You are on page 1of 11

5.

Ubiquitous clouds and IOT


Tuesday, 28 June, 2022 10:24 PM

Q. Describe cloudlets for mobile cloud computing with neat diagram.


- A cloudlet is a small-scale data center or cluster of computers designed to
quickly provide cloud computing services to mobile devices, such as
smartphones, tablets and wearable devices, within close geographical
proximity.
- The goal of a cloudlet is to increase the performance of response time of
applications running on mobile devices
- This is done by using low latency, high-bandwidth wireless connectivity and
by hosting cloud computing resources, such as virtual machines, physically
closer to the mobile devices accessing them.
- This is intended to eliminate the wide area network (WAN) latency delays
that can occur in traditional cloud computing models.
- The cloudlet was specifically designed to support interactive and resource-
intensive mobile applications, such as those for speech recognition, language
processing, machine learning and virtual reality.

Cloud Computing Page 1


Q. Difference between cloud and cloudlets
Cloudlet Cloud
Soft state Can be soft or hard
Self-managed Professional Administration required
Connected via LAN or WI-FI Connected via internet
Just local users connect Several users at a time from worldwide
Only cached data Real time data access
Datacenter in a box Machine room with high power required

Q. Performance metrics of HPC/HTC (Distributed systems and cloud)


1. Availability
- Denoted in the form of percentage
- Higher the better
- It is critical performance metric which guarantees you maximum uptime
for your systems
2. Reliability
- Represented in two forms
1. Mean Time Between Failure(MTBF)
- Average time duration between two successive failures
- higher the better
2. Mean Time To Repair(MTTR)
- Average time to fix a system and bring back to normal
- Lower the better
3. Response Time

Cloud Computing Page 2


3. Response Time
- Average time to submit a request to server and get a response back.
- Lower the better
- If user and the servers are not in the same region the latency is high.
So try to set up servers in the same region where users belong
- If response time becomes too high the application becomes
unresponsive
4. Security
- Denotes number of threats and vulnerabilities discovered for a service
over a fixed time frame
- Lower the better
- If security vulnerabilities are high, that can be exploited by hackers to
provide harm
5. Throughput
- Also known as bandwidth
- Signifies the number of tasks that can be performed by a server in a
unit time
- Higher the better
- Can be used by audio/video applications such as Netflix as they require
high bandwidth to provide better picture quality
6. Capacity
- Denotes available infrastructure for a cloud service provider
- Higher the better
- If a cloud service in a region is running at 95% of its total capacity,
Then it might affect newer workloads as well as scaling of already
running applications
7. Scalability
- Denotes the scaling limits of a cloud provider
- Higher the better
- Cloud service which have higher scalability limits can handle workloads
efficiently
8. Latency
- Denotes the network congestion between source and the destination.
- Lower the better
- Your requests take time to reach the server if latency is high. Though
server responds quickly, you may feel that the server is slow due to
slow packet travel.
9. Support
- Support time denotes how quickly you get your problems solved.
- Lower the better
10. Cost
- Cost denotes the billing that occur when you use resources
- Lower the better may not be true here. As price depends on the quality
of service provided.

