Professional Documents
Culture Documents
Reference: International Telecommunications Union (ITU). (2005). The Internet of Things. Executive Summary [Online]
Gartner Research
Reference: http://www.gartner.com/it-glossary/internet-of-things/
Reference: Teemu Savolainen, Jonne Soininen, and Bilhanan Silverajan,”IPv6 Addressing Strategies for IoT”, IEEE SENSORS
JOURNAL, VOL. 13, NO. 10, OCTOBER 2013
Source: Intel
Sensors
Trillions Smart Systems
Billions
Applications IoT
Millions
IoT WAN •Connection of various network segments, Organizationally and geographically wide, Connects to
the internet
IoT Node •Connected to other nodes inside a LAN via the IoT LAN, May be sometimes connected to the
internet through a WAN directly
IoT Gateway •A router connecting the IoT LAN to a WAN to the Internet, Can implement several LAN
and WAN, Forwards packets between LAN and WAN on the IP layer
IoT Proxy •Performs active application layer functions between IoT nodes and other entities
Node
Source: Teemu Savolainen, Jonne Soininen, and Bilhanan Silverajan,”IPv6 Addressing Strategies for IoT”, IEEE Sensors Journal, Vol. 13, No. 10,
Oct 2013
References:
1. http://www.electronics‐tutorials.ws/io/io_1.html
Based on Based on
Output Data type
Analog Scalar
Vector/
Digital
Multimedia
15
Non-linearity
Reference: https://en.wikipedia.org/wiki/Sensor
Reference: https://en.wikipedia.org/wiki/Sensor
Mechanical
Electric
Pneumatic
Electrical
Thermal/ Magnetic
Mechanical
Reference: https://en.wikipedia.org/wiki/Actuator
Reference: https://en.wikipedia.org/wiki/Actuator
Reference: https://en.wikipedia.org/wiki/Actuator
Source: O. Vermesan, P. Friess, “Internet of Things – Converging Technologies for Smart Environments and Integrated Ecosystems”, River
Publishers, Series in Communications, 2013
Local Network
Internet
Backend Services
Applications
Source: O Vermesan, P. Friess, “Internet of Things – Converging Technologies for Smart Environments and Integrated
Ecosystems”, River Publishers, Series in Communications, 2013
Proxy Server
Radio Actuation
Gateway
Processor
Sensor
Websocket Cloud‐server
Internet
Sensor Mote
Source: Li Da Xu, Wu He, and Shancang Li, “Internet of Things in Industries: A Survey “, IEEE Transactions on Industrial Informatics, Vol. 10, No. 4, Nov. 2014.
Industrial IoT
IoT device connects to an IP network and the global Internet.
Communication between the nodes done using regular as well as
industry specific technologies.
Consumer IoT
IoT device communicates within the locally networked devices.
Local communication is done mainly via Bluetooth, Zigbee or WiFi.
Generally limited to local communication by a Gateway
3G/4G/5G
CPS IoV
Tele‐
M2M
medicine
Source: O Vermesan, P. Friess, “Internet of Things – Converging Technologies for Smart Environments and Integrated Ecosystems”, River
Publishers, Series in Communications, 2013
Security Interfacing
Scalability Interoperability
Energy efficiency Data storage
Bandwidth management Data Analytics
Modeling and Analysis Complexity management
(e.g., SDN)
Growth of networks
Interference among devices
Network management
Heterogeneity in networks
Protocol standardization within networks
Source: O Vermesan, P. Friess, “Internet of Things – Converging Technologies for Smart Environments and Integrated
Ecosystems”, River Publishers, Series in Communications, 2013
Source: O. Vermesan, P. Friess, “Internet of Things – Converging Technologies for Smart Environments and Integrated
Ecosystems”, River Publishers, Series in Communications, 2013
EL
Allows for the smallest devices with limited processing ability
to transmit information wirelessly using an Internet protocol.
Allows low‐power devices to connect to the Internet.
PT
Created by the Internet Engineering Task Force (IETF) ‐ RFC
5933 and RFC 4919.
N
Source: T. Winter, P. Thubert, A. Brandt, J. Hui, R. Kelsey, P. Levis, K. Pister, R. Struik , JP. Vasseur, R. Alexander,
“RPL: IPv6 Routing Protocol for Low‐Power and Lossy Networks”, IETF, Standards Track, Mar. 2012
EL
Internet Protocol version 6 (IPv6).
Header compression and address translation techniques allow
the IEEE 802.15.4 radios to access the Internet.
PT
IPv6 packets compressed and reformatted to fit the IEEE
802.15.4 packet format.
Uses include IoT, Smart grid, and M2M applications.
N
Introduction to Internet of Things 4
Addressing in 6LoWPAN
• 64‐bit addresses: globally
Addressing
EL
unique
• 16 bit addresses: PAN specific;
64‐bit assigned by PAN coordinator
Extended
16‐bit
PT
• IPv6 multicast not supported by
802.15.4
• IPv6 packets carried as link
N
Short layer broadcast frames
Introduction to Internet of Things
6LowPAN Packet Format
1 2 3 4 5 6 7 8 1 2 3 4 5 6 7 8 1 2 3 4 5 6 7 8 1 2 3 4 5 6 7 8
Length Flags DSN
IEEE 802.15.4
EL
PAN ID
Destination (64 bit)
Ver
PT
Traffic Class
Payload Length
Flow Label
Next Header Hop Limit
IPv6
Source Address (128 bit)
N
Destination Length (128 bit)
1 2 3 4 5 6 7 8 1 2 3 4 5 6 7 8 1 2 3 4 5 6 7 8 1 2 3 4 5 6 7 8
EL
0 1 Dispatch Type Specific Header
1 2 3 4 5 6 7 8 1 2 3 4 5 6 7 8 1 2 3 4 5 6 7 8 1 2 3 4 5 6 7 8
EL
1 0 V F Hops Left Originator Address Final Address
•
address PT
V: ‘0’ if originator is 64‐bit extended address, ‘1’ if 16‐bit
1 2 3 4 5 6 7 8 1 2 3 4 5 6 7 8 1 2 3 4 5 6 7 8 1 2 3 4 5 6 7 8
EL
1 1 0 0 Datagram Size Datagram Tag
1 1 0 0
3 4 5 6
Datagram Offset
7 8
PT
1 2 3 4
Datagram Size
5 6 7 8 1 2 3 4 5 6 7 8 1 2
Datagram Tag
3 4 5 6 7 8
N
(b) Subsequent Fragment
EL
the PAN space.
Routing between IPv6
and the PAN domain
use:
LOADng
PT
Routing protocols in
N
RPL
EL
Basic operations of LOADng include:
Generation of Route Requests (RREQs) by a LOADng Router
(originator) for discovering a route to a destination,
Forwarding of such RREQs until they reach the destination LOADng
Router,
PT
Generation of Route Replies (RREPs) upon receipt of an RREQ by the
indicated destination, and unicast hop‐by‐hop forwarding of these
RREPs towards the originator.
N
Source: Clausen, T.; Colin de Verdiere, A.; Yi, J.; Niktash, A.; Igarashi, Y.; Satoh, H.; Herberg, U.; Lavenu, C. et al. (January 2016). The
Lightweight On‐demand Ad hoc Distance‐vector Routing Protocol ‐ Next Generation (LOADng). IETF. I‐D draft‐clausen‐lln‐loadng‐14
EL
Optimized flooding is supported, reducing the overhead incurred by
RREQ generation and flooding.
Only the destination is permitted to respond to an RREQ.
Intermediate LOADng Routers are explicitly prohibited from
sought destination. PT
responding to RREQs, even if they may have active routes to the
EL
Maintains routing topology using low rate beaconing.
Beaconing rate increases on detecting inconsistencies (e.g.
node/link in a route is down).
PT
Routing information included in the datagram itself.
Proactive: Maintaining routing topology.
N
Reactive: Resolving routing inconsistencies.
Source: T. Winter, P. Thubert, A. Brandt, J. Hui, R. Kelsey, P. Levis, K. Pister, R. Struik , JP. Vasseur, R. Alexander,
“RPL: IPv6 Routing Protocol for Low‐Power and Lossy Networks”, IETF, Standards Track, Mar. 2012
EL
RPL supports message confidentiality and integrity.
Supports Data‐Path Validation and Loop Detection
minimizing energy
minimizing latency
PT
Routing optimization objectives include
N
satisfying constraints (w.r.t node power, bandwidth, etc.)
Source: T. Winter, P. Thubert, A. Brandt, J. Hui, R. Kelsey, P. Levis, K. Pister, R. Struik , JP. Vasseur, R. Alexander,
“RPL: IPv6 Routing Protocol for Low‐Power and Lossy Networks”, IETF, Standards Track, Mar. 2012
EL
It is required that the reachability of a router be verified
before the router can be used as a parent.
PT
N
Source: T. Winter, P. Thubert, A. Brandt, J. Hui, R. Kelsey, P. Levis, K. Pister, R. Struik , JP. Vasseur, R. Alexander,
“RPL: IPv6 Routing Protocol for Low‐Power and Lossy Networks”, IETF, Standards Track, Mar. 2012
EL
Data digitally encoded in RFID tags, which can be read by a
reader.
Somewhat similar to barcodes.
PT
Data read from tags are stored in a database by the reader.
As compared to traditional barcodes and QR codes, RFID tag
N
data can be read outside the line‐of‐sight.
Source: “How does RFID work?” AB&R (Online)
EL
The tag is covered by a protective material which also acts as
a shield against various environmental effects.
Tags may be passive or active.
PT
Passive RFID tags are the most widely used.
Passive tags have to be powered by a reader inductively
before they can transmit information, whereas active tags
N
have their own power supply.
Source: “How does RFID work?” AB&R (Online)
EL
AIDC performs object identification, object data collection and
mapping of the collected data to computer systems with little or no
human intervention.
AIDC uses wired communication
PT
RFID uses radio waves to perform AIDC functions.
The main components of an RFID system include an RFID tag or
smart label, an RFID reader, and an antenna.
N
Source: “How does RFID work?” AB&R (Online)
EL
Asset tracking
Personnel tracking
Controlling access to restricted areas
ID badging
Supply chain management
PT
N
Counterfeit prevention (e.g. in the pharmaceutical industry)
Source: “How does RFID work?” AB&R (Online)
EL
Identification (EPC, uCode, IPv6, URIs)
Communication / Transport (WiFi, Bluetooth, LPWAN)
Discovery (Physical Web, mDNS, DNS‐SD)
PT
Data Protocols (MQTT, CoAP, AMQP, Websocket, Node)
Device Management (TR‐069, OMA‐DM)
Semantic (JSON‐LD, Web Thing Model)
N
Multi‐layer Frameworks (Alljoyn, IoTivity, Weave, Homekit)
Source: Internet of Things Protocols (Online)
PT
N
Introduction to Internet of Things 3
Introduction
Message Queue Telemetry Transport.
EL
ISO standard (ISO/IEC PRF 20922).
It is a publish‐subscribe‐based lightweight messaging protocol for
use in conjunction with the TCP/IP protocol.
MQTT was introduced by IBM in 1999 and standardized by OASIS in
2013.
PT
Designed to provide connectivity (mostly embedded) between
applications and middle‐wares on one side and networks and
N
communications on the other side.
Source: “MQTT”, Wikipedia (Online)
EL
of messages and distributed by the message broker.
Designed for:
Remote connections
Limited bandwidth
Small‐code footprint
PT
N
Source: “MQTT”, Wikipedia (Online)
EL
• Lightweight sensors
Publishers
• Applications interested in sensor data
Subscribers
PT
Brokers • Connect publishers and subscribers
• Classify sensor data into topics
N
Source: “MQTT”, Wikipedia (Online)
EL
Disconnect
Subscribe
Unsubscribe
Publish
PT
N
Source: “MQTT”, Wikipedia (Online)
EL
request/response paradigm).
Publish/subscribe is event‐driven and enables messages to be
pushed to clients.
The central communication point is the MQTT broker, which is in
rightful receivers. PT
charge of dispatching all messages between the senders and the
EL
Therefore the clients don’t have to know each other. They
only communicate over the topic.
PT
This architecture enables highly scalable solutions without
dependencies between the data producers and the data
consumers.
N
Source: “MQTT 101 – How to Get Started with the lightweight IoT Protocol”, HiveMQ (Online)
EL
which are separated by a slash.
A sample topic for sending temperature data of the living
room could be house/living‐room/temperature.
PT
On one hand the client (e.g. mobile device) can subscribe to
the exact topic or on the other hand, it can use a wildcard.
N
Source: “MQTT 101 – How to Get Started with the lightweight IoT Protocol”, HiveMQ (Online)
EL
The plus sign is a single level wild card and only allows arbitrary
values for one hierarchy.
If more than one level needs to be subscribed, such as, the entire
PT
sub‐tree, there is also a multilevel wildcard (#).
It allows to subscribe to all underlying hierarchy levels.
For example house/# is subscribing to all topics beginning with
N
house.
Source: “MQTT 101 – How to Get Started with the lightweight IoT Protocol”, HiveMQ (Online)
EL
Amazon Web Services use Amazon IoT with MQTT.
Microsoft Azure IoT Hub uses MQTT as its main protocol for
telemetry messages.
PT
The EVRYTHNG IoT platform uses MQTT as an M2M protocol
for millions of connected products.
Adafruit launched a free MQTT cloud service for IoT
N
experimenters called Adafruit IO.
EL
based on lightweight attribute based encryption.
The main advantage of using such encryption is the broadcast
encryption feature, in which one message is encrypted and
delivered to multiple other nodes, which is quite common in
IoT applications.
PT
In general, the algorithm consists of four main stages: setup,
encryption, publish and decryption.
N
Source: M. Singh, M. Rajan, V. Shivraj, and P. Balamuralidhar, "Secure MQTT for Internet of Things (IoT)," in Fifth International Conference on
Communication Systems and Network Technologies (CSNT 2015), April 2015, pp. 746‐751
EL
When the data is published, it is encrypted and published by the
broker which sends it to the subscribers, which is finally decrypted
at the subscriber end having the same master secret key.
PT
The key generation and encryption algorithms are not standardized.
SMQTT is proposed only to enhance MQTT security features.
N
Source: M. Singh, M. Rajan, V. Shivraj, and P. Balamuralidhar, "Secure MQTT for Internet of Things (IoT)," in Fifth International Conference on
Communication Systems and Network Technologies (CSNT 2015), April 2015, pp. 746‐751
EL
networks.
Designed for Machine to Machine (M2M) applications such
PT
as smart energy and building automation.
Based on Request‐Response model between end‐points
Client‐Server interaction is asynchronous over a datagram
N
oriented transport protocol such as UDP
Source: Z. Shelby , K. Hartke, C. Bormann, “The Constrained Application Protocol (CoAP)”, Internet Engineering Task Force (IETF), Standards Track,
2014
EL
interface.
Representational State Transfer (REST) is the standard
interface between HTTP client and servers.
PT
Lightweight applications such as those in IoT, could result in
significant overhead and power consumption by REST.
CoAP is designed to enable low‐power sensors to use RESTful
N
services while meeting their power constraints.
Source: Z. Shelby , K. Hartke, C. Bormann, “The Constrained Application Protocol (CoAP)”, Internet Engineering Task Force (IETF), Standards Track,
2014
EL
Request/response.
The messaging sub‐layer is responsible for reliability and duplication of
messages, while the request/response sub‐layer is responsible for
communication.
CoAP has four messaging modes:
Confirmable
Non‐confirmable
Piggyback
PT
N
Separate
Source: V. Karagiannis, P. Chatzimisios, F. Vazquez‐Gallego, and J. Alonso‐Zarate, "A survey on application layer protocols for the internet of
things," Transaction on IoT and Cloud Computing, vol. 3, no. 1, pp. 11‐17, 2015
EL
Application
Request
CoAP
PT Messages
UDP
N
Source: Z. Shelby , K. Hartke, C. Bormann, “The Constrained Application Protocol (CoAP)”, Internet Engineering Task Force (IETF), Standards Track,
2014
Message Types‐CoAP
Confirmable
EL
Non‐Confirmable
PT Piggyback
Separate
N
Source: Z. Shelby , K. Hartke, C. Bormann, “The Constrained Application Protocol (CoAP)”, Internet Engineering Task Force (IETF), Standards Track,
2014
EL
PT
N
Source: V. Karagiannis, P. Chatzimisios, F. Vazquez‐Gallego, and J. Alonso‐Zarate, "A survey on application layer protocols for the internet of
things," Transaction on IoT and Cloud Computing, vol. 3, no. 1, pp. 11‐17, 2015
EL
sends its response directly after receiving the message, i.e., within the
acknowledgment message.
On the other hand, the separate mode is used when the server response
Similar to HTTP, CoAP utilizes GET, PUT, PUSH, DELETE messages requests
to retrieve, create, update, and delete, respectively
N
Source: V. Karagiannis, P. Chatzimisios, F. Vazquez‐Gallego, and J. Alonso‐Zarate, "A survey on application layer protocols for the internet of
things," Transaction on IoT and Cloud Computing, vol. 3, no. 1, pp. 11‐17, 2015
EL
PT
N
Source: V. Karagiannis, P. Chatzimisios, F. Vazquez‐Gallego, and J. Alonso‐Zarate, "A survey on application layer protocols for the internet of
things," Transaction on IoT and Cloud Computing, vol. 3, no. 1, pp. 11‐17, 2015
EL
URL and content‐type support.
Support for the discovery of resources provided by known
CoAP services.
notifications. PT
Simple subscription for a resource, and resulting push
EL
A communication protocol for message‐oriented middleware
based on XML (Extensible Markup Language).
Real‐time exchange of structured data.
PT
It is an open standard protocol.
N
Source: “XMPP”, Wikipedia (Online)
EL
across a network, and the availability information of these
services.
Well‐suited for cloud computing where virtual machines,
PT
networks, and firewalls would otherwise present obstacles to
alternative service discovery and presence‐based solutions.
Open means to support machine‐to‐machine or peer‐to‐peer
N
communications across a diverse set of networks.
Source: “XMPP”, Wikipedia (Online)
EL
own XMPP server.
Open standards – No royalties or granted permissions are
required to implement these specifications
PT
Security – Authentication, encryption, etc.
Flexibility – Supports interoperability
N
Source: “XMPP”, Wikipedia (Online)
EL
Jingle
• multimedia signalling for voice, video, file transfer
Multi‐user Chat
PubSub PT
• flexible, multi‐party communication
EL
Text based communications induces higher network
overheads.
