to FOG aggregation node Cloud


IoT Device
Response time Miliseconds Seconds to minutes Day, week
Application example M2M communication Visualization and Big data analysis
simple analytics Graphic dash board
How long IOT data is transient Short duration perhalfs Month and years
stored hour, day
Geographic coverage Local- one city Wider range Global

Fog computing is a mediator between the real world and cloud.

To understand Fog computing concept, the following actions define fog computing:

• Analyzes the most time-sensitive data at the network edge, close to where it is generated
instead of sending vast amounts of IoT data to the cloud.

• Acts on IoT data in milliseconds, based on policy.

• Sends selected data to the cloud for historical analysis and longer-term storage.

BENEFITS OF USING FOG COMPUTING

• Minimize latency

• Conserve network bandwidth


• Address security concerns at all level of the network

• Operate reliably with quick decisions

• Collect and secure wide range of data

• Move data to the best place for processing

• Lower expenses of using high computing power only when needed and less bandwidth

• Better analysis and insights of local data

Keep in mind that fog computing is not a replacement of cloud computing by any measure, it works
in conjunction with cloud computing, optimizing the use of available resources. But it was the
product of a need to address two challenges, real-time process and action of incoming data.

REAL-LIFE EXAMPLE:

A traffic light system in a major city is equipped with smart sensors. It is the day after the local team
won a championship game and it’s the morning of the day of the big parade. A surge of traffic into
the city is expected as revelers come to celebrate their team’s win. As the traffic builds, data are
collected from individual traffic lights. The application developed by the city to adjust light patterns
and timing is running on each edge device. The app automatically makes adjustments to light
patterns in real time, at the edge, working around traffic impediments as they arise and diminish.
Traffic delays are kept to a minimum, and fans spend less time in their cars and have more time to
enjoy their big day.

After the parade is over, all the data collected from the traffic light system would be sent up to the
cloud and analyzed, supporting predictive analysis and allowing the city to adjust and improve its
traffic application’s response to future traffic anomalies. There is little value in sending a live steady
stream of everyday traffic sensor data to the cloud for storage and analysis. The civic engineers have
a good handle on normal traffic patterns. The relevant data is sensor information that diverges from
the norm, such as the data from parade day.

THE DYNAMICS OF FOG COMPUTING

Fog computing, thought of as a “low to the ground” extension of the cloud to nearby gateways, and
proficiently provides for this need. As Gartner’s Networking Analyst, Joe Skorupa puts it: “The
enormous number of devices, coupled with the sheer volume, velocity and structure of IoT data,
creates challenges, particularly in the areas of security, data, storage management, servers and the
data center network with real-time business processes at stake. Data center managers will need to
deploy more forward-looking capacity management in these areas to be able to proactively meet the
business priorities associated with IoT.”
What is the difference between edge, cloud and fog computing?

Edge computing is doing data gathering, storage, and computation on the edge devices.

Cloud computing is data storage and computation on primarily stronger server machines which are
connected to the edge devices. The edge devices send their data over the network to the cloud,
where a more capable machine can do the necessary work.

Fog computing is a mixture of the two. Sometimes the cloud servers are too far away from the edge
devices for the data analytics to occur fast enough. Thus, a fog computing intermediary device is set
up as a hub between the two. This device does the necessary computation and analytics for the edge
device.
MASS CONNECTIVITY

As one of the key technology trends in the era of digital transformation, the Internet of
Things (IoT) is expected take huge strides forward in the coming years, with nearly 50 billion
devices/things predicted to be connected to the internet by the year 2020.

Mobile technology networks in particular such as LPWA 3GPP, LTE-M and NB-IoT
have been advanced to deliver connectivity to billions of devices facilitating a superb
standard of IoT connectivity.

CELLULAR NETWORKS – LTE

Experimental evaluation of fog computing techniques to reduce latency in LTE network.

Fog gateway , is based open the interception of the packet in the tunnel at eNB and their
redirection to local server where fog service is running.

THE LTE ARCHITECTURE IS PROVIDED BY TWO PLANE 1. DATA PLANE and 2. CONTROL
PLANE

The data plane is used to transport user data in the network.