Q. What are enabling technologies for IOT


- IoT(internet of things) enabling technologies are
1. Wireless Sensor Network

Cloud Computing Page 3


1. Wireless Sensor Network
2. Cloud Computing
3. Big Data Analytics
4. Communications Protocols
5. Embedded System

1. Wireless Sensor Networks


- A WSN comprises distributed devices with sensors which are used to
monitor the environmental and physical conditions.
- A wireless sensor network consists of end nodes, routers and coordinators.
- End nodes have several sensors attached to them where the data is passed
to a coordinator with the help of routers.
Example –
▪ Weather monitoring system
▪ Indoor air quality monitoring system
▪ Soil moisture monitoring system
▪ Surveillance system
▪ Health monitoring system
2. Cloud Computing
- It provides us the means by which we can access applications as utilities over
the internet.
- Cloud means something which is present in remote locations.
- With Cloud computing, users can access any resources from anywhere like
databases, webservers, storage, any device, and any software over the
internet.
Services Offered-
1. IAAS
2. PAAS
3. SAAS
3. Big Data Analytics
- It refers to the method of studying massive volumes of data or big data.
- Collection of data whose volume, velocity or variety is simply too massive and
tough to store, control, process and examine the data using traditional
databases.
- Big data is gathered from a variety of sources including social network
videos, digital images, sensors and sales transaction records.
Examples –
▪ Bank transactions
▪ Data generated by IoT systems for location and tracking of vehicles
▪ E-commerce and in Big-Basket
▪ Health and fitness data generated by IoT system such as a fitness
bands
4. Communications Protocols
- They are the backbone of IoT systems and enable network connectivity and
linking to applications.
- Communication protocols allow devices to exchange data over the network.
- Multiple protocols often describe different aspects of a single
communication.
- Used in-
Data Encoding

Cloud Computing Page 4


▪ Data Encoding
▪ Addressing Schemes
5. Embedded Systems
- It is a combination of hardware and software used to perform special tasks.
- It includes microcontroller and microprocessor memory, networking units
(Ethernet Wi-Fi adapters), input output units (display keyword etc. ) and
storage devices (flash memory).
- It collects the data and sends it to the internet.
- Embedded systems used in-
▪ Digital camera
▪ DVD player, music player
▪ Industrial robots
▪ Wireless Routers etc.

Q. How RFID works


- RFID (radio frequency identification) is a form of wireless communication
- Every RFID system consists of three components:
▪ a scanning antenna,
▪ a transceiver (RFID reader)
▪ a transponder (RFID tag)
- When the scanning antenna and transceiver are combined, they are referred
to as an RFID reader or interrogator.
- There are two types of RFID readers -- fixed readers and mobile readers

Working
- The RFID reader is a network-connected device that can be portable or
permanently attached.
- It uses radio waves to transmit signals that activate the tag.
- Once activated, the tag sends a wave back to the antenna, where it is
translated into data.

RFID Tag
- The transponder is in the RFID tag itself.
- The read range for RFID tags varies based on factors including the type of
tag, type of reader, RFID frequency and interference in the surrounding
environment or from other RFID tags and readers.
- Tags that have a stronger power source also have a longer read range.
- RFID tags are made up of an integrated circuit (IC), an antenna and a
substrate.
- The part of an RFID tag that encodes identifying information is called the
RFID inlay.
▪ Active RFID. An active RFID tag has its own power source, often a
battery.
▪ Passive RFID. A passive RFID tag receives its power from the reading
antenna, whose electromagnetic wave induces a current in the RFID
tag's antenna.

Cloud Computing Page 5


Advantages:
1. Can store good amount of information
2. Re-writable
3. Cost-effective
4. Does not require to be visible
5. Robust and proven

Disadvantages:
1. Can be read by anyone, privacy issue
2. Labor intensive to program each tag and attach to each object
3. Electromagnetic interference can restrict functioning of RFID

Q. Explain ZigBee
- low power, low data rate supporting wireless networking standard, which is
basically used for two-way communication between sensors and control
system.
- Short range : 10m to 100m
- ZigBee Technology supports transfer of simple data like that from sensors.
- It supports low data rate of about 250 kbps
- ZigBee Technology is used mainly for applications requiring low power, low
cost, low data rate and long battery life.