Binary data must be first encoded to base64 before
transmission. PT
N
Introduction to Internet of Things 18
Applications
Publish‐subscribe systems
EL
Signaling for VoIP
Video
File transfer
Gaming PT
Internet of Things applications
Smart grid
N
Social networking services
EL
Open standard for passing business messages between
applications or organizations.
Connects between systems and business processes.
PT
It is a binary application layer protocol.
Basic unit of data is a frame.
ISO standard: ISO/IEC 19464
N
Source: “Advanced Message Queuing Protocol”, Wikipedia (Online)
EL
Organizations Technologies Time Space
PT Connects across
N
Introduction to Internet of Things 5
Features
Security
EL
Reliability
Interoperability
PT
Routing
Queuing
Open standard
N
Introduction to Internet of Things 6
Message Delivery Guarantees
At‐most‐once
EL
each message is delivered once or never
At‐least‐once
each message is certain to be delivered, but may do so multiple times
Exactly‐once PT
message will always certainly arrive and do so only once
N
Reference: "OASIS AMQP version 1.0, sections 2.6.12‐2.6.13". OASIS AMQP Technical Committee
EL
tear down the transfer of messages between two peers:
Open (connection open)
Begin (session open)
Attach (initiate new link)
PT
Transfer (for sending actual messages)
Flow (controls message flow rate)
Disposition (Informs the changes in state of transfer)
Detach (terminate the link)
End (session close)
N
Close (connection close)
Source: O.S. Tezer, “An advanced messaging queuing protocol walkthrough ”, DigitalOcean (Online), 2013
EL
• Receives messages and routes them to Queues
Bindings
PT • Rules for distributing messages (who can access
what message, destination of the message)
N
Source: O.S. Tezer, “An advanced messaging queuing protocol walkthrough ”, DigitalOcean (Online), 2013
EL
Fan‐out
PT
Topic
Header
N
Source: O.S. Tezer, “An advanced messaging queuing protocol walkthrough ”, DigitalOcean (Online), 2013
EL
Persistence (Message delivery guarantees)
Delivery of messages to multiple consumers
PT
Possibility of ensuring multiple consumption
Possibility of preventing multiple consumption
High speed protocol
N
Source: O.S. Tezer, “An advanced messaging queuing protocol walkthrough ”, DigitalOcean (Online), 2013
EL
Connecting different systems and processes to talk to each other.
Allowing servers to respond to immediate requests quickly and
delegate time consuming tasks for later processing.
PT
Distributing a message to multiple recipients for consumption.
Enabling offline clients to fetch data at a later time.
Introducing fully asynchronous functionality for systems.
N
Increasing reliability and uptime of application deployments.
Source: O.S. Tezer, “An advanced messaging queuing protocol walkthrough ”, DigitalOcean (Online), 2013
EL
industrial IoTs:
IEEE 802.15.4
Zigbee
6LoWPAN
Wireless HART
Z‐Wave
ISA 100
Bluetooth
NFC
PT
N
RFID
EL
Developed for low‐data‐rate monitoring and control
applications and extended‐life low‐power‐consumption uses.
This standard uses only the first two layers (PHY, MAC) plus
PT
the logical link control (LLC) and service specific convergence
sub‐layer (SSCS) additions to communicate with all upper
layers
N
Operates in the ISM band.
Source: L.Fenzel, “What’s The Difference Between IEEE 802.15.4 And ZigBee Wireless?”, Electronic Design (Online), Mar. 2013
EL
Low‐speed versions use Binary Phase Shift Keying (BPSK).
High data‐rate versions use offset‐quadrature phase‐shift
keying (O‐QPSK).
EL
Transmission, for most cases, is Line of Sight (LOS).
Standard transmission range varies between 10m to 75m.
1000m. PT
Best case transmission range achieved outdoors can be upto
EL
C
• For China
D
• For Japan
E
PT
• Industrial applications
F
• Active RFID uses
N
G
• Smart utility networks (Smart Grids)
EL
Networks
FFD Router
Non‐Beacon
Enabled
Beacon
Enabled
PT
802.15.4
RFD
Device
Device
N
(a) (b)
EL
• Supports full protocol
EL
MAC
Frames Command
PT Acknowledgement
N
Data
EL
• Data‐frames sent via Slotted CSMA/CA with a super
frame structure managed by PAN coordinator
• Beacons used for synchronization & association of
PT
other nodes with the coordinator
• Scope of operation spans the whole network.
N
Introduction to Internet of Things
Non-Beacon Enabled Networks
• Data‐frames sent via un‐slotted CSMA/CA (Contention
Based)
EL
• Beacons used only for link layer discovery
• Requires both source and destination IDs.
PT
• As 802.15.4 is primarily, a mesh protocol, all protocol
addressing must adhere to mesh configurations
• De‐centralized communication amongst nodes
N
Introduction to Internet of Things
EL
Zigbee
PT
N
Introduction to Internet of Things 14
Features of ZigBee
Most widely deployed enhancement of IEEE 802.15.4.
EL
The ZigBee protocol is defined by layer 3 and above. It works with
the 802.15.4 layers 1 and 2.
The standard uses layers 3 and 4 to define additional
communication enhancements.
PT
These enhancements include authentication with valid nodes,
encryption for security, and a data routing and forwarding capability
that enables mesh networking.
The most popular use of ZigBee is wireless sensor networks using
N
the mesh topology.
Source: L.Fenzel, “What’s The Difference Between IEEE 802.15.4 And ZigBee Wireless?”, Electronic Design (Online), Mar. 2013
EL
• ZigBee Device Object
ZDO (Device management, Security, Policies)
EL
PT
N
Source: T. Agarwal, “ZigBee Wireless Technology Architecture and Applications”, Electronics Projects Focus (Online)
EL
communicate with any other
node within its range.
If nodes are not in range,
messages are relayed through
intermediate nodes.
This allows the network
PT
N
deployment over large areas.
Source: L.Fenzel, “What’s The Difference Between IEEE 802.15.4 And ZigBee Wireless?”, Electronic Design (Online), Mar. 2013
EL
reliability.
For example, if nodes C and F
are down, the message packets
from A can still be relayed to G
via B and E.
ZigBee mesh networks are self‐
PT
N
configuring and self‐healing.
Source: L.Fenzel, “What’s The Difference Between IEEE 802.15.4 And ZigBee Wireless?”, Electronic Design (Online), Mar. 2013
EL
The Coordinator forms the root of the ZigBee network tree and might
act as a bridge between networks.
There is a single ZigBee Coordinator in each network, which originally
initiates the network.
PT
It stores information about the network under it and outside it.
It acts as a Trust Center & repository for security keys.
N
Sources:
•"Wireless Sensor Networks Research Group". Sensor-networks.org. 2010-04-15.
•"Wireless Sensor Networks Research Group". Sensor-networks.org. 2009-02-05.
EL
Capable of running applications, as well as relaying information between
nodes connected to it.
ZigBee End Device (ZED):
It contains just enough functionality to talk to the parent node, and it
PT
cannot relay data from other devices.
This allows the node to be asleep a significant amount of the time thereby
enhancing battery life.
Memory requirements and cost of ZEDs are quite low, as compared to ZR
N
Sources: or ZC.
•"Wireless Sensor Networks Research Group". Sensor-networks.org. 2010-04-15.
•"Wireless Sensor Networks Research Group". Sensor-networks.org. 2009-02-05.
EL
routing.
To find the final destination, the AODV broadcasts a route request
to all its immediate neighbors.
PT
The neighbors relay the same information to their neighbors,
eventually spreading the request throughout the network.
Upon discovery of the destination, a low‐cost path is calculated and
N
informed to the requesting device via unicast messaging.
Source: “Zigbee”, Wikipedia (Online)
EL
Remote control (RF4CE or RF for consumer electronics)
Smart energy for home energy monitoring
Health care for medical and fitness monitoring
PT
Home automation for control of smart homes
Light Link for control of LED lighting
N
Telecom services
Source: L.Fenzel, “What’s The Difference Between IEEE 802.15.4 And ZigBee Wireless?”, Electronic Design (Online), Mar. 2013
PT
N
Introduction to Internet of Things 2
Introduction
WirelessHART is the latest release of Highway Addressable
EL
Remote Transducer (HART) Protocol.
HART standard was developed for networked smart field
devices.
EL
tank, inside a pipe, or at widely Data Link
separated warehouses. HART Network
Main difference between wired and
PT
unwired versions is in the physical,
data link and network layers.
Transport
Application
Wired HART lacks a network layer.
N
Source: A. Feng, “WirelessHART‐ Made Easy”, AwiaTech Blog (Online), Nov. 2011
EL
It operates only in the 2.4 GHz ISM band.
Employs and exploits 15 channels of the band to increase
reliability.
PT
N
Source: A. Feng, “WirelessHART‐ Made Easy”, AwiaTech Blog (Online), Nov. 2011
EL
Super‐frames consist of grouped 10ms wide timeslots.
Super‐frames control the timing of transmission to ensure collision
free and reliable communication.
PT
This layer incorporates channel hopping and channel blacklisting to
increase reliability and security.
Channel blacklisting identifies channels consistently affected by
N
interference and removes them from use.
Source: A. Feng, “WirelessHART‐ Made Easy”, AwiaTech Blog (Online), Nov. 2011
EL
creation, and security.
WirelessHART relies on Mesh networking for its communication,
and each device is primed to forward packets from every other
devices.
PT
Each device is armed with an updated network graph (i.e., updated
topology) to handle routing.
Network layer (HART)=Network + Transport + Session layers (OSI)
N
Source: A. Feng, “WirelessHART‐ Made Easy”, AwiaTech Blog (Online), Nov. 2011
EL
series of command and response messages.
Responsible for extracting commands from a message,
executing it and generating responses.
PT
This layer is seamless and does not differentiate between
wireless and wired versions of HART.
N
Source: A. Feng, “WirelessHART‐ Made Easy”, AwiaTech Blog (Online), Nov. 2011
EL
Interference‐prone channels avoided by using channel switching
post every transmission.
Transmissions synchronized using 10ms slots.
PT
During each slot, all available channels can be utilized by the various
nodes in the network allowing for the propagation of 15 packets
through the network at a time, which also minimizes the risk of
N
collisions.
Source: A. Feng, “WirelessHART‐ Made Easy”, AwiaTech Blog (Online), Nov. 2011
EL
guides them on when and where to send packets.
Allows for collision‐free and timely delivery of packets between a
source and destination.
The network manager updates information about neighbors, signal
PT
strength, and information needing delivery or receipt.
Decides who will send, who will listen, and at what frequency is
each time‐slot.
Handles code‐based network security and prevents unauthorized
N
nodes from joining the network.
EL
channels every time it sends a packet. ZigBee does not feature
hopping at all, and only hops when the entire network hops.
At the MAC layer, WirelessHART utilizes time division multiple
EL
ZigBee utilizes a tree topology, which makes nodes along the
trunk critical.
WirelessHART devices are all back compatible, allowing for
PT
the integration of legacy devices as well as new ones. ZigBee
devices share the same basis for their physical layers, but
ZigBee, ZigBee Pro, ZigBee RF4CE, and ZigBee IP are otherwise
incompatible with each other
N
Source: A. Feng, “WirelessHART‐ Made Easy”, AwiaTech Blog (Online), Nov. 2011
PT
N
Introduction to Internet of Things 13
Introduction
Near field communication, or NFC for
EL
short, is an offshoot of radio‐frequency Type B
identification (RFID).
NFC is designed for use by devices within Type A FeliCa
close proximity to each other.
All NFC types are similar but PT
communicate in slightly different ways. NFC
N
FeliCa is commonly found in Japan.
Source: “How NFC Works”, NFC (Online)
EL
which is readable by other devices,
Smartphone
however it cannot read information itself.
NFC tags found in supermarket products Active Passive
are examples of passive NFC.
PT
Active devices are able to collect as well
NFC Tags
as transmit information.
Smartphones are a good example of
N
active devices.
Source: “How NFC Works”, NFC (Online)
EL
A reader emits a small electric current which creates a magnetic
field that in turn bridges the physical space between the devices.
The generated field is received by a similar coil in the client device
where it is turned back into electrical impulses to communicate
information. PT
data such as identification number status information or any other
‘Passive’ NFC tags use the energy from the reader to encode their
response while ‘active’ or ‘peer‐to‐peer’ tags have their own power
N
source.
Source: “Inside NFC: how near field communication works”, APC (Online), Aug. 2011
EL
NFC can transmit data at a rate of either 106, 212 or 424 Kbps
(kilobits per second).
Tags typically store between 96 and 512 bytes of data.
PT
Communication range is less than 20cms.
N
Source: “Inside NFC: how near field communication works”, APC (Online), Aug. 2011
Peer‐to‐peer
EL
Lets two smartphones swap data
Card emulation
PT passive one
EL
Parcel tracking.
Information tags in posters and advertisements.
PT
Computer game synchronized toys.
Low‐power home automation systems.
N
Introduction to Internet of Things 20
EL
PT
N
Introduction to Internet of Things 21
EL
Connectivity Technologies – Part IV
PT Dr. Sudip Misra
Associate Professor
Department of Computer Science and Engineering
IIT KHARAGPUR
N
Email: smisra@sit.iitkgp.ernet.in
Website: http://cse.iitkgp.ac.in/~smisra/
PT
N
Introduction to Internet of Things 2
Introduction
EL
communications technology.
Intended for replacing cables connecting portable units
Maintains high levels of security.
PT
Bluetooth technology is based on Ad‐hoc technology also
known as Ad‐hoc Piconets.
N
Source: “Wireless Communication ‐ Bluetooth”, Tutorials Point (Online)
EL
scientific and medical (ISM) band at 2.4 to 2.485 GHZ.
Uses spread spectrum hopping, full‐duplex signal at a nominal
rate of 1600 hops/sec.
PT
Bluetooth supports 1Mbps data rate for version 1.2 and
3Mbps data rate for Version 2.0 combined with Error Data
Rate.
N
Source: “Wireless Communication ‐ Bluetooth”, Tutorials Point (Online)
EL
Class 3 radios have a range of up to 1 meter or 3 feet
Class 2 radios are most commonly found in mobile devices have a
range of 10 meters or 30 feet
PT
Class 1 radios are used primarily in industrial use cases have a range of
100 meters or 300 feet.
N
Source: “Wireless Communication ‐ Bluetooth”, Tutorials Point (Online)
EL
Inquiry Inquiry run by one Bluetooth device to try to
discover other devices near it.
PT
Connection
Bluetooth devices.
A device either actively participates in the
network or enters a low‐power sleep mode.
N
Source: “Bluetooth Basics”, Tutorials, Sparkfun.com (Online)
EL
Actively
transmitting or
PT Sleeps and only
listens for
transmissions at a
Power‐saving
mode where a
device sleeps for a
Slave will become
inactive until the
master tells it to
N
receiving data.
set interval . defined period and wake back up.
then returns back
Source: “Bluetooth Basics”, Tutorials, Sparkfun.com (Online) to active mode .
EL
PT
N
Introduction to Internet of Things 8
Baseband
Physical layer of the Bluetooth.
EL
Manages physical channels and links.
Other services include:
Error correction
Data whitening
Hop selection
Bluetooth security PT
Manages asynchronous and synchronous links.
N
Handles packets, paging and inquiry.
Source: “Bluetooth”, Wikipedia (Online)
EL
Layered over the Baseband Protocol and resides in the data link layer.
Used to multiplex multiple logical connections between two devices.
Provides connection‐oriented and connectionless data services to upper
layer protocols.
Provides:
PT
Protocol multiplexing capability
Segmentation and reassembly operation
N
Group abstractions
Source: “Bluetooth”, Wikipedia (Online)
EL
data stream.
RFCOMM provides for binary data transport .
Emulates EIA‐232 (formerly RS‐232) control signals over the
PT
Bluetooth baseband layer, i.e. it is a serial port emulation.
RFCOMM provides a simple reliable data stream to the user, similar
to TCP.
Supports up to 60 simultaneous connections between two BT
N
devices.
Source: “Bluetooth”, Wikipedia (Online)
EL
features.
Addresses the unique characteristics of the Bluetooth
environment such as, dynamic changes in the quality of
PT
services in RF proximity of devices in motion.
Can function over a reliable packet transfer protocol.
Uses a request/response model.
N
Source: “Bluetooth”, Wikipedia (Online)
EL
as Piconets.
Bluetooth devices exist in small ad‐hoc configurations with
the ability to act either as master or slave.
EL
single master.
The device that initializes establishment of the Piconet
becomes the master.
PT
The master is responsible for transmission control by dividing
the network into a series of time slots amongst the network
N
members, as a part of time division multiplexing scheme.
Source: “Wireless Communication ‐ Bluetooth”, Tutorials Point (Online)
EL
determines the timing of various devices and the frequency
hopping sequence of individual devices.
Each Piconet device supports 7 simultaneous connections to other
devices.
PT
Each device can communicate with several piconets simultaneously.
Piconets are established dynamically and automatically as
N
Bluetooth enabled devices enter and leave piconets.
Source: “Wireless Communication ‐ Bluetooth”, Tutorials Point (Online)
EL
Slaves are allowed to transmit once these have been polled by
the master.
Transmission starts in the slave‐to‐master time slot
PT
immediately following a polling packet from the master.
A device can be a member of two or more Piconets.
N
Source: “Wireless Communication ‐ Bluetooth”, Tutorials Point (Online)
EL
inner‐Piconet connections, allowing assemblies of linked
Piconets to form a physically extensible communication
infrastructure known as Scatternet.
PT
N
Source: “Wireless Communication ‐ Bluetooth”, Tutorials Point (Online)
Audio players
EL
Home automation
Smartphones
Toys
PT
Hands free headphones
Sensor networks
N
Introduction to Internet of Things 19
EL
PT
N
Introduction to Internet of Things 20
EL
Connectivity Technologies – Part V
PT Dr. Sudip Misra
Associate Professor
Department of Computer Science and Engineering
IIT KHARAGPUR
N
Email: smisra@sit.iitkgp.ernet.in
Website: http://cse.iitkgp.ac.in/~smisra/
PT
N
Introduction to Internet of Things 2
Introduction
EL
among devices used for home automation.
It uses RF for signaling and control.
Operating frequency is 908.42 MHz in the US & 868.42 MHz
in Europe. PT
Mesh network topology is the main mode of operation, and
N
can support 232 nodes in a network.
Source: “What is Z‐Wave?”, Smart Home (Online)
EL
865.2 India
868.1 Malaysia
868.42 ; 869.85 Europe
868.4 China, Korea
869.0
PT
908.4 ; 916.0
915.0 ‐ 926.0
919.8
921.4 ; 919.8
Russia
USA
Israel
Hong Kong
Australia, New Zealand
N
922.0 ‐ 926.0 Japan
Source: “Z‐Wave”, Wikipedia (Online)
EL
Zwave network.