LTE technologies provide data transfer speeds of between 100 megabits per


second(100Mbps) and one Gigabit per second(1Gbps). The Wi-Fi standard specifies data
transfer speeds between 11 Mbps, 54Mbps 600 Mbps and 1Gbps depending on the
specification.
WIFI RADIO

Half duplex radio – CSMA/CA

Full duplex radio – CSMA/CD Designing at proctor stage.

Full duplex radio – CSMA/CD Design at proctor stage. It improve network throughput.

SIC- SUCCESSIVE INTERFERENCE CANCELLATION

Shannon capacity

NOMA – non-orthogonal multiple access

non-orthogonal multiple access (NOMA) as a novel and promising power-domain user


multiplexing scheme for future radio access. Based on information theory, we can expect that
NOMA with a successive interference canceller (SIC) applied to the receiver side will offer a better
tradeoff between system efficiency and user fairness than orthogonal multiple access (OMA),
which is widely used in 3.9 and 4G mobile communication systems. This improvement becomes
especially significant when the channel conditions among the non-orthogonally multiplexed users
are significantly different. Thus, NOMA can be expected to efficiently exploit the near-far effect
experienced in cellular environments. In this paper, we describe the basic principle of NOMA in
both the downlink and uplink and then present our proposed NOMA scheme for the scenario
where the base station is equipped with multiple antennas. Simulation results show the potential
system-level throughput gains of NOMA relative to OMA.

Type of Access Network in FOG Computing

-LPWAN ….. range upto 10kms and low data rate—Example- sigfox, LoRA

- Cellular network are suitable for distance communication in IOT

THE 5TH GENERATION CELLULAR NETWORK IS YET TO GET COMMERCIALIZE-

- THERE EXIST WIDE RANGE IOT DEVICES compatable with WIFE for high data transfer data
reange in short range communication
- THE TRADITIONAL MAC LAYER PROTOCOL ARE NOT SUITABLE FOR IOT DEVICE
- IEEE 802.15.4 DEVICES SUITABLE FRAMED MAC PROTOCOL AN EFFICIENT FRAME FORMAT
SUITABLE FOR USED AS IOT-LAN

Lastly other short range PAN networks LIKE BLE, NFC and RFID used
for personal low-power IOT devices
SESSION 2

PROF DHEERAJ KUMAR, IIT ROORKEY

Essential Characteristics of IoT

According to intelligence and advisory firm IDC ( International Data Corporation ) about
41.6 Billion devices will connect to internet by 2025 and there would be generating data 79.4
zetabytes every year.(194.4EBper month)

Types of interaction in internet M2M, H2M,H2H

CLOUD ASSISTED SYSTEM OVERVIEW

SENSOR/ACTUATOR layer  GATEWAY layer (pre-process layer) [INTERNET (Data Center


layer)CLOUD( DATA MINING)]

After gateways, the pre-processed data is sent to data center for storage and further
processing via internet.

Data processing and data mining are of several methods. 1. Clustering 2. Classifications 3.
Frequency pattern matching

Traditional data mining approaches are not suitable for IoT data.

Decentralized data mining are suitable for IoT DATA.

IOT Questions and Answers – FOG Computing


1. Fog computing is also known as fogging.
a) False
b) True
View Answer

Answer: b
Explanation: Fog computing or fog networking is also known as fogging, is an
architecture that uses one or more collaborative end-user clients or near-user
devices to carry out a substantial amount of storage, communication, control.

2. Fog computing can be perceived in ___________ and ____________

a) Big data and Cloud systems

b) Big data and IoT


c) Cloud systems and IoT

d) Big data, Cloud systems and IoT

Answer: a

Explanation: Fog computing can be perceived both in large cloud systems and big data structures,
making reference to the growing difficulties in accessing information objectively.

3. Fog computing has ____________ and ____________ plane.

a) Control and data

b) Control and Barcode

c) Barcode and Data

d) Data and cloud

Answer: a

Explanation: Fog networking consists of a control plane and Data plane. For example, on the data
plane, fog computing enables computing services to reside at the edge of the network as opposed to
servers in a data center.