Benefits
- High interoperability
- High usability
- High reliability
- Worldwide acceptance
- High security

Zigbee has 3 types of devices


1. ZigBee coordinator
- Responsible for initiating and maintaining devices of network
All end devices directly communicate to coordinator

Cloud Computing Page 6


- All end devices directly communicate to coordinator
2. Zigbee Routers
- These devices can extend ZigBee network working as intermediary
3. ZigBee end devices
- Devices or sensor that send data

Q. Explain GPS and its working.


- GPS, or the Global Positioning System, is a global navigation satellite system
that provides location, velocity and time synchronization.
- GPS is everywhere. You can find GPS systems in your car, your smartphone
and your watch.
- GPS helps you get where you are going, from point A to point B.
- GPS is made up of three different components, called segments,
The three segments of GPS are:
1. Space (Satellites) —
- The satellites circling the Earth, transmitting signals to
users on geographical position and time of day.
2. Ground control —
- The Control Segment is made up of Earth-based monitor
stations, master control stations and ground antenna.
- Control activities include tracking and operating the
satellites in space and monitoring transmissions
3. User equipment —
- GPS receivers and transmitters including items like watches,
smartphones and telematic devices.

Working
- GPS works through a technique called trilateration.
(Trilateration is a mathematical technique used by a global positioning system (GPS)
device to determine user position, speed, and elevation. By constantly receiving and
analyzing radio signals from multiple GPS satellites and applying the geometry of
circles, spheres, and triangles, a GPS device can calculate the precise distance or range
to each satellite being tracked.)
- Satellites orbiting the earth send signals to be read and interpreted by
a GPS device, situated on or near the earth’s surface
- To calculate location, a GPS device must be able to read the signal
from at least four satellites.
- A single satellite broadcasts a microwave signal which is picked up by a
GPS device and used to calculate the distance from the GPS device to
the satellite.
- Since a GPS device only gives information about the distance from a
satellite, a single satellite cannot provide much location information.(It
cannot measure angles)
- When a satellite sends a signal, it creates a circle with a radius
measured from the GPS device to the satellite.
- When we add a second satellite, it creates a second circle, and the
location is narrowed down to one of two points where the circles
intersect.
With a third satellite, the device’s location can finally be determined,

Cloud Computing Page 7


- With a third satellite, the device’s location can finally be determined,
as the device is at the intersection of all three circles.

- That said, we live in a three-dimensional world, which means that each


satellite produces a sphere, not a circle. The intersection of three
spheres produces two points of intersection, so the point nearest Earth
is chosen.
- As a device moves, the radius (distance to the satellite) changes. When
the radius changes, new spheres are produced, giving us a new position.
- We can use that data, combined with the time from the satellite, to
determine velocity, calculate the distance to our destination and the
ETA.

There are five main uses of GPS:


• Location — Determining a position.
• Navigation — Getting from one location to another.
• Tracking — Monitoring object or personal movement.
• Mapping — Creating maps of the world.
• Timing — Making it possible to take precise time measurements.

Applications of GPS:
• Emergency Response: During an emergency or natural disaster, first
responders use GPS for mapping, following and predicting weather, and
keeping track of emergency personnel.
• Entertainment: GPS can be incorporated into games and activities like
Pokémon Go and Geocaching.
• Health and fitness: Smartwatches and wearable technology can track
fitness activity (such as running distance) and benchmark it against a
similar demographic.
• Construction, mining and off-road trucking: From locating equipment, to
measuring and improving asset allocation, GPS enables companies to
increase return on their assets. Check out our posts on construction
vehicle tracking and off-road equipment tracking.
• Transportation: Logistics companies implement telematics systems to
improve driver productivity and safety. A truck tracker can be used to
support route optimization, fuel efficiency, driver safety and

Cloud Computing Page 8


support route optimization, fuel efficiency, driver safety and
compliance.