Each logical Zwave network has 1 Home (Network) ID and
multiple node IDs for the devices in it.
PT
Nodes with different Home IDs cannot communicate with
each other.
Network ID length=4 Bytes, Node ID length=1 Byte.
N
Source: “What is Z‐Wave?”, Smart Home (Online)
EL
Baseband pulses are passed through a Gaussian filter prior to
modulation.
Filtering operation smoothens the pulses consisting of
PT
streams of ‐1 and 1, and is known as Pulse shaping.
Pulse shaping limits the modulated spectrum width.
N
Introduction to Internet of Things 6
EL
PT
N
Introduction to Internet of Things 7
Uses source routed network mesh topology using 1 primary
controller.
Devices communicate with one another when in range.
EL
When devices are not in range, messages are routed though
different nodes to bypass obstructions created by household
appliances or layout.
called Healing. PT
This process of bypassing radio dead‐spots is done using a message
EL
User friendly and provides a Requires so little power that
simple system that users can set devices can last up to seven years
up themselves. on one set of batteries.
Ideal for someone with a basic
understanding of technology who
wants to keep their home
automation secure, efficient,
PT Ideal for technology experts who
want a system they can customize
with their preferences and install
themselves.
N
simple to use, and easy to
maintain.
Source: Sarah Brown, “ZigBee vs. Z‐Wave Review: What’s the Best Option for You?”, The SafeWise Report (Online), Mar 2016
EL
Expensive. Cheaper than Zwave.
Nine out of ten leading ZigBee Alliance consists of
security and communication
companies in the U.S. use Z‐
Wave in their smart home
solutions
PT nearly 400 member
organizations that use,
develop, and improve
ZigBee’s open‐standard
N
wireless connection
Source: Sarah Brown, “ZigBee vs. Z‐Wave Review: What’s the Best Option for You?”, The SafeWise Report (Online), Mar 2016
PT
N
Introduction to Internet of Things 12
Introduction
International Society of Automation.
EL
Designed mainly for large scale industrial complexes and
plants.
More than 1 billion devices use ISA 100.11A
application layers. PT
ISA 100.11A is designed to support native and tunneled
EL
Topologies allowed are:
Star/tree
Mesh
Permitted networks include:
Radio link
ISA over Ethernet
PT
N
Field buses
Source: Cambridge Whitepaper, http://portal.etsi.org/docbox/Workshop/2008/200812_WIRELESSFACTORY/CAMBRIDGE_WHITTAKER.pdf
EL
ISA 100.11A protocol.
A tunneling mode is available to allow legacy data through the
ISA100.11A network.
PT
N
Source: Tim Whittaker , “What do we expect from Wireless in the Factory?”Cambridge Whitepaper, Cambridge Consultants, 2008
EL
routing device
H=Handheld
device
B=backbone
device
PT
N
Source: Tim Whittaker , “What do we expect from Wireless in the Factory?”Cambridge Whitepaper, Cambridge Consultants, 2008
Flexibility
EL
Support for multiple protocols
Use of open standards
PT
Support for multiple applications
Reliability (error detection, channel hopping)
Determinism (TDMA, QoS support)
N
Security
EL
Authentication and confidentiality services are independently
available.
A network security manager manages and distributes keys.
PT
Twin data security steps in each node:
Data link layer encrypts each hop.
N
Transport layer secures peer‐to‐peer communications.
Source: Tim Whittaker , “What do we expect from Wireless in the Factory?”Cambridge Whitepaper, Cambridge Consultants, 2008
EL
Safety 0 Emergency action Always critical
1 Closed loop regulatory Often critical
control
Control 2 Closed loop Usually non‐critical
Monitoring
3
4
PT
supervisory control
Open loop control
Alerting
Human‐in‐the‐loop
Short term operational consequence
N
5 Logging/ Downloading No immediate operational consequence
EL
Sensor nodes are capable of collaborating with one another and measuring the
condition of their surrounding environments (i.e. Light, temperature, sound,
vibration).
PT
The sensed measurements are then transformed into digital signals and processed
to reveal some properties of the phenomena around sensors.
Due to the fact that the sensor nodes in WSNs have short radio transmission
range, intermediate nodes act as relay nodes to transmit data towards the sink
N
node using a multi‐hop path.
EL
PT
N
Introduction to Internet of Things 3
Basic Components of a Sensor Node
EL
PT
N
Introduction to Internet of Things 4
Sensor Nodes
Multifunctional
EL
The number of sensor nodes
used depends on the application
type.
Short transmission ranges
PT
Have OS (e.g., TinyOS).
Battery Powered – Have limited
life.
N
Image source: Wikimedia Commons
EL
Must consume extremely low power
Operate in an unattended manner in a highly dense area.
PT
Should have low production cost and be dispensable
Be autonomous
N
Be adaptive to the environment
EL
Humidity level
Lighting condition
Air pressure
Soil makeup
Noise level
PT
N
a) Soil sensor node b) Temperature Flux sensor node c) Weather sensor node
Vibration Image source: Wikimedia Commons
17 11
EL
Source Obj
18
5 17
4 12 H
13
Source
PT 2
3
7
6
8
10
15
16
N
Sink 9 14
H Human User
1
EL
17 H
17
17 V
V 18 17 B
5
4 12
13
Source
Sink
H Human
PT 2
3
7
6
8
10
15
16
N
9 14
V Vehicle
B Building User
EL
1 1 V
2 V
17 11
4 V
V 15 V
4 15
17 V
18
5
12
Source
PT
6
3
13
8
10
16
N
Sink
V Vehicle
9 14
User
EL
H 1 H
B
1 B
4 11 4 B
17 9 H
6 18 17
V 5 H
12
4
Source
Sink
H Human
2
PT 3 13
8
10
15
16
2
V
V
N
V Vehicle
B Building 14
User
EL
9
17 11 Source Obj
6 H
1 V
18 2 B
5
4 12
Source
Sink
H Human
V
1
PT 3
13
8
10
16
N
V Vehicle
B Building 14
User
EL
of nodes.
1
Typically, throughput decreases at a rate of N , N = number of
nodes.
Quality of service
PT
Offering guarantees in terms of bandwidth, delay, jitter, packet loss
probability.
N
Limited bandwidth, unpredictable changes in RF channel
characteristics.
EL
Nodes have limited battery power
Nodes need to cooperate with other nodes for relaying their information.
Security
Open medium.
PT
Nodes prone to malicious attacks, infiltration, eavesdropping, interference.
N
Introduction to Internet of Things 14
Sensor Web
EL
PT
N
Source: X. Chu and R. Buyya, “Service Oriented Sensor Web”, Sensor Networks and Configuration, Springer, 2007, pp. 51‐74.
EL
SCS: Sensor
Collection Services
SPS: Sensor
Planning Services
PT SensorML: Sensor
Modeling language
N
Source: X. Chu and R. Buyya, “Service Oriented Sensor Web”, Sensor Networks and Configuration, Springer, 2007, pp. 51‐74.
EL
Sensor model language (sensorml)
Transducer model language (transducerml or TML)
PT
Sensor observations service (SOS)
Sensor planning service (SPS)
Sensor alert service (SAS)
N
Web notification services (WNS)
EL
intermediate nodes.
The intermediate nodes act as relays.
Wireless nodes are energy‐constrained.
PT
Nodes may or may not cooperate.
N
Introduction to Internet of Things 18
Cooperation in Wireless Ad Hoc and Sensor
Networks
Two extremities:
EL
Total cooperation: if all relay requests are accepted, nodes will
quickly exhaust limited energy.
Total non‐cooperation: if no relay requests are accepted, the
network throughput will go down rapidly.
Issues:
PT
Selfishness, self‐interests, etc.
Symbiotic dependence
N
Tradeoff: individual node’s lifetime vs. Throughput.
EL
change positions.
No centralized network management or certification authority.
Existence of malicious nodes.
Nodes prone to attacks, infiltration, eavesdropping, interference.
PT
Nodes can be captured, compromised, false routing information can
be sent – paralyzing the whole network.
The cooperating node or the node being cooperated might be
N
victimized.
EL
Normal Misbehaving
PT Unintentional Intentional
N
Failed Badly Failed Selfish Malicious
EL
conditions
Failed nodes are simply those that are unable to perform an
operation; this could be because of power failure and
PT
environmental events.
Badly failed nodes exhibit features of failed nodes but they
can also send false routing messages which are a threat to the
N
integrity of the network.
EL
as the protocol requires whenever there is a personal cost
involved. Packet dropping is the main attack by selfish nodes.
Malicious nodes aim to deliberately disrupt the correct
PT
operation of the routing protocol, denying network service if
possible.
N
Introduction to Internet of Things 4
Dynamic Misbehavior: Dumb Behavior
Detection of such temporary misbehavior in order to preserve normal
EL
functioning of the network – coinage and discovery of dumb behavior
In the presence of adverse environmental conditions (high temperature,
rainfall, and fog) the communication range shrinks
A sensor node can sense its surroundings but is unable to transmit the
sensed data
PT
With the resumption of favorable environmental conditions, dumb nodes
work normally
Dumb behavior is temporal in nature (as it is dependent on the effects of
N
environmental conditions)
EL
Detection, and, subsequently, the re‐establishment of network
connectivity is crucial
The sensed information can only be utilized if the connectivity between
each dumb node with other nodes in the network could be re‐established
PT
Before restoration of network connectivity, it is essential to detect the
dumb nodes in the network.
CoRD and CoRAD are two popular schemes that re‐establish the
N
connectivity between dumb nodes with others.
EL
Monitoring the event
Disseminating event‐data to the sink
PT
Adapting with the changes of event state
Event location
Event area
N
Event duration
Source: S. N. Das, S. Misra, M. S. Obaidat, "Event‐Aware Topology Management in Wireless Sensor Networks", Proceedings of Ubiquitous Information Technologies and
Applications (CUTE 2013), Springer Lecture Notes in Electrical Engineering, Vol. 214, 2013, pp. 679‐687
EL
The sensed information are transmitted in the form of packets
Information theoretic self‐management (INTSEM) controls the
transmission rate of a node by adjusting a node’s sleep time
Benefits
PT
Reduce consumption of transmission energy of
transmitters
N
Reduce consumption of receiving energy of relay nodes
S. N. Das and S. Misra, "Information theoretic self‐management of Wireless Sensor Networks", Proceedings of NCC 2013.
EL
PT
N
Introduction to Internet of Things 9
Social Sensing in WSNs
EL
Rare Events in Wireless Sensor Networks
WSNs are energy‐constrained
Scenario:
PT
Event monitoring using WSNs
WSNs suffer from ineffective sensing for rare events
Event monitoring or sensing, even if there is no event to monitor or
sense
N
Example: Submarine monitoring in underwater surveillance
EL
Limitations:
SMAC [Ye et al., INFOCOM, 2002]
Do not distinguish the 11rare
DutyCon [Wang et al., ACM TSN, 2013]
events from regular events
PW‐MAC [Tang et al., INFOCOM, 2011]
EL
Distinguish rare events and regular events
Adapt the duty‐cycle with the event occurrence probability.
Contribution:
PT
Probabilistic duty cycle (PDC) in WSNs
Accumulates information from the social media to identify the
occurrence possibility of rare events
N
Adjusts the duty cycles of sensor nodes using weak estimation
learning automata
EL
Mines Bord‐and‐Pillar Panel Using Wireless Sensor Networks
WSN‐based simulation model for building a fire monitoring and alarm
(FMA) system for Bord & Pillar coal mine.
PT
The fire monitoring system has been designed specifically for Bord &
Pillar based mines
N
Source: S. Bhattacharjee, P. Roy, S. Ghosh, S. Misra, M. S. Obaidat, "Fire Monitoring and Alarm System for Underground Coal Mines Bord‐and‐Pillar Panel Using Wireless
Sensor Networks", Journal of Systems and Software (Elsevier), Vol. 85, No. 3, March 2012, pp. 571‐581.
EL
real‐time monitoring and alarm in
case of a fire, but also capable of
providing the exact fire location and
spreading direction by continuously
gathering, analysing, and storing real
time information
PT
N
Source: S. Bhattacharjee, P. Roy, S. Ghosh, S. Misra, M. S. Obaidat, "Fire Monitoring and Alarm System for Underground Coal Mines Bord‐and‐Pillar Panel Using Wireless
Sensor Networks", Journal of Systems and Software (Elsevier), Vol. 85, No. 3, March 2012, pp. 571‐581.
EL
Wireless body area networks (WBANs) have recently
gained popularity due to their ability in providing
innovative, cost‐effective, and user‐friendly solution
for continuous monitoring of vital physiological
PT
parameters of patients.
Monitoring chronic and serious diseases such as
cardiovascular diseases and diabetes.
Could be deployed in elderly persons for monitoring
N
their daily activities.
EL
A proper aggregation function necessarily needs to be “fair", so that none of
the eligible elements are ignored unjustly.
In a post‐disaster environment, it is required to monitor patients' health
conditions remotely.
PT
This includes ambulatory healthcare services where the health status of a
patient is examined continuously over time, while the patient is being moved
to the emergency healthcare center.
N
Source: S. Misra, S. Chatterjee, "Social Choice Considerations in Cloud‐Assisted WBAN Architecture for Post‐Disaster Healthcare: Data Aggregation and
Channelization",Information Sciences (Elsevier), 2016
EL
the aggregation is not biased towards the leader nodes.
Data aggregation among the LDPUs is done in a “fair" manner
following the Theory of Social Choice.
PT
Aggregation is performed at mobile aggregation centers,
thereby increasing the scalability of the system.
After the aggregation of data, the gateways are allocated
dynamically.
N
Source: S. Misra, S. Chatterjee, "Social Choice Considerations in Cloud‐Assisted WBAN Architecture for Post‐Disaster Healthcare: Data Aggregation and
Channelization",Information Sciences (Elsevier), 2016
EL
In addition to the actual health condition, there exists indirect influence of
external parameters such as – age, height, weight, and sex on health
parameters.
In crisp set theory, we are unable to interpret how much ‘low’, ‘moderate’,
PT
or ‘high’, a particular health parameter is.
Exclusion of the important external parameters while assessing health and
the usage of traditional crisp set theory may result into inefficient decision
N
making.
Source: S. Moulik, S. Misra, C. Chakraborty, M. S. Obaidat, "Prioritized Payload Tuning Mechanism for Wireless Body Area Network‐Based Healthcare Systems", Proceedings
of IEEE GLOBECOM, 2014
EL
can optimize the energy consumption of each physiological
sensor
Fuzzy inference system (FIS) and markov decision process
PT
(MDP) are used to optimize energy consumption
N
Source: S. Moulik, S. Misra, C. Chakraborty, M. S. Obaidat, "Prioritized Payload Tuning Mechanism for Wireless Body Area Network‐Based Healthcare Systems", Proceedings
of IEEE GLOBECOM, 2014
EL
In medical emergency situations, it is important to discriminate the
WBANs transmitting critical heath data from the ones transmitting
data of regular importance.
PT
Existing frequency division‐based transmission in a multisource‐
single‐sink network results in flooding of the sink’s receiver buffer.
This leads to packet loss and consequent retransmission of the
N
regenerated packets.
Source: S. Misra, S. Sarkar, "Priority‐Based Time‐Slot Allocation in Wireless Body Area Networks During Medical Emergency Situations: An Evolutionary Game Theoretic
Perspective", IEEE Journal of Biomedical and Health Informatics, 2014
EL
Based on LDPU‐properties, such as the criticality of health data, energy
dissipation factor, and time elapsed since last successful transmission, a
fitness parameter is formulated which is a relative measure of node‐
importance.
PT
The priority‐based allocation of time slots (PATS) algorithm allows the
LDPUs to choose their strategies based on their fitness.
LDPUs with higher fitness are given higher preference, while ensuring
N
minimum waiting time between successive transmission of data‐packets.
Source: S. Misra, S. Sarkar, "Priority‐Based Time‐Slot Allocation in Wireless Body Area Networks During Medical Emergency Situations: An Evolutionary Game Theoretic
Perspective", IEEE Journal of Biomedical and Health Informatics, 2014
EL
Fig a: Push‐based formulation: Nodes
compute the position of the target and
periodically notify the sink node. A cluster
structure is commonly used in this case
PT Fig b: Poll‐based formulation: Nodes register the
presence of the target to permit a low‐cost query.
Data reports are sent toward the sink only when
Fig c: Guided formulation: Some nodes
(beacon nodes) define a trajectory to the
target. The tracker follows this trail to
N
there is a query to be answered. Tree structure is
intercept the target. Face structure is often
often used in this case
used in this case
Source: Éfren L. Souza, Eduardo F. Nakamura, and Richard W. Pazzi. 2016. Target Tracking for Sensor Networks: A Survey. ACM Computing Survey, 49, 2, 2016
EL
PT
N
Source: Éfren L. Souza, Eduardo F. Nakamura, and Richard W. Pazzi. 2016. Target Tracking for Sensor Networks: A Survey. ACM Computing Survey, 49, 2, 2016
EL
Sensor Network
A set of sensor nodes are deployed over an agricultural field
Each of the board are enabled with two type of sensors:
a) Passive Infrared (PIR)
b) Ultrasonic
PT
When an intruder enters into the field through the boundary (perimeter)
of the field, the PIR sensor detects the object.