4. Which of the following computing emphasizes proximity to end user?

a) Mist computing

b) Cloud computing

c) Edge computing

d) Fog computing

Answer: d

Explanation: Compared to cloud computing, fog computing emphasizes proximity to end user and
client objectives, dense geographical distribution and local resource pooling.

5. QoS stands for ____________

a) Quality of storage

b) Quality of service

c) Quality of security

d) Quality of swarms

Answer: b
Explanation: Quality of service is the description or measurement of the overall performance of a
service, such as telephony or computer network or a cloud computing service, particularly the
performance seen by the users of the network.

7. Does fog support IoT concepts.

a) True

b) False

Answer: a

Explanation: Fog networking supports the Internet of Things concept, in which most of the devices
used by humans on a daily basis will be connected to each other.

8. Which computing can be heavy weight and dense form of computing power?

a) Mobile Cloud computing

b) Fog computing

c) Mist computing

d) Cloud computing

Answer: d

Explanation: Cloud computing is the practice of using a network of remote servers hosted on the
Internet of store, manage, and process data, rather than a local server or a personal computer.
Cloud computing can be heavyweight and dense form of computing power.

9. . ____________ Computing is the extension of cloud computing.

a) Mobile cloud computing

b) Mist computing

c) Fog computing

d) Cloud computing

Answer: c

Explanation: Fog computing refers to extending cloud computing to the edge of an enterprise’s
network. Fog computing facilitates the operation of computer, storage, and networking services
between end devices and computing data centers.

10. _____________ is a lightweight computing.

a) Cloud computing

b) Mobile cloud computing


c) Mist computing

d) Fog computing

Answer: c

Explanation: Mist computing is a lightweight and rudimentary form of computing power that resides
directly within the network fabric at

Day 2
An Introduction to Arm Mbed OS
Prof. Sourav Shyam
Mbed OS is the OS for IoT Arm Cortex microcontroller. It support all RTOs API. The bare
metal profile is designed to run application that do not required complex thread management.
Mbed OS IS THE FASTEST way to build IoT products with cortex Arm Processor.

We can realize the actual feel of Mbed OS either through

1. Mbed Studio- download dedicated desktop IDE


2. Mbed online compiler – zero installation web IDE- great for education
3. Mbed CLI – command line tool (sir .. has installed Mbed CLI in his
system)

Mbed OS-6 conceptual architecture

It is divided into three layers.

1. Bottom layer-hardware physical devices


2. Middle layer – Mbed HAL
3. Top layer – Mbed OS( core API, storage API, security API, connectivity API,
management API)

Mbed OS v6.3 relaeased in 21st sept 2020.

Hardware with Mbed OS IOT device are basically of three types.

1. Modules
2. Board
3. Components
Use bare metal profile to develop IOT application using C

#include “Mbed_driver.h”

#include <stdio.h>

int main()

/* create eventQueue */

...

return 0;

Does Mbed OS runs on the raspberry Pi – No, because it is an ARM Processor

Create your own application using Mbed CLI

Create your bare metal application

4. create a new Mbed OS application and navigate to its directory that contains full
Mbed OS libraries

mbed-os/

2. create a main.cpp file

3. copy the code snippet of previous slide into main.cpp

4. open the mbed_app.json(in the root of application) and replace with following contents

“requires” | [“bare-metal”],

“target_overrites”{

}
USE SMALL C LIBRARY FOR MBED-OS BARE METAL

Newlib-nano is an open source C library target embedded micro controller to create


application.

Arm microlib is an alternative to default C library.