Q. Innovative applications of IOT


1. Smart Buildings
- A smart building is any structure that uses automated processes to
automatically control the building’s operations including heating,
ventilation, air conditioning, lighting, security and other systems.
- A smart building uses sensors, actuators and microchips, in order to
collect data and manage it according to a business’ functions and
services.
- This infrastructure helps owners, operators and facility managers
improve asset reliability and performance, which reduces energy use,
optimizes how space is used and minimizes the environmental impact of
buildings.
- Smart office buildings, health care facilities, hospitals, educational
facilities, stadiums and many other types of smart buildings exist
around the world.
- Making a smart building, or making a building smart, begins by linking
core systems such as lighting, power meters, water meters, pumps,
heating, fire alarms and chiller plants with sensors and control systems.
- Many new building have “smart” technology, and are connected and
responsive to a smart power grid.

2. Smart Power Grid


- A smart grid is an electricity network based on digital technology that
is used to supply electricity to consumers via two-way digital
communication.
- Three Features of smart grid
□ Availability
□ Integrity
□ Confidentiality
- The Smart Grid introduces a two-way interchange where both
electricity and information can be exchanged — in both directions —

Cloud Computing Page 9


electricity and information can be exchanged — in both directions —
between the power utilities and the consumers.
Advantages
- It reduces electricity theft.
- It reduces electricity losses (transmission, distribution etc.)
- It reduces electricity cost, meter reading cost, T&M operations and
maintenance costs etc.
- It reduces equipment failures due to automatic operation based on
varying load conditions.
- It reduces air emissions of CO2, SOx, NOx
- It reduces oil usage and wide scale black-outs.
- Smart grid is capable of meeting increased consumer demand without
adding infrastructure.

3. Supply Chain Management


- Supply Chain Management refers Distributing goods and services and
ensures supply is matched according to demand
- IOT offers
□ Forecasting
- Previously historical data was used to predict sales and
production
- Now we predict real time according to live sales data
- This helps to prioritize production of fast selling products
and halt slow moving products
□ Sourcing
- Previously it was difficult to know the route that product has
followed to reach customers.
- This casted the doubt for originality of product,
- By using IOT they can now check the history from origin to
reaching the store.
□ Auto ordering
- Smart shelfs can track product consumption in home or
stores and auto order the items if they fell down from
certain limit
- This ensures fast selling items are never out of stock and
slow selling are not over stocked
□ Automated checkout
- Now-a-days malls put RFID tags on products.
- When a customer picks up item it is automatically added to
cart.
- This helps in automated billing without the intervention of
cashier
□ Logistic
- IOT enabled supply chain can track trucks, cargos in real
time.
- It provides the current information about the product
location or any delay in the product delivery.

Cloud Computing Page 10


Q. Cyber Physical System
- Cyber-physical systems integrate sensing, computation, control and
networking into physical objects and infrastructure, connecting them to the
Internet and to each other.
- In cyber-physical systems, physical and software components are deeply
intertwined
- Cyber-physical systems generally combine sensor networks with embedded
computing to monitor and control the physical environment
- This requires three fundamental attributes to be present, also known as the
three Cs – communication, control and computing.
Unless these three elements are present you will not have a system where
physical processes can affect computations and vice versa

Applications of CPS:
1. In healthcare,
- cyber-physical systems can be used to remotely monitor the real-time
physical conditions of patients using non-intrusive wearables to limit
hospitalizations.
- These systems can also be used to help more people ‘age in place’, using
sensors in homes to detect falls or illness and automatically raise an
alarm
2. In agriculture
- cyber-physical systems can help to reduce pesticide use by identifying
and delivering it only where it’s needed
- to improve the health and wellbeing of livestock by automatically
warning of illnesses or injury
- They can also enable more accurate agricultural management by
collecting information about the climate, soil, humidity and water
resources
3. In manufacturing
- they can be used to improve processes and therefore efficiencies by
self-regulating the entire manufacturing process to make decentralized
decisions about production and maintenance

○ In addition to conventional safety considerations, those designing cyber-


physical systems need to be familiar with security and privacy risks and
techniques (both in the cyber and physical spaces) as the systems are
especially vulnerable to attacks due to the fact that they’re located in open
environments and can be accessed wirelessly

Cloud Computing Page 11

You might also like