N
The ultrasonic sensor senses the distance at which the object is located
Source: Sanku Kumar Roy, Arijit Roy, Sudip Misra, Narendra S Raghuwanshi, Mohammad S Obaidat, AID: A Prototype for Agricultural Intrusion Detection Using Wireless
Sensor Network, IEEE International Conference on Communications (ICC), 2015
EL
PT
N
Source: Sanku Kumar Roy, Arijit Roy, Sudip Misra, Narendra S Raghuwanshi, Mohammad S Obaidat, AID: A Prototype for Agricultural Intrusion Detection Using Wireless
Sensor Network, IEEE International Conference on Communications (ICC), 2015
EL
Camera sensor (CS) nodes
capture multimedia (video, audio, and the scalar) data, expensive and
resource hungry, directional sensing range
Scalar sensor (SS) nodes
PT
sense scalar data (temperature, light, vibration, and so on), omni‐
directional sensing range , and low cost
WMSNs consist of less number of CS nodes and large number of SS
nodes
N
Source: S. Misra, G. Mali, A. Mondal, "Distributed Topology Management for Wireless Multimedia Sensor Networks: Exploiting Connectivity and Cooperation", International
Journal of Communication Systems (Wiley), 2014
WMSNs Application
EL
In security surveillance, wild‐habitat monitoring, environmental
monitoring, SS nodes cannot provide precise information
CS nodes replace SS nodes to get precise information
PT
Deployment of both CS and SS nodes can provide better sensing and
prolong network lifetime
N
Source: S. Misra, G. Mali, A. Mondal, "Distributed Topology Management for Wireless Multimedia Sensor Networks: Exploiting Connectivity and Cooperation", International
Journal of Communication Systems (Wiley), 2014
EL
• Coverage of the event should be provided as soon as the event occurs
• Connectivity is another important metric that should be provided during video
data transfer from the event area to the control center
PT
• Therefore, Misra et al. proposed the distributed topology management of the
WMSNs considering coverage, connectivity, and network lifetime
• Coverage of the event is provided by using Coalition Formation Game between
the CS and SS nodes
N
Source: S. Misra, G. Mali, A. Mondal, "Distributed Topology Management for Wireless Multimedia Sensor Networks: Exploiting Connectivity and Cooperation", International
Journal of Communication Systems (Wiley), 2014
EL
Communication options among nanodevices
Electromagnetic
Molecular
PT
N
Introduction to Internet of Things 9
EL
PT
N
Source: Akyildiz and Jornet, “Electromagnetic Wireless Nanosensor Networks”, Nano Communication Networks, 2010
EL
Information packed into vesicles
Gap junction works as mediator between cells and vesicles
PT
Information exchange between communication entities using
molecules
Performed at NTT, Japan lab
N
Sources:
Jornet and Akyildiz, “Graphene‐based plasmonic nano‐antenna for terahertz band communication in nanonetworks”, IEEE JSAC, 2013
S. Hiyama, Y. Masitani, T. Suda, “Molecular transport system in molecular communication”, NTT Documo Technical Journal, Vol. 10, No. 3
EL
(SPP) generated upon
electromagnetic beam
EM communication for
Nanonetworks centers around
0.1‐10 Terahertz channel
PT
N
Sources:
Jornet and Akyildiz, “Graphene‐based plasmonic nano‐antenna for terahertz band communication in nanonetworks”, IEEE JSAC, 2013
S. Hiyama, Y. Masitani, T. Suda, “Molecular transport system in molecular communication”, NTT Documo Technical Journal, Vol. 10, No. 3
EL
• Based on various observations, it is proved that non-linear internal
waves, i.e., Solitons are one of the major scatters of underwater
sound.
PT
• If sensor nodes are deployed in such type of environment, inter-node
communication is affected due to the interaction of wireless acoustic
signal with these solitons, as a result of which network performance
N
is greatly affected.
Source: A. Mandal, S. Misra, M. K. Dash, T. Ojha, "Performance Analysis of Distributed Underwater Wireless Acoustic Sensor Networks in the
Presence of Internal Solitons", International Journal of Communication Systems (Wiley)
EL
oceanic scenarios.
• The existing works on performance analysis of UWASNs lack the
consideration of major dominating forces, which offer impetus for a
node’s mobility.
PT
• The existing works are limited to only shallow depths and coastal
areas. Therefore, in this paper, Mandal et al. used a physical
mobility model, named oceanic forces mobility model (OFMM), by
incorporating important realistic oceanic forces imparted on nodes.
N
In this model, nodes move in 3D ocean column.
Source: A. K. Mandal, S. Misra, T. Ojha, M. K. Dash, M. S. Obaidat, "Oceanic Forces and their Impact on the Performance of Mobile
Underwater Acoustic Sensor Networks",International Journal of Communication Systems (Wiley)
EL
• Iterative approach
Less initiators nodes (anchors) required
• Mobility prediction
Enhanced accuracy
PT
• Only 3 surface anchor nodes required
N
Source: T. Ojha and S. Misra, "MobiL: A 3-Dimensional Localization Scheme for Mobile Underwater Sensor Networks", Proceedings of the
19th Annual National Conference on Communications (NCC 2013), IIT Delhi, New Delhi, India, Feb. 15-17, 2013.
EL
• Start Dead- Reception
reckoning • Silent • Trilateration
• Broadcast beacon listening • Get z from
at const. interval • Receive pressure
Beacon
Sending PT ‘Effective’
set of beacon
message
sensor
Location
Estimation
N
Source: T. Ojha and S. Misra, “HASL: High-Speed AUV-Based Silent Localization for Underwater Sensor Networks”, Proceedings of the
9th International Conference on Heterogeneous Networking for Quality, Reliability, Security and Robustness(Qshine 2013), Springer, Greater
Noida, India, January 2013.
EL
• Unlocalized nodes: to
localize with minimum
localization delay.
Tic-tac-toe-arch: A self-organizing
EL
virtual architecture for underwater
sensor networks.
Calculating the duration of connectivity
PT
between the underwater nodes
A self-organizing network architecture by
utilizing the dynamic formation of virtual
N
topology
Source: T. Ojha, M. Khatua and S. Misra, "Tic-Tac-Toe-Arch: A Self-organizing Virtual Architecture for Underwater Sensor Networks", IET
Wireless Sensor Systems, Vol. 3, No. 4, December 2013, pp. 307-316.
EL
• Broadcast “REQ”
• Receive “RPLY”
Best Neighbour
Neighbour
Finding
PT Selection
• Calculate td
• Select Neighbour
• Set the selected
node in ‘Active’
mode for td time
with Max. td Set Duty
N
Cycle
EL
Connectivity – all the nodes are connected in the network, so that
sensed data can reach to sink node
Sensor Coverage studies how to deploy or activate sensors to cover
the monitoring area
Sensor placement
Density control
Two modes
PT
Static sensors
N
Mobile sensors
EL
Relationship between coverage and connectivity rs
If transmission range 2 * sensing range,
PT
coverage implies connectivity
Most sensors satisfy the condition!
Coverage is the main issue
P
D
N
S rt
EL
sensors
To determine, with respect to application‐specific performance
criteria,
PT
in case of static sensors, where to deploy and/or activate them
in case of (a subset of) the sensors are mobile, how to plan the trajectory
of the mobile sensors.
These two cases are collectively termed as the coverage problem in
N
wireless sensor networks.
EL
processing or reporting
Two types of reporting
event driven
on demand
PT
e.g. forest fire monitoring
EL
Distributed: Nodes compute their position by communicating with their neighbors only.
Centralized: Data collected at central point and global map computed.
Localized: Localized algorithms are a special type of distributed algorithms where only a
subset of nodes in the WASN participate in sensing, communication, and computation.
PT
Deterministic versus random
EL
Area coverage
Point coverage
Barrier coverage
PT
N
Introduction to Internet of Things 7
Area Coverage
Energy‐efficient random coverage
EL
Connected random coverage
A network is connected if any active node can communicate with
any other active node
PT
Zhang and Hou proved that if the communication range Rc is at
least twice the sensing range Rs, then coverage implies
connectivity
N
Source: Zhang and Hou, “Maintaining Sensing Coverage and Connectivity in Large Sensor Networks”, Ad Hoc & Sensor Wireless Networks, Vol. 1, pp. 89‐124, 2005.
EL
covered if there are at least two disks that intersect and all
crossing are covered
Based on these they proposed a distributed, localized
PT
algorithm called optimal geographical density control
N
Introduction to Internet of Things 9
Point Covergae
EL
Random point coverage – Distribute sensors randomly, so that every
point must be covered by at least one sensor at all times
Deterministic point coverage – Do the same in a deterministic
manner.
PT
N
Introduction to Internet of Things 10
Barrier Coverage
1‐barrier coverage – covered by at least 1 sensor
EL
2‐barrier coverage – covered by at least 2 sensors
K‐barrier coverage – covered by at least k sensors
PT
N
Introduction to Internet of Things 11
Barrier Coverage (contd.)
EL
Weak Coverage
PT Strong Coverage
N
Introduction to Internet of Things 12
Coverage Maintenance Crossings
EL
Exist crossings in R
Every crossing in R is covered
EL
minimizing overlap while covering crossings B
If nodes A and B are fixed, A
node C should be placed such that
OR = OQ O Q
PT
If nodes A, B, and C all can
change their locations, then
OP = OR = OQ
If all nodes have the same sensing range,
R
C
N
the distance between them is 3 rs
EL
Broadcasts a message containing
Ideal direction ( randomly selected )
Another node (B) closest to the ideal distance and angle becomes
active
active PT
A node (C) covering P and closest to the optimal location becomes
EL
Each node voluntarily participates with
probability p
Chooses a back‐off time randomly
PT
If it does not hear anything from its
neighbors, declares itself as starting
node
Declares its position and preferred
A
N
direction
EL
Each node computes the deviation from
desired position (based on distance and
angle)
message.
PT
Chooses a back‐off time randomly
When back‐off expires, it sends power ON
EL
until the entire area is Q
covered B
A
The nodes already
PT
covered go to sleep mode
P
O C
N
Introduction to Internet of Things 19
Optimal Geographical Density Control (OGDC)
Algorithm: Highlights
A node initiates the process with desired distance and angle
EL
Other nodes calculates the deviation, and the optimal one is
chosen
The process continues for all nodes
PT
All covered nodes go to sleep mode
This process is continued at each round
N
Introduction to Internet of Things 20
EL
PT
N
Introduction to Internet of Things 21
EL
Sensor Networks– Part V
PT Dr. Sudip Misra
Associate Professor
Department of Computer Science and Engineering
IIT KHARAGPUR
N
Email: smisra@sit.iitkgp.ernet.in
Website: http://cse.iitkgp.ac.in/~smisra/
EL
Advantages:
Easy deployment
Node can be placed in an optimized distance—Reduce the total
number of nodes
Disadvantages:
PT
Easy topology maintenance
EL
PT
N
Introduction to Internet of Things 3
Stationary Wireless Sensor Networks (Contd.)
EL
PT Failure Failure
N
Introduction to Internet of Things 4
Stationary Wireless Sensor Networks (Contd.)
EL
Failure Failure
PT Split of networks
N
Introduction to Internet of Things 5
Stationary Wireless Sensor Networks (Contd.)
EL
Solution? PT
To mobilize the sensor nodes
N
Mobile Wireless Sensor Networks (MWSN)
EL
Let us remember from previous lectures:‐
MANET‐Infrastructure less network of mobile devices connected wirelessly which
follow the self‐CHOP properties
Self‐Configure
Self‐Heal
Self‐Optimize
Self‐Protect
PT
Wireless Sensor Networks‐
Consists of a large number of sensor nodes, densely deployed over an area.
N
Sensor nodes are capable of collaborating with one another and measuring the condition of their
surrounding environments (i.e. Light, temperature, sound, vibration).
EL
MANET
PT WSN
N
MWSN
EL
Sink
PT
N
Introduction to Internet of Things 9
Components of MWSN
Mobile Sensor
EL
Nodes
Sense physical
parameters
from the
environment
PT Sink
N
Introduction to Internet of Things 10
Components of MWSN
EL
Sense physical parameters
from the environment
Sink
PT
When these nodes come
in close proximity of sink,
deliver data
N
Introduction to Internet of Things 11
Components of MWSN
EL
Sense physical parameters
from the environment
When these nodes come in Sink
PT
close proximity of sink,
deliver data
N
Introduction to Internet of Things 12
Components of MWSN
Mobile Sink
EL
Moves in order to
collect data from
sensor nodes Sink
PT
Based on some
algorithm sink moves
to different nodes in
N
the networks
Mobile Sink
EL
Moves in order to
collect data from
sensor nodes
PT
Based on some
algorithm sink moves
to different nodes in
Sink
N
the networks
Data Mules
EL
A mobile entity
Collects the data from
sensor nodes Sink
PT
Goes to the sink and
delivers the collected
data from different
N
sensor nodes
EL
sea or water levels
Can be linked with Autonomous
PT
Underwater Vehicles (AUVs)
Applications: Monitoring‐marine life,
water quality etc.
N
Introduction to Internet of Things 16
Terrestrial MWSNs
Sensor nodes typically deployed over land
EL
surface
Can be linked with Unmanned Aerial Vehicles
(UAVs)
PT
Applications: Wildlife monitoring, surveillance,
object tracking
N
Introduction to Internet of Things 17
Aerial MWSNs
Nodes fly on the air and sense data (physical
EL
phenomena or multimedia data)
Typical example is Unmanned Aerial Vehicles
(UAVs)
PT
Applications: Surveillance, Multimedia data
gathering
N
Introduction to Internet of Things 18
Possible Entity as Mobile Nodes in Daily-life
Human
EL
Mobility can not be predict
Cell phone can gather information and deliver data to an access point
Vehicles
Sensor equipped on it
PT
Sense data from different geographical locations and transmit to
road side unit (RSU)
Mobile Robot
Controllable sensor node
N
Collect data by predefined instructions
Deliver the data to a specific unit
EL
accelerometer and gyroscope
Miniaturization & proliferation of such devices give rise to new sensing
paradigms such as,
Participatory sensing
PT
People‐centric sensing
Opportunistic sensing
Basic idea:
Humans carry their devices and move around
N
Sensors embedded within the devices record readings
Sensory readings are then transmitted
EL
Sensing targets: Humans themselves are sensed, e.g., personal health monitoring
Sensor operators: Humans use sensors and applications in smartphones & PDAs to sense
surroundings
Data source: Humans disseminate & collect data without actually using any sensor, e.g.,
EL
Distributed sensing by devices carried by humans
Goal: Not just collect data, but allow common people to
access data and share knowledge
Collected data provides: PT
Quantitative information, e.g., CO2 level
Endorsement of authenticity, e.g., via geo‐tagged location & timestamp
N
Source: J. Burke, D. Estrin, M. Hansen, A. Parker, N. Ramanathan, S. Reddy, and M. B. Srivastava, “Participatory sensing,” in Workshop on World‐Sensor‐
Web (WSW’06): Mobile Device Centric Sensor Networks and Applications, Boulder, Colorado, USA, 2006, pp. 117–134.
EL
High latency
Asymmetric data rates; erroneous channels
WSN and MWSN:
PT
Typically assume the availability of end‐to‐end path
between any sensor node and BS
We saw data MULEs earlier
Such WSNs, in general, belong to the category of delay
N
tolerant wireless sensor networks (DT‐WSNs)
EL
Flexible deployment and management of new services using SDN.
Routing protocol should be adaptive in nature.
Contribute towards greening of the network.
Multi‐tasking. PT
Large coverage area.
N
Easily reconfigurable for varying missions.
EL
Relative position of UAV may change.
PT
Malfunctioning of UAVs
EL
Scalability Limited High
Survivability Poor High
Speed of Mission Slow Fast
Cost
Bandwidth required
Antenna
Complexity of Control
PT Medium
High
Omni‐directional
Low
High
Medium
Directional
High
N
Failure to coordinate Low Present
Source: Lav Gupta, Raj Jain, and Gabor Vaszkun. "Survey of important Issues in UAV communication networks." IEEE Communications Surveys & Tutorials 18.2 (2015): 1123‐
1152.
EL
Prone to malfunction
PT
Huge power requirements
Very complex
N
Physically prone to environmental effects: winds, rain, etc.
EL
High Survivability
Single Malfunction Proof
PT
Cost Effective
Efficient
N
Speeded up missions
EL
Star Configuration,
Multi‐star Configuration .
In Star Configuration, UAV is directly
connected to the ground station.
In Multi‐star Configuration, UAVs
High latency.
PT
form multiple star topology. One
node from each group connects to
the ground station.
EL
Flat Mesh Network,
Hierarchical Mesh
Network.
Flexible
Reliable
Nodes are
PT
interconnected
N
More secure Flat Mesh Hierarchical Mesh
Configuration Configuration
EL
Point‐to‐point Multi‐point to multi‐point
Central control point present Infrastructure based may have a control center, Ad hoc has no central
control center
Infrastructure based Infrastructure based or Ad hoc
Not self configuring
Single hop from node to central
point
Devices cannot move freely
PT Self configuring
Multi‐hop communication
EL
ensures longer range, clearer line of sight
propagation and environment‐resilient
communication.
UAVs may be in same plane or organized at
varying altitudes.
PT
Besides self‐control, each UAV must be
aware of the other flying nodes of the
FANET to avoid collision.
Popular for disaster‐time and post‐disaster
N
emergency network establishment.
Features:
EL
FANET Inter‐plane communication
FANET Intra‐plane communication
FANET‐ Ground Station communication
PT
FANET‐ Ground Sensor communication
FANET‐VANET communication
N
Introduction to Internet of Things 11
Ad-Hoc FANETs
EL
Heterogeneous radio interfaces can be
considered in A2A links, such as XBee‐PRO
(IEEE 802.15.4) and Wi‐Fi (IEEE 802.11).
Ground networks may be stationary WSNs or
PT
VANETS or Control stations.
UAV‐WSN link‐up may be used for
collaborative sensing as well as data‐muling.
UAV‐VANETS link‐up may be used for visual
N
guidance, data‐muling and coverage
enhancement.
EL
Sending back the sensor data.
Receiving the control commands.
Cooperative trajectory planning.
Dynamic task assignments.
EL
sub‐areas.
Sub‐areas collectively cover the entire
communication area.
Size of sub‐area to be controlled and adjusted
PT
dynamically.
Adjustments based on UAV‐interconnections and
derived metrics.
The derived metrics are optimized for several
N
iterations till optimum state is achieved.
Source: F. Luo et al., "A Distributed Gateway Selection Algorithm for UAV Networks," in IEEE Transactions on Emerging Topics in Computing, vol. 3, no. 1, pp. 22‐33, March
2015.
EL
most stable node in the sub‐area.
Consecutively, the partition parameters are
optimized according to topology.
Each UAV acquires the information of all UAVs
within its 2 hops. PT
N
Source: F. Luo et al., "A Distributed Gateway Selection Algorithm for UAV Networks," in IEEE Transactions on Emerging Topics in Computing, vol. 3, no. 1, pp. 22‐33, March
2015.
EL
gateway.
The gateways from each layer communicate to
forward information between layers, as well
as from ground control.
PT
Will increase the delay between ground
control and higher layers.
Not suitable for time‐critical relaying tasks.
N
Introduction to Internet of Things 16
FANETs & VANETs
EL
PT
N
Source: Y. Zhou, N. Cheng, N. Lu and X. S. Shen, "Multi‐UAV‐Aided Networks: Aerial‐Ground Cooperative Vehicular Networking Architecture," in IEEE Vehicular Technology
Magazine, vol. 10, no. 4, pp. 36‐44, Dec. 2015.