Arm microlib does not support return from main(), on returning it crashes bare metal
application. There are two ways to prevent crash

1. Sleeping in a loop
2. Dispatch an eventQueue

Application build with Mbed CLI

1. Install Mbed CLI


2. During installation on your system, it depends open the OS in ur system.

For example in case of window OS, we required to download Mbed CLI for window

3. Compiling the code

BUILD APPLICATION USING ONLINE COMPILER

Program setup concepts are

 Execution(threads, modes)
 Bootstrap(entry point, booting sequence and retargeting)

SESSION -2
Introduction to Mbed API
1. Driver APIs
2. Platform API
3. Storage API
a. Block device
b. Filesystem
c. KVStore
4. Connectivity API
5. Security API (Mbed Crypto, Mbed TLS, Pelion device magmt)
Session – 3
IoT device management
Four fundamental device management requirements exist for any Internet of
Things (IoT) device deployment: provisioning and authentication,
configuration and control, monitoring and diagnostics, and software updates
and maintenance. Here, each of these are defined.

Any IoT system must address four fundamental categories of device management, which are:

1. Provisioning and authentication


2. Configuration and control
3. Monitoring and diagnostics
4. Software updates and maintenance

DEVICE MANAGEMENT LIFE CYCLE

1. Onboard 2. Manage 3. Update 4. Secure

IOT CHALLENGES
1. Complexity 2. Data 3. Trust

Device management journey


Day 3
Session 1
SMART GRID IOT; ANKUSH SHARMA

The Smart Grid is part of an IoT framework, which can be used to remotely monitor and manage
everything from lighting, traffic signs, traffic congestion, parking spaces, road warnings, and early
detection of things like power influxes as the result of earthquakes and extreme weather.

SMART GRID LAYER-ARCHITECTURE

INTEROPERABILITY LAYERS
1. Component layer
2. Communication layer
3. Information layer
4. Function layer
5. Business layer

SMART GRID ARCHITECTURE MODEL

1. MARKET
2. OPERATIONS
3. SERVICE PROVIDERS

IOT EVOLUTION

1. connect devices

2. collect data through sensors and store

3. access data through cloud standards and open API

4. complex analytics – big data

5. unique value (realize the true potential)


mmWave radar sensors 
mmWave is an extremely valuable sensing technology for detection of objects
and providing the range, velocity and angle of these objects. It is a contactless-
technology which operates in the spectrum between 30GHz and 300GHz.

SESSION 2
CURRENT STATUS AND FUTURE ASPECT OF IOT
JAVED BAIG
FIRST IOT sensor is RFID TAG

SMART HOME

IOT GAME CHANGER

2. Smart thermostat senses the customer is awake and notices the HEM
system

2 to 14 steps

ZIGBEE

WHY ZIGBEE, it was realized that WIFI and luetooth are unsuitable for many applications.
6LoWPAN Network Layers

APPLICATION SUCH AS HOME AUTOMATION ARE SUITABLE TO USE LOW


DATA RATE, MEDIUM RANGE ZIGBEE AND 6LOWPAN PROTOCOLS.
IOT ARCHITECTURE

IOT EDGE THINGS --> GATEWAY PLATFORM -->CLOUD

 EDGE THINGS(SENSORS, DEVICE)


 GATEWAY PLATFORM

1. FIELD CONNECTOR( BLE, WIFI,NFC,ZIGBEE)

2. SMART GATEWAY CAPABILITIES(routing, dataflow, storage, analytic, mgmt)

3. cloud connector(MQTT,AMQP,XMPP,COAP)

 CLOUD (iot platform services)

SMART GRID EXAMPLE

SMART HOME, SMART BUILDING  Gateway  cloud service

 Communication of one sensor to another sensor


 Turn your ac before reaching at home
 Dream of your house

iot impact on global economy

Accenture ESTIMATES THAT IOT could add $14.2 trilion to the global economy by 2030.

sensor types

1. temperature sensors

2. magnetic sensors

3. humidity sensors

4. current sensors

5. speciality sensors
mmWaveSensor monitor driver alertness.

It analyses soil condition.

Challenges of IoT

1. Connectivity

2. continuity

3. compliance

4. coexistence

5. cyber security

Session 3
IOT ENABLED 5G NETWORK
Prof. Ajay Pratap

Desnse smart cell


Also discussed

2. Smart transport
3. Waste management

IOT Platform - IoT Platform combines innovative software and networking


technologies with cloud-based platforms and digital information services, and
supports bestin-class hardware from leading component vendors.

