Professional Documents
Culture Documents
L-T-P-[C] 4-0-0-[4]
1
Courseware and Reference Books
Text Books:
Mayur Ramgir, Internet of Things- Architecture, Implementation, and Security, Pearson Education India,
2019.
Reference Books:
1. Raj Kamal, INTERNET OF THINGS Architecture and Design Principles, McGraw Hill Education
(India) Private Limited, 2017.
2. S. Misra, A. Mukherjee, and A. Roy, Introduction to IoT, Cambridge University Press, 2020.
3. S. Misra, C. Roy, and A. Mukerjee, 2020, Introduction to Industrial Internet of Things and Industry 4.0,
CRC Press, 2020
4. Research Papers.
2
Lecture No 10
Revision
3
IoT Data Management and Compute Stack
4
In most cases, the processing location is outside the
smart object.
5
As data volume, the variety of objects connecting to
the network, and the need for more efficiency
increase, new requirements appear,
Minimizing latency:
Milliseconds matter for many types of industrial
systems,
6
Analyzing data close to the device that collected
the data can make a difference
between averting disaster and a cascading
system failure.
7
Increasing local efficiency:
Collecting and securing data across a wide
geographic area with different environmental
conditions may not be useful.
8
An important design consideration, therefore, is how to
design an IoT network to manage this volume of data in
an efficient way such that the data can be quickly
analyzed and lead to business benefits.
10
Bandwidth in last-mile IoT networks is very
limited. When dealing with thousands/millions of
devices, available bandwidth may be on order of
tens of Kbps per device or even less.
11
The volume of data transmitted over the
backhaul can be high, and much of the data may
not really be that interesting (such as simple
polling messages).
Fog Computing
The solution to the challenges mentioned in the previous section is
12
Any device with computing, storage, and network
connectivity can be a fog node.
13
The IoT Data Management and Compute Stack with Fog
Computing
14
In this way, it is performing distributed analytics
such that the volume of data sent upstream is
greatly reduced.
For example, there might be a fog router on an oil derrick
that is monitoring all the sensor activity at that location.
15
Fog applications are as diverse as the Internet
of Things itself.
16
The defining characteristic of fog computing are as
follows:
Geographic distribution:
In sharp contrast to the more centralized cloud,
the services and applications targeted by the fog
nodes demand widely distributed deployments.
17
Wireless communication between the fog and
the IoT endpoint:
Although it is possible to connect wired nodes,
the advantages of fog are greatest when dealing
with a large number of endpoints, and wireless
access is the easiest way to achieve such scale.
18
Edge Computing
Note
If clouds exist in the sky, and fog sits near the ground, then
mist is what actually sits on the ground.
19
The Hierarchy of Edge, Fog, and Cloud
20
While cloud resources are expected to be
homogenous, it is fair to expect that in many cases
both edge and fog resources will use different
operating systems, have different CPU and data
storage capabilities, and have different energy
consumption profiles.
21
From an architectural standpoint, fog nodes closest
to the network edge receive the data from IoT
devices.
22
Data that can wait seconds or minutes for action
is passed along to an aggregation node for
analysis and action.
23
Fog computing accelerates awareness and response to
events by eliminating a round trip to the cloud for analysis.
Summary
We learnt
24
IoT Interdependencies
25
So, if we look at IoT from another prospective or we
have sensors, we have actuators and a bunch of
other things that they are in between as shown in this
particular figure.
26
Power management responsibilities are:
How much power is required,
for how long it is going to power,
then what are the ways to harvest energy if at all
it can be harvested and how much power
consumption is going to take place at different
points of time, can it be optimized different
points of operation on and so on.
So, these are the different you know radios that can
help in communicating the data that is sensed
onward to other nodes.
27
So, alongside we also have things like virtual
machines which takes care of the virtualization of the
nodes.
So, these are the once MQTT CoAP, we are going to talk next in the
subsequent lectures. So, that will make our understanding clear.
28
IoT Service Oriented Architecture
29
Sensing layer basically takes care of sensing
through different RFIF tags sensors and so on.
Industrial IoT
IoT device connects to an IP network and
the global internet.
31
Consumer IoT
IoT device communicates within the locally
networked devices.
32
IoT and Associated Technologies
33
Then, we have the machine to machine
communication where one machine talks to another
without any human intervention.
34
Technical Deviations from Web
35
But difference is that we have a new set of protocols
that are used over here. So, the new set of protocols
and additionally in IoT, unlike in the case of web
things.
36
IoT Challenges
Security
Scalability
Energy efficiency
Bandwidth management
Modeling Analysis’
Interfacing
Interoperability
Data storage
Data analytics
Complexity management (e.g., SDN)
Summary
We learnt
37