EL
PT
N
Source: Y. Zhou, N. Cheng, N. Lu and X. S. Shen, "Multi‐UAV‐Aided Networks: Aerial‐Ground Cooperative Vehicular Networking Architecture," in IEEE Vehicular Technology
Magazine, vol. 10, no. 4, pp. 36‐44, Dec. 2015.
EL
threshold experience congestion resulting
in communication delay.
Control station instructs UAVs to change
centers of trajectory.
PT
Command given based on traffic at “busy”
communication link.
To provide enhanced coverage, UAVs may
be commanded to change radius of their
N
trajectories.
Source: Fadlullah, Zubair Md, et al. "A dynamic trajectory control algorithm for improving the communication throughput and delay in UAV‐aided networks."
IEEE Network 30.1 (2016): 100‐105.
EL
PT
N
Source: Fadlullah, Zubair Md, et al. "A dynamic trajectory control algorithm for improving the communication throughput and delay in UAV‐aided networks."
IEEE Network 30.1 (2016): 100‐105.
EL
and communication facilities.
Free of any human intervention.
Similar to industrial supervisory control and data acquisition
PT
systems (SCADA).
SCADA is designed for isolated systems using proprietary
solutions, whereas M2M is designed for cross‐platform
N
integration.
EL
Network
Information
Extraction
PT Processing
Actuation
N
Introduction to Internet of Things 4
M2M Applications
Environmental monitoring
Civil protection and public safety
EL
Supply Chain Management (SCM)
Energy & utility distribution industry (smart grid)
Intelligent Transport Systems (ITSs)
Healthcare
PT
Automation of building
Military applications
Agriculture
N
Home networks
EL
Low cost.
Energy efficient.
Small traffic per machine/device.
PT
Large quantity of collective data.
M2M communication free from human intervention.
Human intervention required for operational stability and
N
sustainability.
Source: Kim, Jaewoo, et al. "M2M Service Platforms: Survey, Issues, and Enabling Technologies." IEEE Communications Surveys and Tutorials
16.1 (2014): 61‐76.
EL
M2M
M2M
M2M
Low Mid High
PT
End End End
N
Source: Kim, Jaewoo, et al. "M2M Service Platforms: Survey, Issues, and Enabling Technologies." IEEE Communications Surveys and Tutorials
16.1 (2014): 61‐76.
EL
Deployment has high density in order to increase network
lifetime and survivability.
PT
Resource constrained, and no IP support.
Basic functionalities such as, data aggregation, auto
configuration, and power saving.
Generally used for environment monitoring applications.
N
Source: Kim, Jaewoo, et al. "M2M Service Platforms: Survey, Issues, and Enabling Technologies." IEEE Communications Surveys and Tutorials
16.1 (2014): 61‐76.
EL
Nodes may have mobility.
Fewer constraints with respect to complexity and energy efficiency.
Additional functionalities such as localization, Quality of Service
intelligence. PT
(QoS) support, TCP/IP support, power control or traffic control, and
EL
Able to handle multimedia data (video) with QoS
requirements.
Mobility is essential.
Example: smartphones.
PT
Generally applied to ITS and military or bio/medical
applications.
N
Source: Kim, Jaewoo, et al. "M2M Service Platforms: Survey, Issues, and Enabling Technologies." IEEE Communications Surveys and Tutorials
16.1 (2014): 61‐76.
EL
Internet Service Providers (ISPs)
Platform Providers
PT
Service Providers
Service Users
N
Source: Kim, Jaewoo, et al. "M2M Service Platforms: Survey, Issues, and Enabling Technologies." IEEE Communications Surveys and Tutorials
16.1 (2014): 61‐76.
EL
PT
N
Source: Kim, Jaewoo, et al. "M2M Service Platforms: Survey, Issues, and Enabling Technologies." IEEE Communications Surveys and Tutorials
16.1 (2014): 61‐76.
EL
anywhere and at any time.
Registered devices create a database of objects from which
managers, users and services can easily access information.
Manages device profiles, such as location, device type, address, and
description.
PT
Provides authentication and authorization key management
functionalities.
Monitors the status of devices and M2M area networks, and
N
controls them based on their status.
EL
User registration
Modification
Charging
Inquiry.
PT
Interoperates with the Device‐platform, and manages user access
restrictions to devices, object networks, or services.
Service providers and device managers have administrative privileges on
their devices or networks.
Administrators can manage the devices through device monitoring and
N
control.
EL
sets.
Heterogeneous data merging from various devices used for
creating new services.
PT
Collects control processing log data for the management of
the devices by working with the Device‐platform.
Connection management with the appropriate network is
N
provided for seamless services.
EL
Apps and links redirect to service providers.
Services actually provided through this platform to M2M devices.
Provides App management for smart device apps.
PT
App management manages app registration by developers and
provides a mapping relationship between apps and devices.
Mapping function provides an app list for appropriate devices.
N
Introduction to Internet of Things 17
Non-IP based M2M Network
EL
PT
N
Introduction to Internet of Things 18
IP-based M2M Network
EL
PT
N
Introduction to Internet of Things 19
M2M Area Network Management Features
Fault tolerant
Scalable
EL
Low cost, low complexity
Energy efficient
Dynamic configuration capabilities
Minimized management traffic
Application dependence:
Data‐centric application,
Emergency application,
PT
N
Real‐time application
Source: Kim, Jaewoo, et al. "M2M Service Platforms: Survey, Issues, and Enabling Technologies." IEEE Communications Surveys and Tutorials
16.1 (2014): 61‐76.
PT
Dr. Sudip Misra
Associate Professor
N
Department of Computer Science and Engineering
IIT KHARAGPUR
Email: smisra@sit.iitkgp.ernet.in
Website: http://www.cse.iitkgp.ac.in/~smisra/
EL
Global Heterogeneity:
Heterogeneous IoT devices and their subnets
PT
Unknown IoT Device Configuration:
The different configuration modes for IoT devices which come from unknown
owners
Semantic Conflicts: N
Different processing logics applied to same IoT networked devices or applications.
Source: G. Xiaoand, J. Guo, Li Da Xu, and Z. Gong, "User Interoperability With Heterogeneous IoT Devices Through Transformation,” IEEE Trans. Indust. Informatics, vol. 10,
no. 2 pp. 1486-1496, May 2014.
EL
other products or systems, present or future, in either
implementation or access, without any restrictions.
PT
Communicate meaningfully
Exchange data or services
N
Source: "Definition of Interoperability". dedicated website for a Definition of Interoperability at interoperability-definition.info. Copyright AFUL under CC BY-SA.
EL
share their information
Any device can communicate with other devices anytime from
PT
anywhere
Machine to Machine communication(M2M), Device to Device
N
Communication (D2D), Device to Machine Communication (D2M)
Seamless device integration with IoT network
EL
802.15.4), Bluetooth (IEEE 802.15.1), GPRS, 6LowPAN, and Wi-Fi (IEEE
802.11)
PT
Different wired communication protocols like Ethernet (IEEE 802.3) and
Higher Layer LAN Protocols (IEEE 802.1)
Different programming languages used in computing systems and
N
websites such as JavaScript, JAVA, C, C++, Visual Basic, PHP, and Python
Different hardware platforms such as Crossbow, NI, etc.
EL
mostly vendor specific OS
As an example for personal computer: Windows, Mac, Unix, and Ubuntu
Different databases: DB2, MySQL, Oracle, PostgreSQL, SQLite, SQL
PT
Server, and Sybase
Different data representations
N
Different control models
Syntactic or semantic interpretations
User Interoperability
Interoperability problem between a user and a device
EL
Device Interoperability
Interoperability problem between two different devices
PT
N
Introduction to Internet of Things 7
Example of Device and User Interoperability
Using IoT, both A and B provide a real-time
security service
A is placed at Delhi, India, while B is placed
EL
at Tokyo, Japan
A, B, U use Hindi, Japanese, and English
language, respectively
PT
User U wants real-time service of CCTV
camera from the device A and B
N
Source: G. Xiaoand, J. Guo, Li Da Xu, and Z. Gong, "User Interoperability With Heterogeneous IoT Devices Through Transformation,” IEEE Trans. Indust. Informatics, vol. 10,
no. 2 pp. 1486-1496, May 2014.
EL
syntactic and semantic notions
Therefore, it is difficult to find CCTV device
User U can’t understand the service
PT
provided by A and B
Similarly, A and B do not mutually
understand each other
N
G. Xiaoand, J. Guo, Li Da Xu, and Z. Gong, "User Interoperability With Heterogeneous IoT Devices Through Transformation,” IEEE Trans. Indust. Informatics, vol. 10, no. 2 pp.
1486-1496, May 2014.
EL
Syntactic interoperability for device interaction
PT
Semantic interoperability for device interaction
N
Introduction to Internet of Things 10
Device identification and categorization for
discovery
There are different solutions for generating unique address
Electronic Product Codes (EPC)
EL
Universal Product Code (UPC)
PT
Uniform Resource Identifier (URI)
IP Addresses
IPv6
N
Source: G. Xiaoand, J. Guo, Li Da Xu, and Z. Gong, "User Interoperability With Heterogeneous IoT Devices Through Transformation,” IEEE Trans. Indust. Informatics, vol. 10,
no. 2 pp. 1486-1496, May 2014.
EL
(UNSPSC) *
an open, global, multi-sector standard for efficient, accurate, flexible
PT
classification of products and services.
eCl@ss **
N
The standard is for classification and clear description of cross-industry
products
Reference: * http://www.unspsc.org/, **http://www.eclass.eu/
EL
The message format from a device to a user is understandable
for the user’s computer
PT
On the other hand, the message format from the user to the
device is executable by the device
N
Introduction to Internet of Things 13
Syntactic Interoperability for Device Interaction
(Contd. )
Some popular approaches are
Service-oriented Computing (SOC)-based architecture
EL
Web services
RESTful web services
PT
Open standard protocols such as IEEE 802.15.4, IEEE 802.15.1, and
WirelessHART*
N
Closed protocols such as Z-Wave*
*But these standards are incompatible with each other
EL
Dynamically map physical devices with different domains
Based on the map, the devices can be discovered and controlled,
PT
remotely
Cross-context syntactic interoperability
N
Collaborative concept exchange
Using XML syntax
EL
The device can understand the meaning of user’s instruction
that is sent from the user to the device.
PT
Similarly, the user can understand the meaning of device’s
response sent from the device
N
Introduction to Internet of Things 16
Semantic Interoperability for Device Interaction
(Contd. )
Some popular approaches
Ontology
EL
Device ontology
Physical domain ontology
PT
Estimation ontology
Ontology-based solution is limited to the defined domain
/context N
Source: G. Xiaoand, J. Guo, Li Da Xu, and Z. Gong, "User Interoperability With Heterogeneous IoT Devices Through Transformation,” IEEE Trans. Indust. Informatics, vol. 10,
no. 2 pp. 1486-1496, May 2014.
EL
cosign
The representation of a collaborative sign is defined as follows:
PT
cosign of a object = (A, B, C, D ), where A is a cosign internal identifier, B is
a natural language, C is the context of A, and D is a definition of the object
As an example of CCTV, cosign = (1234, English, CCTV, “Camera Type:
N
Bullet, Communication: Network/IP, Horizontal Resolution: 2048 TVL”)
This solution approach is applicable for different domains/contexts
EL
Solves seamless interoperability problems caused by the
heterogeneity of several kinds of home network middleware
PT
UMB creates virtual maps among the physical devices of all
middleware home networks, such as HAVI, Jini, LonWorks, and UPnP
N
Creates a compatibility among these middleware home networks
source: K.-D. Moon, Y.-H. Lee, C.-E. Lee, and Y.-S. Son, “Design of a universal middleware bridge for device interoperability in heterogeneous home network middleware,” IEEE
Trans. Consum. Electron., vol. 51, no. 1, pp. 314–318, Feb. 2005.
UMB consists
UMB Core (UMB-C)
EL
UMB Adaptor (UMB-A)
PT
N Fig 1: The Architecture of Universal Middleware Bridge
Image source: K.-D. Moon, Y.-H. Lee, C.-E. Lee, and Y.-S. Son, “Design of a universal middleware bridge for device interoperability in heterogeneous home network
middleware,” IEEE Trans. Consum. Electron., vol. 51, no. 1, pp. 314–318, Feb. 2005.
EL
virtually abstracted one, as described by
Universal Device Template(UDT)
UDT consists of a Global Device ID,
PT
Global Function ID, Global Action ID,
Global Event ID, and Global Parameters
UMB Adaptors translate the local
middleware’s message into global
metadata’s message
N Fig 2: The Structure of UMB-A
Source: K.-D. Moon, Y.-H. Lee, C.-E. Lee, and Y.-S. Son, “Design of a universal middleware bridge for device interoperability in heterogeneous home network middleware,” IEEE
Trans. Consum. Electron., vol. 51, no. 1, pp. 314–318, Feb. 2005.
UMB Core
The major role of the UMB Core is routing
EL
the universal metadata message to the
destination or any other UMB Adaptors
PT
by the Middleware Routing Table (MRT)
Source: K.-D. Moon, Y.-H. Lee, C.-E. Lee, and Y.-S. Son, “Design of a universal middleware bridge for device interoperability in heterogeneous home network middleware,” IEEE
Trans. Consum. Electron., vol. 51, no. 1, pp. 314–318, Feb. 2005.
EL
PT
N Fig 4: Flow when a new device is plugged in
Source: K.-D. Moon, Y.-H. Lee, C.-E. Lee, and Y.-S. Son, “Design of a universal middleware bridge for device interoperability in heterogeneous home network middleware,” IEEE
Trans. Consum. Electron., vol. 51, no. 1, pp. 314–318, Feb. 2005.
EL
PT
N
Fig 5: Flow when a device is controlled and monitored
Source: K.-D. Moon, Y.-H. Lee, C.-E. Lee, and Y.-S. Son, “Design of a universal middleware bridge for device interoperability in heterogeneous home network middleware,” IEEE
Trans. Consum. Electron., vol. 51, no. 1, pp. 314–318, Feb. 2005.
PT
Dr. Sudip Misra
Associate Professor
N
Department of Computer Science and Engineering
IIT KHARAGPUR
Email: smisra@sit.iitkgp.ernet.in
Website: http://cse.iitkgp.ac.in/~smisra/
EL
Accepts analog and digital signals as input and gives desired
output
PT
No extra hardware required to load a program into the
controller board
N
Introduction to Internet of Things 2
Types of Arduino Board
EL
Arduino boards based on ATMEGA32u4 microcontroller
PT
Arduino boards based on ATMEGA2560 microcontroller
N
Arduino boards based on AT91SAM3X8E microcontroller
Feature Value
Operating Voltage 5V
EL
Clock Speed 16MHz
Digital I/O 14
PT
Analog Input 6
PWM 6
UART 1
Interface
N
USB via ATMega16U2
EL
Voltage Regulator
LED Power Indicator
PT
Tx-Rx LED Indicator
Output power, Ground
Analog Input Pins
Digital I/O Pins
N
Image source: https://upload.wikimedia.org/wikipedia/commons/9/9d/UnoConnections.jpg
EL
Based on variations of the C and C++ programming
language
PT
It can be downloaded from Arduino’s official website and
installed into PC
N
Introduction to Internet of Things 6
Set Up
EL
Set the board type and the port for the board
PT
TOOLS -> BOARD -> select your board
TOOLS -> PORT -> select your port
N
Introduction to Internet of Things 7
Set up (contd..)
EL
PT
N
Introduction to Internet of Things 8
Arduino IDE Overview
EL
PT
N
Introduction to Internet of Things 9
Arduino IDE Overview (contd..)
To create a new sketch
File -> New
EL
To open an existing sketch
File -> open ->
PT
There are some basic ready-to-use
sketches available in the EXAMPLES
section N
File -> Examples -> select any program
EL
Upload: Uploads the final code to
the controller board
PT
New: Creates a new blank sketch
with basic structure
N
Open: Opens an existing sketch
Save: Saves the current sketch
EL
All the data printed to the console
are displayed here
PT
N
Introduction to Internet of Things 12
Sketch Structure
EL
Loop()
The function setup() is the point where
the code starts, just like the main()
PT
function in C and C++
I/O Variables, pin modes are initialized in
the Setup() function
N
Loop() function, as the name suggests,
iterates the specified task in the program
EL
Void Long
Int Char
Boolean Unsigned char
PT
Byte Unsigned int
Word Unsigned long
Float Double
Array
String-object
N
String-char array
Short
EL
Void setup ()
PT
{
pinMode (pin , mode);
}
N
Pin- pin number on the Arduino board
Mode- INPUT/OUTPUT
analogRead() : Reads from the analog input pin i.e., voltage applied across the
EL
pin
PT
isupper(), isspace() return 1(true) or 0(false)
N
Delay() function is one of the most common time manipulation function used
to provide a delay of specified time. It accepts integer value (time in
miliseconds)
EL
connecting wires, Arduino IDE
Connect the LED to the Arduino using the
Bread board and the connecting wires
PT
Connect the Arduino board to the PC using
the USB connector
N
Select the board type and port
Write the sketch in the editor, verify and
upload.
EL
terminal to the ground pin (GND) of
Arduino Board
PT
N
Introduction to Internet of Things 18
Example- Blink (contd..) image setup
void setup() {
pinMode(12, OUTPUT); // set the pin mode
}
EL
void loop() {
digitalWrite(12, HIGH); // Turn on the LED
PT
delay(1000);
digitalWrite(12, LOW); //Turn of the LED
delay(1000);
}
N
Introduction to Internet of Things 19
Example- Blink (contd..)
Set the pin mode as output which is
connected to the led, pin 12 in this
case.
EL
Use digitalWrite() function to set the
output as HIGH and LOW
PT
Delay() function is used to specify
N the delay between HIGH-LOW
transition of the output
EL
Set the port and board type
PT
RX led in the board starts flashing as the
code is uploaded.
N
Introduction to Internet of Things 21
EL
PT
N
Introduction to Internet of Things 22
EL
Introduction to Arduino Programming – Part II
PT
Dr. Sudip Misra
Associate Professor
N
Department of Computer Science and Engineering
IIT KHARAGPUR
Email: smisra@sit.iitkgp.ernet.in
Website: http://cse.iitkgp.ac.in/~smisra/
EL
Loops Example Program
PT
Arrays
String
Math Library N
Introduction to Internet of Things 2
Operators
Arithmetic Operators: =, +, -, *, /, %
Comparison Operator: ==, !=, <, >, <=, >=
EL
Boolean Operator: &&, ||, !