The IoT platform is a suite of components that enable: Deployment of


applications that monitor, manage, and control connected devices. Remote data
collection from connected devices. Independent and secure connectivity
between devices

System Model

PRB- Physical Resource Block

OPERATION cycle ON IOT

1. Computation
2. Communication and
3. control

DAY 4
LIFI FUTURE OF INTERNET
Dr. Mayank Swayrnk

LiFi Spectrum
Architecture of Lifi
WORKING

1. lifi components: transmitter, receiver

2. Requires white light to send and receive signals

3. Digital encoding

4. Follows standards of WPAN(IEEE 802.15.7)

Also explained an ATTACK in Cyber Security

Difference between LiFi and WiFi


Session 2
NXP India Communication
Cyber security in IOT
SEE NOTE.
CONNECTIVITY
SESSION 3

NXP BY PRADEEP

BASIC SECUIRTY (see notes)


Q1. IoT edge computing is processing raw data at the boundaries of the network, as far
away from the points of data creation as possible.

 True
 False

CORRECT ANSWER - False 

the data can be processed on the devices themselves or on edge gateways.

Q2. Which of the following is a challenge of IoT edge computing?

1. Increased security risks


2. Inconsistent industry standards and regulations
3. Lack of support for new devices
4. All of the above

YOUR ANSWER - Increased security risks

CORRECT ANSWER - All of the above

IoT deployments typically spread beyond traditional IT infrastructure, which creates more entry
points for a cyber-attack. The lack of IoT standards not only makes management of IoT devices on
the edge more difficult for administrators, it also make them vulnerable.

Q3. Which issue couldn't IoT edge computing help solve?

1. Bandwidth issues
2. Complex connectivity issues
3. Legacy-system bridge issues
4. Data sovereignty compliance issues

CORRECT ANSWER - Complex connectivity issues


IoT edge computing resolves many problems by keeping and processing the data from IoT
devices at the edge where it is created. The expansion of the edge with the proliferation of
IoT devices has created more complex networks and connectivity issues

Q4. One application of IoT edge computing is using sensors, real-time data analytics
and data operations to run a self-driving car.

True
Self-driving cars require real-time data analytics at the edge because even the milliseconds it
takes to transmit data to the cloud is too much latency when lives are at stake. Cars with IoT
edge computing combined with AI will make immediate decisions where the data is created.
Q5. What connects IoT devices to the cloud in order to aggregate data, translate
between protocols and process data before sending it on?

1. IoT sensors
2. IoT standards
3. IoT gateways
4. IoT processors

YOUR ANSWER - IoT gateways


IoT gateways, which can be interchangeable with the term edge gateways, manage and
connect IoT devices to the cloud.

Q6. How will the edge change organizations' relationship with the cloud?

1. The edge will send more data directly to the cloud


2. The edge will reduce the amount of data sent to the cloud, potentially saving
organizations money
3. Organizations will use the cloud the same way and just add edge computing
4. None of the above

YOUR ANSWER - The edge will reduce the amount of data sent to the cloud, potentially
saving organizations money

Q7. How much enterprise data does Gartner predict will be created and processed at
the edge by 2025?

45%
55%
75%
85%

CORRECT ANSWER - 75%


In 2018, only 10% of an organization's data was at the edge, according to Gartner senior
research director Santhosh Rao, in the Gartner report "What Edge Computing Means for
Infrastructure and Operations Leaders." By 2025, Gartner estimated the number will grow to
75% of all enterprise data. The increase in data created at the edge will make transmitting the
IoT data deluge to a cloud inefficient.

Question 31 : IoT analytics was proposed by _________


1. Syntel
2. IBM
3. Accenture
4. Intel
Answer : Option 4 – Intel

Question 32 : We need to invest in storage and prepossessing capacity to perform


_________
1. C analytics
2. Bigdata analytics
3. Python analytics
4. IoT analytics
Answer : Option 4 - IoT analytics

Question 37 : The IoT operates at ___________ scale.


1. Machine
2. Human
3. Device
4. Sensor
Answer : Option 1 – Machine

Question 38 : Which requires Edge analytics?