Bitwise Operator: &, |, ^, ~, <<, >>,
PT
Compound Operator: ++, --, +=, -=, *=, /=, %=, |=, &=
N
Introduction to Internet of Things 3
Control Statement
If…….Elseif…..Else
If statement if (condition1){
if(condition){ Statements if the
Statements if the condition1 is true;
condition is true ; }
EL
} else if (condition2){
If…Else statement Statements if the
if(condition ){ condition1 is false
PT
Statements if the and condition2 is true;
condition is true; }
} else{
else{
Statements if the
condition is false;
}
N }
Statements if both the
conditions are false;
EL
case opt2: statement_2;break;
case opt3: statement_3;break;
.
PT
.
.
case default: statement_default; break;
}
Conditional Operator.
N
Val=(condition)?(Statement1): (Statement2)
EL
While loop
while(condition){
PT
Statement till the condition is true;
}
Do… While loop
do{
N
Statement till the condition is true;
}while(condition);
Infinite loop: Condition of the loop is always true, the loop will never
EL
terminate
PT
N
Introduction to Internet of Things 7
Arrays
Collection of elements having homogenous datatype that are
stored in adjacent memory location.
EL
The conventional starting index is 0.
Declaration of array:
PT
<Datatype> array_name[size];
Ex: int arre[5];
N
Introduction to Internet of Things 8
Arrays (contd..)
Alternative Declaration:
int arre[]={0,1,2,3,4};
EL
int arre[5]={0,1,2};
Multi-dimentional array Declaration:
PT
<Datatype> array_name[n1] [n2][n3]….;
Ex: int arre[row][col][height];
N
Introduction to Internet of Things 9
String
Array of characters with NULL as termination is termed as a String.
Declaration using Array:
char str[]=“ABCD”;
EL
char str[4];
str[0]=‘A’;
str[0]=‘B’;
PT
str[0]=‘C’;
str[0]=0;
N
Declaration using String Object:
String str=“ABC”;
EL
str.replace(str1,str2): is str1 is the sub string of str then it will be
replaced by str2
PT
str.length(): returns the length of the string without considering null
N
Introduction to Internet of Things 11
Math Library
To apply the math functions and mathematical constants, “MATH.h” header
files is needed to be included.
EL
Functions:
cos(double radian);
PT
sin(double radian);
tan(double radian);
N
fabs(double val);
fmod(double val1, double val2);
EL
log(double val);
log10(double val);
PT
square(double val);
pow(double base, double power);
N
Introduction to Internet of Things 13
Random Number
randomSeed(int v): reset the pseudo-random number generator
with seed value v
EL
random(maxi)=gives a random number within the range [0,maxi]
random(mini,maxi)=gives a random number within the range
PT
[mini,maxi]
N
Introduction to Internet of Things 14
Interrupts
An external signal for which system blocks the current running
process to process that signal
EL
Types:
Hardware interrupt
Software interrupt
PT
digitalPinToInterrupt(pin): Change actual digital pin to the specific
interrupt number.
N
attachInterrupt(digitalPinToInterrupt(pin), ISR, mode);
ISR: a interrupt service routine have to be defined
Requirement:
Arduino Board
EL
3 different color LEDs
330 Ohm resistors
PT
Jumper wires
N
Introduction to Internet of Things 16
Example: Traffic Control System (contd..)
Connection:
Connect the positive
EL
terminals of the LEDs to
the respective digital
output pins in the board,
PT
assigned in the code.
Connect the negative
N
terminals of the LEDs to
the ground
EL
int g = 3;
int y = 4;
void setup()
PT
{
Serial.begin(9600);
pinMode(r, OUTPUT); digitalWrite(r,LOW);
}
N
pinMode(g, OUTPUT); digitalWrite(g,LOW);
pinMode(y , OUTPUT); digitalWrite(y, LOW);
EL
digitalWrite(g, HIGH);
Serial.println(“Green LED: ON, GO”);
// delay of 5 seconds
PT
delay(5000);
digitalWrite(g, LOW);
N
digitalWrite(y, HIGH);
Serial.println(“Green LED: OFF ; Yellow LED: ON, WAIT”);
delay(5000);
EL
digitalWrite(r, LOW);
Serial.println(“All OFF");
}
PT
void loop()
{
}
traffic ();
delay (10000); N
Introduction to Internet of Things 20
Example: Traffic Control System (contd..)
Output:
Initially, all the LEDs are turned
off
EL
The LEDs are turned on one at
a time with a delay of 5
PT
seconds
The message is displayed
accordingly
N
Figure showing all the LEDs
turned on
EL
PT
N
Introduction to Internet of Things 22
EL
PT
N
Introduction to Internet of Things 23
EL
Integration of Sensors and Actuators with Arduino-
Part I
PT
Dr. Sudip Misra
Associate Professor
N
Department of Computer Science and Engineering
IIT KHARAGPUR
Email: smisra@sit.iitkgp.ernet.in
Website: http://cse.iitkgp.ac.in/~smisra/
Electronic elements
Converts physical quantity/ measurements into electrical
EL
signals
Can be analog or digital
PT
N
Introduction to Internet of Things 2
Types of Sensors
EL
Humidity
PT
Compass
Light
Sound
Accelerometer
N
Introduction to Internet of Things 3
Sensor Interface with Arduino
EL
PIN 1, 2, 3, 4 (from left to right)
PIN 1- 3.3V-5V Power supply
PT
PIN 2- Data
PIN 3- Null
N
PIN 4- Ground
EL
Provides function to read the temperature and humidity
values from the data pin
PT
dht.readHumidity()
dht.readTemperature()
N
Introduction to Internet of Things 5
Connection
Connect pin 1 of the DHT
to the 3.3 V supply pin in
the board
EL
Data pin (pin 2) can be
connected to any digital
PT
pin, here 12
Connect pin 4 to the
N
ground (GND) pin of the
board
EL
Go to Sketch -> Include Library ->
Manage Library
PT
N
Introduction to Internet of Things 7
Sketch: DHT_SENSOR (contd..)
EL
library” and install it
PT
N
Introduction to Internet of Things 8
Sketch: DHT_SENSOR (contd..)
#include <DHT.h>; void loop()
DHT dht(8, DHT22); //Initialize DHT sensor {
//Read data from the sensor and store it to variables
float humidity; //Stores humidity value humidity and temperature
EL
float temperature; //Stores temperature humidity = dht.readHumidity();
value temperature= dht.readTemperature();
void setup() //Print temperature and humidity values to serial
PT
{ monitor
Serial.begin(9600); Serial.print("Humidity: ");
Serial.print(humidity);
}
dht.begin();
N Serial.print("%, Temperature: ");
Serial.print(temperature);
Serial.println(" Celsius");
delay(2000); //Delay of 2 seconds
}
Introduction to Internet of Things 9
Sketch: DHT_SENSOR (contd..)
EL
PT
N
Introduction to Internet of Things 10
Sketch: DHT_SENSOR (contd..)
EL
Set the port and board type
PT
N
Introduction to Internet of Things 11
Output
EL
function
PT
N
Introduction to Internet of Things 12
EL
PT
N
Introduction to Internet of Things 13
EL
Integration of Sensors and Actuators with Arduino-
Part II
PT
Dr. Sudip Misra
Associate Professor
N
Department of Computer Science and Engineering
IIT KHARAGPUR
Email: smisra@sit.iitkgp.ernet.in
Website: http://cse.iitkgp.ac.in/~smisra/
Introduction to ACTUATOR
Servo Motor
EL
Servo motor interfaced with Arduino
PT
Hardware interface
Sketch
N
Introduction to Internet of Things 2
Actuators
Mechanical/Electro-mechanical device
Converts energy into motion
EL
Mainly used to provide controlled motion to other
components
PT
N
Introduction to Internet of Things 3
Basic Working Principle
EL
motion.
PT
N
Introduction to Internet of Things 4
Types of Motor Actuators
Servo motor
Stepper motor
EL
Hydraulic motor
PT
Solenoid
Relay
AC motor N
Introduction to Internet of Things 5
Servo Motor
High precision motor
Provides rotary motion 0
EL
to 180 degree
3 wires in the Servo motor
PT
Black or the darkest one is
Ground
N
Red is for power supply
Yellow for signal pin
EL
Create an instance of servo to use it in the
sketch
PT
Servo myservo;
N
Introduction to Internet of Things 7
Sketch: SERVO_ACTUATOR
void loop(){
#include <Servo.h> //Servo moves to 0 degrees
//Including the servo library for the program ServoDemo.write(0);
EL
int servoPin = 12; delay(1000);
PT
ServoDemo.write(90);
void setup() { delay(1000);
// The servo pin must be attached to the servo
before it can be used
}
ServoDemo.attach(servoPin); N // Servo moves to 180 degrees
ServoDemo.write(180);
delay(1000);
}
EL
to the pin before being used in
the code
PT
Write() function takes the
degree value and rotates the
motor accordinglyN
Introduction to Internet of Things 9
Connection
EL
Arduino board.
Connect the power supply wire
PT
to the 5V pin of the board.
Connect the signal wire to any
N
digital output pin (we have used
pin 8).
EL
Set the port and board type
PT
N
Introduction to Internet of Things 11
Output
EL
each.
PT
N
Introduction to Internet of Things 12
Do more with the Servo library
EL
Knob()
Sweep()
write()
PT
writeMicroseconds()
read()
attached()
detach() N
Source: “Servo Library”, Arduino Home (Online), Link: www.arduino.cc/en/Reference/Servo
PT
Dr. Sudip Misra
Associate Professor
N
Department of Computer Science and Engineering
IIT KHARAGPUR
Email: smisra@sit.iitkgp.ernet.in
Website: http://cse.iitkgp.ac.in/~smisra/
EL
Its installation comes with integrated development environment
for programming.
PT
It supports interfacing with wide ranging hardware platforms.
With open-source nature, it forms a strong backbone to build large
applications.
N
Introduction to Internet of Things 2
Python IDE
EL
It is available for installation into PC with Windows, Linux and
Mac.
PT
Examples: Spyder, PyCharm, etc.
N
Introduction to Internet of Things 3
Starting with Python
Simple printing statement at the python interpreter prompt,
>>> print “Hi, Welcome to python!”
EL
Output: Hi, Welcome to python!
To indicate different blocks of code, it follows rigid indentation.
PT
if True:
print “Correct"
else: N
print “Error"
EL
String
PT
x = ‘This is Python’
print x >>This is Python
print x[0]
print x[2:4]
N >>T
>>is
List
x = [10, 10.2, 'python']
EL
Tuple
PT
Dictionary
N
d = {1:‘item','k':2}
EL
x = [1,2,3,4]
elif (cond.):
for i in x:
PT
statement 1
statement 1
statement 2 statement 2
else:
statement 1 N
statement 2
EL
if s == ‘n': if s == ‘y':
break continue
PT
print (s) print (s)
print “End” print “End”
N
Introduction to Internet of Things 8
Functions in Python
Defining a function
Without return value
def funct_name(arg1, arg2, arg3): # Defining the function
EL
statement 1
statement 2
PT
With return value
def funct_name(arg1, arg2, arg3): # Defining the function
Nstatement 1
statement 2
return x # Returning the value
EL
print (str + “!”)
PT
example (“Hi”) # Calling the function
Output:: Hi!
N
Introduction to Internet of Things 10
Functions in Python (contd..)
Example showing function returning multiple values
def greater(x, y):
if x > y:
EL
return x, y
else:
PT
return y, x
Output:: (100,10)
N
Introduction to Internet of Things 11
Functions as Objects
Functions can also be assigned and reassigned to the variables.
Example:
def add (a,b)
EL
return a+b
PT
print (add(4,6))
c = add(4,6)
print c N
Output:: 10 10
EL
accessed inside as well as outside the function.
Local variables:
PT
These are the ones that are declared inside a function.
N
Introduction to Internet of Things 13
Example showing Global Variable
g_var = 10
EL
def example():
l_var = 100
print(g_var)
PT
example() # calling the function
N
Output:: 10
def example():
EL
var = 100
print(var)
PT
example() # calling the function
print(var)
Output:: 100
N
10
EL
Syntax:
import module_name #At the top of the code
PT
using module_name.var #To access functions and values
N with ‘var’ in the module
EL
for i in range(1,10):
val = random.randint(1,10)
PT
print (val)
N
Output:: varies with each execution
Example:
EL
from math import pi
PT
print (pi)
Output:: 3.14159 N
Introduction to Internet of Things 18
Exception Handling in Python
An error that is generated during execution of a program, is
termed as exception.
Syntax:
EL
try:
statements
PT
except _Exception_:
statements
else:
statements
N
Introduction to Internet of Things 19
Exception Handling in Python (contd..)
Example:
while True:
try:
EL
n = input ("Please enter an integer: ")
n = int (n)
PT
break
except ValueError:
N
print "No valid integer! "
print “It is an integer!"
EL
for i in range(2,num):
if (num % i) == 0:
print (num,"is not a prime number")
PT
print (i,“is a factor of”,num)
break
else:
print(num,"is a prime number")
prime (x)
else: N
print(num,"is not a prime number")
PT
Dr. Sudip Misra
Associate Professor
N
Department of Computer Science and Engineering
IIT KHARAGPUR
Email: smisra@sit.iitkgp.ernet.in
Website: http://cse.iitkgp.ac.in/~smisra/
EL
Three basic steps
PT
Open a file
Read/Write
Close the file
N
Introduction to Internet of Things 2
File Read Write Operations (contd..)
Opening a File:
Open() function is used to open a file, returns a file object
open(file_name, mode)
EL
Mode: Four basic modes to open a file
PT
r: read mode
w: write mode
a: append mode N
r+: both read and write mode
EL
file=open(‘data.txt’, ‘r’)
file.read()
PT
Write to a file:
Write(): Writes to a file
N
file=open(‘data.txt’, ‘w’)
file.write(‘writing to the file’)
EL
Using WITH to open a file:
Good practice to handle exception while file read/write operation
PT
Ensures the file is closed after the operation is completed, even if an exception is
encountered
with open(“data.txt","w") as file:
N
file.write(“writing to the text file”)
file.close()
EL
file.close()
PT
with open("PythonProgram.txt","r") as file:
f=file.read()
print('Reading from the file\n')
print (f)
file.close() N
Introduction to Internet of Things 6
File Read Write Operations (contd..)
Comma Separated Values Files
CSV module supported for CSV files
EL
Read: Write:
PT
reader = csv.reader(csv_file)
print("Reading from the CSV File\n") with open(file, "w") as csv_file:
for row in reader: writer = csv.writer(csv_file, delimiter=',')
print(" ".join(row)) print("Writing CSV")
csv_file.close()
N for line in data:
writer.writerow(line)
csv_file.close()
EL
PT
N
Introduction to Internet of Things 8
Image Read/Write Operations
EL
sudo pip install pillow
PT
PIL is supported till python version 2.7. Pillow supports the 3x version of
python.
N
Introduction to Internet of Things 9
Image Read/Write Operations
Reading Image in Python:
PIL: Python Image Library is used to work with image files
EL
from PIL import Image
PT
Open an image file
image=Image.open(image_name)
EL
Rotate(): Rotates the image to the specified degrees, counter clockwise
image.rotate(90)
PT
Format: Gives the format of the image
Size: Gives a tuple with 2 values as width and height of the image, in pixels
N
Mode: Gives the band of the image, ‘L’ for grey scale, ‘RGB’ for true colour image
EL
mode
conv_image=image.convert(‘L’)
PT
Conversion between modes other that ‘L’ and ‘RGB’ needs
conversion into any of these 2 intermediate mode
N
Introduction to Internet of Things 12
Output
Converting a sample image to Grey Scale
EL
PT
N
Introduction to Internet of Things 13
Output
EL
PT
N
Introduction to Internet of Things 14
Networking in Python
Python provides network services for client server model.
EL
Socket support in the operating system allows to implement clients
and servers for both connection-oriented and connectionless
PT
protocols.
EL
socket_family − AF_UNIX or AF_INET
PT
socket_type − SOCK_STREAM or SOCK_DGRAM
EL
import sys
PT
sock = socket.socket(socket.AF_INET, socket.SOCK_STREAM)
EL
connection, client_address = sock.accept()
#Receive command
PT
data = connection.recv(1024)
print(data)
sock.close()
N
Introduction to Internet of Things 18
Example - simple client
import socket
import sys
EL
client_socket = socket.socket(socket.AF_INET, socket.SOCK_STREAM)
PT
client_socket.connect(("10.14.88.82", 2017))
print>>sys.stderr,'Connection Established'
#Send command N
client_socket.send('Message to the server')
print('Data sent successfully')
EL
PT
N
Introduction to Internet of Things 20
Output
EL
PT
N
Introduction to Internet of Things 21
EL
PT
N
Introduction to Internet of Things 22
EL
Introduction to Raspberry Pi – Part I
PT
Dr. Sudip Misra
Associate Professor
N
Department of Computer Science and Engineering
IIT KHARAGPUR
Email: smisra@sit.iitkgp.ernet.in
Website: http://cse.iitkgp.ac.in/~smisra/
1
Introduction to Internet of Things
What is Raspberry Pi?
EL
• Single-board computer.
Low cost.
PT
•
• Easy to access.
N
2
Introduction to Internet of Things
Specifications
Key features Raspberry pi 3 model B Raspberry pi 2 Raspberry Pi zero
model B
RAM 1GB SDRAM 1GB SDRAM 512 MB SDRAM
EL
CPU Quad cortex A53@1.2GHz Quad cortex ARM 11@ 1GHz
A53@900MHz
PT
GPU 400 MHz video core IV 250 MHz video core IV 250 MHz video core IV
Ethernet 10/100 10/100 None
Wireless 802.11/Bluetooth 4.0 None None
Video output
GPIO 40
N
HDMI/Composite HDMI/Composite
40
HDMI/Composite
40
3
Introduction to Internet of Things
Basic Architecture
RAM
EL
I/O CPU/GPU USB HUB
PT
N ETHERNET USB
4
Introduction to Internet of Things
Raspberry Pi
EL
PT
N
Introduction to Internet of Things 5
Start up raspberry pi
EL
PT
N
Introduction to Internet of Things
Raspberry Pi GPIO
EL
• Output: turn a GPIO pin high or low.
PT
• Input: detect a GPIO pin high or low.
N
Introduction to Internet of Things 7
Raspberry Pi pin configuration
EL
PT
N
Source: Raspberry Pi PCB Pin Overview, Wikimedia Commons (Online) Source: Raspberry Pi GPIO, Wikimedia Commons (Online)
EL
• Key board.
• Mouse.
5volt power adapter for raspberry pi.
PT
•
• LAN cable .
• Min- 2GB micro sd card
N
9
Introduction to Internet of Things
Basic Set up for Raspberry Pi
EL
PT
N
Introduction to Internet of Things10
Operating System
Official Supported OS :
• Raspbian
EL
• NOOBS
PT
• UBUNTU mate
• Snappy Ubuntu core
• Windows 10 core
•
•
Pinet
Risc OS
Download Raspbian:
• Download latest Raspbian image from raspberry pi official site:
EL
https://www.raspberrypi.org/downloads/
PT
• Unzip the file and end up with an .img file.
N
12
Introduction to Internet of Things
Raspberry Pi OS Setup
Write Raspbian in SD card :
• Install “Win32 Disk Imager” software in windows machine .
• Run Win32 Disk Imager
EL
• Plug SD card into your PC
• Select the “Device”
PT
• Browse the “Image File”(Raspbian image)
• Write
N
Introduction to Internet of Things13
Raspberry Pi OS Setup
EL
PT
N
Introduction to Internet of Things14
Basic Initial Configuration
Enable SSH
Step1 : Open command prompt and type sudo raspi-config and press enter.
EL
Step2: Navigate to SSH in the Advance option.
PT
Step3: Enable SSH
N
15
Introduction to Internet of Things
Basic Initial Configuration
EL
PT
N
Introduction to Internet of Things16
Basic Initial Configuration contd.
EL
Step 1: Open command prompt and type sudo raspi-config and press enter.
PT
Step 3: Press enter to expand it.
N
17
Introduction to Internet of Things
Basic Initial Configuration contd.
EL
PT
N
Introduction to Internet of Things18
Programming
Default installed :
• Python
EL
• C
• C++
PT
• Java
• Scratch
• Ruby
N
Note : Any language that will compile for ARMv6 can be used with raspberry pi.
Source: Programming languages for Raspberry Pi, eProseed, Lonneke Dikmans, August 07, 2015
19
Introduction to Internet of Things
Popular Applications
• Media streamer
• Home automation
EL
• Controlling BOT
• VPN
Light weight web server for IOT
PT
•
• Tablet computer
N
20
Introduction to Internet of Things
Thank You!!
EL
PT
N
21
Introduction to Internet of Things
EL
Introduction to Raspberry Pi – Part II
PT
Dr. Sudip Misra
Associate Professor
N
Department of Computer Science and Engineering
IIT KHARAGPUR
Email: smisra@sit.iitkgp.ernet.in
Website: http://cse.iitkgp.ac.in/~smisra/
EL
PT
N
Introduction to Internet of Things 2
Blinking LED
Requirement:
Raspberry pi
EL
LED
PT
100 ohm resistor
Bread board
Jumper cables N
Introduction to Internet of Things 3
Blinking LED (contd..)
Installing GPIO library:
Open terminal
EL
Enter the command “sudo apt-get install python-dev” to install python
development
Enter the command “sudo apt-get install python-rpi.gpio” to install GPIO library.
PT
N
Introduction to Internet of Things 4
Blinking LED (contd..)
Connection:
EL
Connect the negative terminal of
the LED to the ground pin of Pi
Connect the positive terminal of
PT
the LED to the output pin of Pi
N
Introduction to Internet of Things 5
Blinking LED (contd..)
Basic python coding:
EL
Open terminal enter the command
sudo nano filename.py
PT
This will open the nano editor where you can write your code
Ctrl+O : Writes the code to the file
N
Ctrl+X : Exits the editor
EL
GPIO.setmode(GPIO.BOARD) # Set the type of board for pin numbering
GPIO.setup(11, GPIO.OUT) # Set GPIO pin 11as output pin
for i in range (0,5):
PT
GPIO.output(11,True) # Turn on GPIO pin 11
time.sleep(1)
GPIO.output(11,False)
time.sleep(2)
GPIO.output(11,True)
GPIO.cleanup()
N
Introduction to Internet of Things 7
Blinking LED (contd..)
EL
PT
N
Introduction to Internet of Things 8
Blinking LED (contd..)
The LED blinks in a loop with delay
of 1 and 2 seconds.
EL
PT
N
Introduction to Internet of Things 9
EL
Capture Image using Raspberry Pi
PT
N
Introduction to Internet of Things 10
Requirement
Raspberry Pi
Raspberry Pi Camera
EL
PT
N
Introduction to Internet of Things 11
Raspberry Pi Camera
Raspberry Pi specific camera
module
EL
Dedicated CSI slot in Pi for
connection
PT
The cable slot is placed
between Ethernet port and
HDMI port N
Introduction to Internet of Things 12
Connection
Boot the Pi once the camera is connected to Pi
EL
PT
N
Introduction to Internet of Things 13
Configuring Pi for Camera
EL
Navigate to “Interfacing Options” option and press enter.
Navigate to “Camera” option.
PT
Enable the camera.
Reboot Raspberry pi.
N
Introduction to Internet of Things 14
Configuring Pi for Camera (contd..)
EL
PT
N
Introduction to Internet of Things 15
Capture Image
EL
raspistill -o image.jpg
PT
This will store the image as ‘image.jpg’
N
Introduction to Internet of Things 16
Capture Image (contd..)
EL
PT
Python Code:
Import picamera
camera = picamera.PiCamera()
camera.capture('image.jpg') N
Source: PYTHON PICAMERA, Raspberry Pi Foundation
EL
PT
N
Introduction to Internet of Things 18
EL
PT
N
Introduction to Internet of Things 19
EL
Implementation of IoT with Raspberry Pi: Part 1
PT
Dr. Sudip Misra
Associate Professor
N
Department of Computer Science and Engineering
IIT KHARAGPUR
Email: smisra@sit.iitkgp.ernet.in
Website: http://cse.iitkgp.ac.in/~smisra/
Internet Of Things
Creating an interactive environment
EL
Network of devices connected together
PT
N
Introduction to Internet of Things 2
Sensor
Electronic element
Converts physical quantity into electrical signals
EL
Can be analog or digital
PT
N
Introduction to Internet of Things 3
Actuator
Mechanical/Electro-mechanical device
Converts energy into motion
EL
Mainly used to provide controlled motion to other
components
PT
N
Introduction to Internet of Things 4
System Overview
EL
Control the actuator according to the reading from the
sensor
PT
Connect the actuator to a device
N
Introduction to Internet of Things 5
System Overview (contd..)
Requirements
DHT Sensor
EL
4.7K ohm resistor
Relay
PT
Jumper wires
Raspberry Pi
Mini fan N
Introduction to Internet of Things 6
DHT Sensor
Digital Humidity and
Temperature Sensor (DHT)
EL
PIN 1, 2, 3, 4 (from left to
right)
PIN 1- 3.3V-5V Power
PT
supply
PIN 2- Data
PIN 3- Null
N
PIN 4- Ground
Mechanical/electromechanical
switch
EL
3 output terminals (left to right)
PT
NO (normal open):
Common
N
NC (normal close)
EL
Connect pin 1 of DHT sensor to the
3.3V pin of Raspberry Pi
Connect pin 2 of DHT sensor to any
PT
input pins of Raspberry Pi, here we
have used pin 11
Connect pin 4 of DHT sensor to the
N
ground pin of the Raspberry Pi
EL
Connect the VCC pin of relay to the 5V
supply pin of Raspberry Pi
PT
Connect the GND (ground) pin of relay
to the ground pin of Raspberry Pi
N
Connect the input/signal pin of Relay to
the assigned output pin of Raspberry Pi
(Here we have used pin 7)
EL
Install the library in your Pi-
Get the clone from GIT
git clone https://github.com/adafruit/Adafruit_Python_DHT.g...
PT
Go to folder Adafruit_Python_DHT
cd Adafruit_Python_DHT
Install the library
sudo python setup.py install N
Source: ADAFRUIT DHTXX SENSORS, Lady Ada, 2012-07-29
EL
GPIO.setmode(GPIO.BOARD)
GPIO.setwarnings(False)
PT
sensor = Adafruit_DHT.AM2302 # create an instance of the sensor type
print (‘Getting data from the sensor’)
#humidity and temperature are 2 variables that store the values received from the sensor
N
humidity, temperature = Adafruit_DHT.read_retry(sensor,17)
print ('Temp={0:0.1f}*C humidity={1:0.1f}%'.format(temperature, humidity))
Code Output
EL
PT
N
Introduction to Internet of Things 13
Connection: Relay
Connect the relay pins with the Raspberry Pi as mentioned in previous slides
Set the GPIO pin connected with the relay’s input pin as output in the sketch
EL
GPIO.setup(13,GPIO.OUT)
Set the relay pin high when the temperature is greater than 30
PT
if temperature > 30:
GPIO.output(13,0) # Relay is active low
print(‘Relay is on')
sleep(5)
N
GPIO.output(13,1) # Relay is turned off after delay of 5 seconds
EL
PT
N
Introduction to Internet of Things 15
Connection: Fan
Connect the Li-po battery in series with the fan
NO terminal of the relay -> positive terminal of the
Fan.
EL
Common terminal of the relay -> Positive terminal of
the battery
PT
Negative terminal of the battery -> Negative terminal
of the fan.
Run the existing code. The fan should operate when the
N
surrounding temperature is greater than the threshold value
in the sketch
EL
PT
N
Introduction to Internet of Things 17
Result
The fan is switched on whenever
the temperature is above the
threshold value set in the code.
EL
Notice the relay indicator turned
on.
PT
N
Introduction to Internet of Things 18
EL
PT
N
Introduction to Internet of Things 19
EL
Implementation of IoT with Raspberry Pi: Part 2
PT
Dr. Sudip Misra
Associate Professor
N
Department of Computer Science and Engineering
IIT KHARAGPUR
Email: smisra@sit.iitkgp.ernet.in
Website: http://cse.iitkgp.ac.in/~smisra/
Internet Of Things
Creating an interactive environment
EL
Network of devices connected together
PT
N
Introduction to Internet of Things 2
IOT: Remote Data Logging
EL
Control the network remotely
PT
N
Introduction to Internet of Things 3
IOT: Remote Data Logging
System Overview:
A network of Temperature and humidity sensor connected with
EL
Raspberry Pi
Read data from the sensor
PT
Send it to a Server
Save the data in the server
N
Introduction to Internet of Things 4
IOT: Remote Data Logging (contd..)
Requirements
DHT Sensor
EL
4.7K ohm resistor
PT
Jumper wires
Raspberry Pi
N
Introduction to Internet of Things 5
DHT Sensor
Digital Humidity and
Temperature Sensor (DHT)
EL
PIN 1, 2, 3, 4 (from left to
right)
PIN 1- 3.3V-5V Power
PT
supply
PIN 2- Data
PIN 3- Null
N
PIN 4- Ground
EL
Connect pin 2 of DHT sensor to any
input pins of Raspberry Pi, here we
have used pin 11
PT
Connect pin 4 of DHT sensor to the
ground pin of the Raspberry Pi
N
Introduction to Internet of Things 7
Read Data from the Sensor
Adafruit provides a library to work with the DHT22 sensor
EL
Use the function Adafruit_DHT.read_retry() to read data from the sensor
PT
N
Source: ADAFRUIT DHTXX SENSORS, Lady Ada, 2012-07-29
Code Output
EL
PT
N
Introduction to Internet of Things 9
Sending Data to a Server
EL
Establish connection between the server and the client
Send data from the client to the server
PT
N
Introduction to Internet of Things 10
Sending Data to a Server (contd..)
Socket Programming:
Creates a two-way communication between two nodes in a network
EL
The nodes are termed as Server and Client
Server performs the task/service requested by the client
PT
N
Introduction to Internet of Things 11
Sending Data to a Server (contd..)
Creating a socket:
s = socket.socket (SocketFamily, SocketType, Protocol=0)
EL
SocketFamily can be AF_UNIX or AF_INET
PT
SocketType can be SOCK_STREAM or SOCK_DGRAM
Protocol is set default to 0
N
Source: PYTHON NETWORK PROGRAMMING, TutorialsPoint
Server:
s = socket.socket() # creating a socket object
EL
host = socket.gethostname() # local machine name/address
port = 12321 # port number for the server
s.bind((host, port)) # bind to the port
PT
s.listen(5) # waiting for the client to connect
while True:
c, addr = s.accept() # accept the connection request from the client
print ‘Connected to', addr
c.send(‘Connection Successful')
c.close()
N
#close the socket
Source: PYTHON NETWORK PROGRAMMING, TutorialsPoint
EL
s = socket.socket() # creating a socket object
host = socket.gethostname() # getting local machine name
port = 12345 # assigning a port
PT
s.connect((host, port))
print s.recv(1024)
s.close
N
Source: PYTHON NETWORK PROGRAMMING, TutorialsPoint
def sensordata():
EL
GPIO.setmode(GPIO.BOARD)
GPIO.setwarnings(False)
PT
sensor = Adafruit_DHT.AM2302
humidity, temperature = Adafruit_DHT.read_retry(sensor,17)
return(humidity, temperature)
N
This function returns the values from the DHT sensor
EL
while (1):
h,t = sensordata()
message = str(h)+','+str(t)
PT
#Send data
print >>sys.stderr, 'sending "%s"' % message
EL
sock = socket.socket(socket.AF_INET, socket.SOCK_DGRAM)
# Bind the socket to the port
server_address = ('10.14.3.194', 10001)
PT
sock.bind(server_address)
while True:
data, address = sock.recvfrom(4096)
with open(“Datalog.txt","a") as f:
mess=str(data)
f.write(mess)
print mess
N
f.close()
EL
The server receives the data
from the client and saves it in
a text file DataLog.txt
PT
N
Introduction to Internet of Things 18
EL
PT
N
Introduction to Internet of Things 19
EL
Implementation of IoT with Raspberry Pi: Part 3
PT
Dr. Sudip Misra
Associate Professor
N
Department of Computer Science and Engineering
IIT KHARAGPUR
Email: smisra@sit.iitkgp.ernet.in
Website: http://cse.iitkgp.ac.in/~smisra/
Internet Of Things
Creating an interactive environment
EL
Network of devices connected together
PT
N
Introduction to Internet of Things 2
IOT: Remote Data Logging
EL
Processing the data
PT
Respond to the network
N
Introduction to Internet of Things 3
IOT: Remote Data Logging
System Overview:
A network of Temperature and humidity sensor connected with
EL
Raspberry Pi
Read data from the sensor
PT
Send it to a Server
Save the data in the server
Data Splitting
Plot the data
N
Introduction to Internet of Things 4
IOT: Remote Data Logging (contd..)
Requirements
DHT Sensor
EL
4.7K ohm resistor
PT
Jumper wires
Raspberry Pi
N
Introduction to Internet of Things 5
DHT Sensor
Digital Humidity and
Temperature Sensor (DHT)
EL
PIN 1, 2, 3, 4 (from left to
right)
PIN 1- 3.3V-5V Power
PT
supply
PIN 2- Data
PIN 3- Null
N
PIN 4- Ground
EL
Connect pin 2 of DHT sensor to any
input pins of Raspberry Pi, here we
have used pin 11
PT
Connect pin 4 of DHT sensor to the
ground pin of the Raspberry Pi
N
Introduction to Internet of Things 7
Read Data from the Sensor
Use the Adafruit library for DHT22 sensor to read the sensor
data
EL
PT
N
Introduction to Internet of Things 8
Sending Data to a Server
EL
Establish connection between the two
Send data from the client to the server
PT
Save the data in a file
N
Introduction to Internet of Things 9
Data Processing
EL
Data splitting/filtering
Data plotting
PT
N
Introduction to Internet of Things 10
Data Processing
Data splitting/filtering:
Data from the client is saved in a text file
The values are separated by a comma(‘ , ’)
EL
message = str(h)+','+str(t)
Split() function can be used to split a string into multiple strings depending on the type of
PT
separator/delimiter specified.
Example:
Data= ‘sunday,monday,tuesday’ #Data is a string with 3 words separated by a comma
Data.split(“,”)
[‘sunday’,’monday’,’tuesday’] N # split the data whenever a “,” is found
# Gives 3 different strings as output
EL
Plot(x,y): plots the values x and y
xlabel(‘X Axis'): Labels the x-axis
PT
ylabel(‘Y Axis'): Labels the y-axis
title("Simple Plot"): Adds title to the plot
N
Source: MATPLOTLIB, John Hunter, Darren Dale, Eric Firing, Michael Droettboom and the Matplotlib development team, 2012 - 2016
EL
myplot.plot([1,2,3,4])
myplot.ylabel(‘Y-Axis’)
PT
myplot.show()
By default the values are taken for y-axis, values for x-axis are generated automatically starting
from 0
N
Source: MATPLOTLIB, John Hunter, Darren Dale, Eric Firing, Michael Droettboom and the Matplotlib development team, 2012 - 2016
Basic Plot:
EL
PT
N
Introduction to Internet of Things 14
Data Proceessing (contd..)
EL
grid(): Enable or disable axis grids in the plot
ion(): turns on the interactive mode
PT
subplot(): Adds subplot in a figure
Close(): Close the current figure window
N
Scatter(): make a scatter plot of the given points
Source: MATPLOTLIB, John Hunter, Darren Dale, Eric Firing, Michael Droettboom and the Matplotlib development team, 2012 - 2016
EL
def sensordata(): while (1):
GPIO.setmode(GPIO.BOARD) h,t = sensordata()
GPIO.setwarnings(False) message = str(h)+','+str(t) #Send data
PT
sensor = Adafruit_DHT.AM2302 print >>sys.stderr, 'sending "%s"' % message
sent = sock.sendto(message, server_address)
humidity, temperature =
finally:
Adafruit_DHT.read_retry(sensor,17)
N
return(humidity, temperature)
print >>sys.stderr, 'closing socket'
sock.close()
EL
ax.plot(hum,i, c='b', marker=r'$\Phi$')
hum=data.split(",")[0] plt.xlabel('Humidity ($\%$)')
tem=data.split(",")[1] ax.grid()
print 'temp='+(str(tem))+'iter='+str(i) fig.show()
PT
plt.ion() fig.canvas.draw()
fig=plt.figure(num=1,figsize=(6,6))
plt.title(' IoT Temperature and Humidity Monitor') sock = socket.socket(socket.AF_INET, socket.SOCK_DGRAM)
ax = fig.add_subplot(121)
EL
while True:
data, address = sock.recvfrom(4096)
with open("DataLog.txt","a") as f:
PT
mess=str(data)
f.write(mess)
coverage_plot(mess,i)
print mess
i+=1
f.close() N
Introduction to Internet of Things 18
Output
The Reading from the sensor is
sent to the Server and saved in
a text file.