1. Bigdata
2. IoT
3. Bigdata & IoT
4. Device data
Answer : Option 2 – IoT

Question 39 : Which requires data stream management?


1. Bigdata
2. IoT
3. Bigdata & IoT
4. Device data
Answer : Option 2 – IoT

Question 40 : What IoT collects?


1. Human generated data
2. Sensor data
3. Machine generated data
4. Device data
Answer : Option 3 - Machine generated data 

Introduction
ARM, IBM and NXP/Freescale combined forces a while back in order to bring out their IoT starter
kit bundle.
1. What is the role of Bigdata in smart grid architecture of IoT?

a) Store data

b) Manage data

c) Collect data

d) Security

View Answer

Answer: a

Explanation: Bigdata stores time series data, unstructured data, provided context for analytics, API
for enterprise applications.

2. What is the role of Cloud in smart grid architecture of IoT?

a) Store data

b) Manage data

c) Collect data

d) Security

View Answer :
Answer: b
Explanation: Cloud to edge Middleware: manage data and edge devices, data streaming and event
processing, control authorized access.

3. What is the role of Gateway in smart grid architecture of IoT?

a) Store data

b) Manage data

c) Collect data

d) Security

View Answer :

Answer: c

Explanation: Gateway: collects data from sensors, abstract protocols, perform local autonomous
decision, transfer information.
6. Which of the following is IoT device manageability?

a) Protocol abstraction

b) Simple and fast installation

c) Security with hardware

d) Data storage

View Answer

Answer: b

Explanation: IoT Device Manageability:

Simple and fast Installation and configuration Enable deployment of new

7. IoT security management includes ________

a) Protocol abstraction

b) Simple and fast installation

c) Security with hardware

d) Data storage

View Answer

Answer: c

Explanation: IoT security management :

Improves security with hardware;Enable secure communication to sensors;End to End Security from
Sensor to Cloud.

8. IoT data scalability includes ________

a) Protocol abstraction

b) Simple and fast installation

c) Security with hardware

d) Data storage

View Answer

Answer: d

Explanation: IoT Data Scalability: Data and Event processing at the edge;Data storage at the edge
9. What is the example for smart grid edge device for utility?

a) Smart Meters

b) Smart Home

c) Smart Car

d) Smart Collage

View Answer

Answer: a

Explanation: Examples of Smart Grid Edge Devices for Utilities: Voltage and Current sensors;Smart
Inverters;Smart Motors.

Security in IOT

Q. _________ is an attack which forces an end user to execute unwanted actions on a web
application in which he/she is currently authenticated.

a. Cross-site scoring scripting

b. Cross-site request forgery

c. Two-factor authentication

d. Cross-site scripting

A Web site that allows users to enter text, such as a comment or a name, and then stores it and later
displays it to other users, is potentially vulnerable to a kind of attack called a ___________________
attack.

a. Cross-site scripting

Q. AES uses a 128 bit block size and a key size of __________ bits.

a. 128 or 192

b. 128 or 256

c. 128, 192, or 256

d. 128, 192, or 256

Q. An encryption scheme is unconditionally secure if the ciphertext generated does not contain
enough information to determine uniquely the corresponding plaintext, no matter how much cipher
text is available.

a. True
Q. Even with two-factor authentication, users may still be vulnerable to_____________attacks.

a. Scripting

b. Cross attack

c. Man-in-the-middle

d. Radiant

Q. The DES algorithm has a key length of

a. 64 Bits

b. 128 Bits

c. 16 Bits

d. 32 Bits

Q. If the sender and receiver use different keys, the system is referred to as conventional cipher
system.

a. True

b. False

Q. In asymmetric key cryptography, the private key is kept by

a. Receiver

b. sender and receiver

c. Sender

d. all the connected devices to the network

 IOT Quiz 
Q1. 1. Which of the following is the java extension file in IoT? ANS. .jar

Q2. Which of the following category is used for business to consumer process? IIOT

Q3. Which is the future application of IoT? Na. green IOT system

Q4. Which of the following is not LPWAN technologies?

SigFox/ NB-IoT/ LoRa/ WiFi

You might also like