EL
Two different plots for
temperature and humidity
data
PT
N
Introduction to Internet of Things 19
Output
EL
PT
N
Introduction to Internet of Things 20
EL
PT
N
Introduction to Internet of Things 21
EL
Software-Defined Networking – Part I
Restructuring the Current Network Infrastructure
PT
Dr. Sudip Misra
Associate Professor
N
Department of Computer Science and Engineering
IIT KHARAGPUR
Email: smisra@sit.iitkgp.ernet.in
Website: http://cse.iitkgp.ac.in/~smisra/
EL
PT
User II
User I
N
Introduction to Internet of Things 2
Overview of Current Network
OSPF Protocol executing
at the switches
EL
PT
User II
User I
N
Introduction to Internet of Things 3
Overview of Current Network
OSPF Protocol executing
at the switches
EL
PT
User II
User I
N
the switch has been attacked!
EL
PT
User II
User I
N
the switch has been attacked!
needs to route through an alternate path!
Present: No centralized control.
app
app
EL
OS
OS hardware app
hardware OS
app
PT
OS hardware
app
hardware
OS app
hardware OS Switches forward traffic
EL
Switches are required to configure according to the installed
operating system (OS).
PT
Centralized control is not feasible in traditional network.
N
Introduction to Internet of Things 7
Limitations in Current Network
Routing, mobility
EL
Thousands app app app
management, etc.
lines of
Operating system
PT
code Cost-expensive
EL
OS OS
hardware
hardware
hardware
PT
hardware app app
OS OS
hardware
N hardware
EL
Operating system
PT
packet packet packet
N
forwarding
hardware
forwarding
hardware
forwarding
hardware
EL
2008: The idea of software-defined network is originated from OpenFlow project
(ACM SIGCOMM 2008).
PT
2009: Stanford publishes OpenFlow V1.0.0 specs.
June 2009: Nicira network is founded.
N
March 2011: Open Networking Foundation is formed.
Oct 2011: First Open Networking Summit. Many Industries (Juniper, Cisco
announced to incorporate.
EL
PT
N -
-
Notes
Northbound API
Southbound API
(via OpenFlow)
EL
Control the entire network including individual switches
PT
Communication between the application, control, and data
planes are done through APIs
N
Introduction to Internet of Things 13
Components/Attributes of SDN
Hardware switches
Controller
EL
Applications
PT
Flow-Rules
Application programming interfaces (APIs)
N
Introduction to Internet of Things 14
Current Status of SDN
EL
It is required to change the current network with SDN in a
phased manner.
PT
Operational cost and delay caused due to link failure can be
significantly minimized.
N
Introduction to Internet of Things 15
Challenges
Rule placement
Controller placement
EL
PT
N
Introduction to Internet of Things 16
Rule Placement I
EL
Traditionally, Routing Table in every switch (L3 switch/router). SDN
maintains Flow Table at every switch.
PT
Flow-Rule: Every entry in the Flow Table.
Each rule has a specific format, which is also defined by a
N
protocol (e.g., OpenFlow).
EL
PT
N
Example of a flow-rule based on OpenFlow protocol
Source: http://networkstatic.net/wp-content/uploads/2013/06/OFP_normal_rules.png
EL
Limited number of rules can be inserted.
Fast processing is done using TCAM at the switches.
PT
TCAM is very cost-expensive.
N
Introduction to Internet of Things 19
Rule Placement Challenges II
On receiving a request, for which no flow-rule is present in
the switch, the switch sends a PACKET-IN message to the
Controller
EL
controller.
The controller decides a suitable
PT
flow-rule for the request.
The flow-rule is inserted at the switch.
N
Typically, 3-5ms delay is involved in a
new rule placement
EL
How to define rules, so that less number of PACKET-IN
messages are sent to controller.
PT
N
Introduction to Internet of Things 21
OpenFlow Protocol I
EL
different number of match-fields.
PT
N
Source: http://networkstatic.net/wp-content/uploads/2013/06/OFP_normal_rules.png
Different match-fields
Source IP
EL
Destination IP
Source Port
PT
Priority
etc.
N
Introduction to Internet of Things 23
OpenFlow Protocol III
EL
All rules are deleted from the switch at hard timeout.
This can used to reset the switch.
PT
Soft timeout
If NO flow is received associated with a rule for a particular time, the
rule is deleted. N
This is used to empty the rule-space by deleting an unused rule.
EL
OpenFlow is a protocol used to communicate between data-plane and
control-plane.
PT
We may have other protocols for this purpose. However, OpenFlow is
the only protocol present today.
N
Introduction to Internet of Things 25
OpenFlow Switch Software
Indigo: Open source, it runs on Mac OS X.
LINC: Open source, it runs on Linux, Solaris, Windows, MacOS, and
EL
FreeBSD.
Pantou: Turns a commercial wireless router/access point to an
PT
OpenFlow enabled switch. OpenFlow runs on OpenWRT.
Of13softswitch: User-space software switch based on Ericsson
TrafficLab 1.1 softswitch.
N
Open vSwitch: Open Source, it is the MOST popular one present
today.
Basics of SDN
Challenges present in SDN
EL
Rule Placement with OpenFlow
PT
Controller Placement – to be discussed in next lecture
N
Introduction to Internet of Things 27
EL
PT
N
Introduction to Internet of Things 28
EL
Software-Defined Networking – Part II
Restructuring the Current Network Infrastructure
PT
Dr. Sudip Misra
Associate Professor
N
Department of Computer Science and Engineering
IIT KHARAGPUR
Email: smisra@sit.iitkgp.ernet.in
Website: http://cse.iitkgp.ac.in/~smisra/
EL
layers
Rule Placement – TCAM and Delay
PT
OpenFlow protocol – flow-rule and math-fields
N
Introduction to Internet of Things 2
APIs in SDN
Southbound API
Used to communicate between control layer and infrastructure layer.
EL
OpenFlow protocol is used.
Northbound API
PT
Used to communicate between control layer and application layer.
Standard APIs are used.
East-Westbound APIs
N
Used to communicate among multiple controllers in the control layer.
EL
The controllers must be able to handle all incoming requests
from switches.
PT
Rule should be placed without incurring much delay.
Typically, a controller can handle 200 requests in a second
N
(through a single thread).
EL
Physically, they are connected to the switches in multi-hop distance.
If we have a very small number of controllers for a large
PT
network, the network might be congested with control
packets (i.e., PACKET-IN messages).
N
Introduction to Internet of Things 5
Flat Architecture
EL
PT
Packet-IN
Flow-Rule
N
Introduction to Internet of Things 6
Hierarchical (tree) Architecture
EL
PT
N
Introduction to Internet of Things 7
Ring Architecture
EL
PT
N
Introduction to Internet of Things 8
Mesh Architecture
EL
PT
User II
User I
N
Introduction to Internet of Things 9
Control Mechanisms
Distributed
The control decisions can be taken in a distributed manner
EL
Ex: each subnetwork is controlled by different controller
Centralized
PT
The control decisions are taken in a centralized manner.
Ex: A network is controlled by a single controller.
N
Introduction to Internet of Things 10
Backup Controller
EL
Replica of the main controller is created
If the main controller is down, backup controller controls the network
PT
to have uninterrupted network management.
N
Introduction to Internet of Things 11
Security I
EL
Proxy
HTTP
PT
Intrusion detection system (IDS)
N
12
Security II
EL
PT
Example of potential data plane ambiguity to implement the policy chain
N
Firewall-IDS-Proxy in the example topology.
Simulator/Emulator
Infrastructure deployment – MUST be supported with OpenFlow
EL
Controller placement – MUST support OpenFlow
Remote – controller can be situated in a remote place, and communicated
PT
using IP address and port number
Local
N
Introduction to Internet of Things 14
Switch Deployment
Mininet
Used to create a virtual network with OpenFlow-enabled switches
EL
Based on Python language
Supports remote and local controllers
PT
N
Introduction to Internet of Things 15
Controller Configuration Software
Pox
Nox
EL
FloodLight
PT
OpenDayLight [Popular!]
ONOS [Popular!]
N
Introduction to Internet of Things 16
Summary
EL
Control message overhead may be increased due to
additional number of packets (PACKET-IN messages).
PT
Unified network management is possible using SDN, while
leveraging global view of the network.
N
Introduction to Internet of Things 17
EL
PT
N
Introduction to Internet of Things 18
EL
Software-Defined IoT Networking – Part I
Recent Advances of SDN in IoT
PT
Dr. Sudip Misra
Associate Professor
N
Department of Computer Science and Engineering
IIT KHARAGPUR
Email: smisra@sit.iitkgp.ernet.in
Website: http://cse.iitkgp.ac.in/~smisra/
EL
PT
Source: https://image.slidesharecdn.com
N Source: http://www.luxhotels.info/p/46800/internet-of-things-iot/
EL
making
Visibility of network resources – network management is
PT
simplified based on user, device and application-specific
requirements
N
Intelligent traffic pattern analysis and coordinated decisions
EL
PT
N
Source: https://image.slidesharecdn.com
EL
Control of end-devices, such as sensors
and actuators
PT
N
Introduction to Internet of Things 5
SDN for IoT III
EL
Rule-placement at access devices,
while considering mobility and
PT
heterogeneity of end-users
N
Introduction to Internet of Things 6
SDN for IoT IV
EL
Rule-placement and traffic
engineering at backbone networks
PT
N
Introduction to Internet of Things 7
SDN for IoT V
EL
Flow classification and enhanced
security at data center networks
PT
N
Introduction to Internet of Things 8
Wireless Sensor Network I
Challenges
Real-time programming of sensor nodes
EL
Vendor-specific architecture
Resource constrained – heavy computation cannot be performed
PT
Limited memory – cannot insert too many control programs
N
Introduction to Internet of Things 9
Wireless Sensor Network II
Opportunities
Can we program the sensor nodes in real-time?
EL
Can we change the forwarding path in real-time?
Can we integrate different sensor nodes in a WSN?
PT
N
Introduction to Internet of Things 10
Software-Defined WSN I
EL
Forward the sensed data if exceeds a certain value
ID-centric data forwarding
PT
Forward the sensed data based on the ID of the source node
N
Real-life implementation of such method NOT done
EL
Sensor management
Multiple sensors can be implemented in a single sensor board
PT
Sensors can be used depending on application-specific requirements
Delay management
Delay for sensing can be changed dynamically in real-time
N
Active-Sleep Management
States of active and sleep mode can be changed dynamically
Soft-WSN
Topology Management
EL
Node-specific management – forwarding logic of a particular sensor can
be modified
PT
Network-specific management
Forward all traffic of a node in the network
Drop all traffic of a node in the network
N
Experimental results show that network performance can be improved using
software-defined WSN over traditional WSN
EL
PT
N
Packet delivery ratio in the network increases using Soft-WSN
compared to the traditional WSN.
EL
PT
N
Number of replicated data packets is reduced using Soft-WSN over
the traditional WSN.
EL
PT
N
Number of control messages in the network is higher using Soft-WSN over the
traditional WSN. This is due to the PACKET-IN message in the network. Each time a
node receives a new packet, it asks the controller for getting adequate forwarding logic.
EL
Flow-table for rule placement at sensor nodes is designed
Any programming language can be used through API to program the
PT
nodes in real-time
N
Introduction to Internet of Things 17
SDN-WISE Protocol Stack
Sensor node includes
IEEE 802.15.4 protocol
EL
Micro control unit (MCU)
Above IEEE 802.15.4 stack,
PT
Forwarding layer consists of
Flow-rules.
INPP – In Network Packet
Processing N
Source: Galluccio et al., IEEE INFOCOM ’15
EL
SDN-based applications
Network performance can be improved significantly using
PT
SDN-based approaches over the traditional approaches
N
Introduction to Internet of Things 19
EL
PT
N
Introduction to Internet of Things 20
EL
Software-Defined Networking – Part II
Recent Advances of SDN in IoT
PT
Dr. Sudip Misra
Associate Professor
N
Department of Computer Science and Engineering
IIT KHARAGPUR
Email: smisra@sit.iitkgp.ernet.in
Website: http://cse.iitkgp.ac.in/~smisra/
Software-Defined WSN
Different approaches – Sensor OpenFlow, Soft-WSN, SDN-
EL
WISE
Software-Defined WSN can improve overall performance over
PT
traditional WSN
N
Introduction to Internet of Things 2
Traditional (Wireless) Mobile Network
Problems in Traditional Mobile Network
Difficult to Scale – static over-provisioned network are inflexible to
EL
manage the mobile traffic with high demand
Difficult to manage – many times lead to misconfigurations
Inflexible – Requires too much time to introduce a new service as the
PT
hardware architecture is inflexible
Cost-expensive – Both capital expenditure and operational expenditure
are high
N
*Based on information from Open Networking Foundation (ONF)
EL
such as WiFi, 3G, 4G, etc.
Logically Centralized Control
PT
Particularly useful for efficient base-station coordination for
addressing inter-cell interference
N
*Based on information from Open Networking Foundation (ONF)
Path Management
Data can be routed based on service requirements without depending
EL
on core routing policies
Network Virtualization
PT
Abstracts the physical resources from the network services
Helps in providing seamless connectivity and service differentiation
among users N
*Based on information from Open Networking Foundation (ONF)
EL
eNodeB 3
PT
Traditional Mobile Network
N Software-Defined Mobile Network
*Based on information from Open Networking Foundation (ONF)
ANDSF – access
network discovery
EL
and service function
PT
N
Mobile traffic offloading based on OpenFlow
*Based on information from Open Networking Foundation (ONF)
EL
Higher rate of integration of new services
Abstracted network control and management
PT
Network abstracted from the user
N
Introduction to Internet of Things 8
Rule Placement at Access Devices
Challenges
General OpenFlow does not support wireless network
EL
Modified version of OpenFlow is required
Typically, users are mobile in nature – network is highly dynamic
PT
Frequent changes in rule placement is also required
Presence of heterogeneous devices in the network
N
How to support such heterogeneous devices in a single platform
ODIN
Ubi-Flow
EL
Mobi-Flow
PT
N
Introduction to Internet of Things 10
ODIN I
EL
Two components are present
Odin agent – placed with the physical devices
PT
Odin master – placed at the controller end
N
Source: Towards Programmable Enterprise WLANs with Odin, ACM HotSDN 2012
Conversion of 802.11
EL
LVAP – Light virtual AP
PT
N
Introduction to Internet of Things 12
Ubi-Flow I
EL
Fault tolerance
Flow-Scheduling
PT
Network partition
Network matching
Load balancing N
Source: UbiFlow: Mobility Management in Urban-scale Software Defined IoT, IEEE INFOCOM 2015
EL
PT
N
Source: Mobility-Aware Flow-Table Implementation in Software-Defined IoT, IEEE GLOBECOM 2016
EL
Approach
Predict location of end-users at (t+1) time, while the users are at (t)
PT
time
Place flow-rules at the APs which can be associated to the users based
N
on their predicted locations
Location prediction
Order-K Markov predictor – takes last k-th location instances to predict
EL
next location
Flow-rule placement
PT
Linear programming can be used to select optimal AP
N
Introduction to Internet of Things 16
Mobi-Flow IV
EL
PT
N
Message Overhead in the Network Energy consumption in the Network
EL
Load balancing is an important issue due to the dynamic
nature of the IoT network
PT
Dynamic resource allocation can also be integrated
N
Introduction to Internet of Things 18
Data Center Networking
EL
Elephant Flow – Exact match rules are useful
PT
We need to classify the flows before inserting flow-rules at
the switches to adequately forward them in the network
N
Introduction to Internet of Things 19
Anomaly Detection in IoT Network
EL
This can be done by monitoring each flow in the network
We can also collect the port statistics of the switches
PT
If there is any anomaly, it may generate large number of packets in the
network – it can be detected by monitoring the flows
N
Introduction to Internet of Things 20
Experimenting with Wireless Network
Mininet-WiFi
Can be used to deploy a network
EL
Supports both wired and wireless network
Wired – Ethernet protocol
PT
Wireless – WiFi protocol (IEEE 802.11 group)
ONOS
N
Can be used to place the controllers
EL
Issues with interference and mobility can be managed using
software-defined approaches
PT
N
Introduction to Internet of Things 22
EL
PT
N
Introduction to Internet of Things 23
EL
Cloud Computing – Fundamentals
PT
Prof. Sudip Misra
Associate Professor
N
Department of Computer Science and Engineering
IIT KHARAGPUR
Email: smisra@sit.iitkgp.ernet.in
Website: http://www.cse.iitkgp.ac.in/~smisra/
EL
Packaged resources available for computing and storage
PT
Heterogeneous computing nodes distributed over a wide area to perform very large tasks
N
Homogeneous computing nodes (connected loosely or tightly) working together
EL
computers by IBM Computing' (AWS) Azure
PT
1969 1990s 1999 2006
ARPANET Expansion Salesforce. Amazon
N of the
Internet.
Inception
of VPNs.
com EC2
EL
Source: P Mell & T Grance, “A NIST Notional Definition of Cloud Computing”, version 15, 2009.
PT
model
It can be rapidly allocated and released with low management effort
It has some essential characteristics, service models, and deployment models
N
It provides on-demand services, that can be accessed from any place and at
anytime
Source: Rajkumar Buyya, “Mastering Cloud Computing: Foundations and Applications Programming”, Tata McGraw-Hill Education, 2013
Rapid Elasticity
EL
Public
Measured Services Software-as-a-Service
(SaaS) Private
On-demand Self-
PT
Platform-as-a-Service
services Hybrid
(PaaS)
Infrastructure-as-a-
Resource Pooling Community
Service (IaaS)
Source: NIST
EL
More efficient resource utilization
Usage-based costing
PT
Reduced time to market
N
Introduction to Internet of Things 6
General Characteristics
Improved agility in resource provisioning.
Ubiquitous – independent of device or location
EL
Multitenancy – sharing of resources and costs across a large pool of users
Dynamic load balancing
PT
Highly reliable and scalable
Low cost and low maintenance
Improved security and access control
N
Introduction to Internet of Things 7
Essential Characteristics
EL
Should support standard mechanisms for information retrieval using
traditional interfaces
PT
Supported clients: heterogeneous thin or thick client platforms (e.g.,
mobile phones, laptops, and PDAs)
N
Source: P Mell & T Grance, “A NIST Notional Definition of Cloud Computing”, version 15, 2009.
Rapid elasticity
Cloud resource allocation should be rapid, elastic and automatic
EL
Dynamic allocation/release facility for scale-out and scale-in
Consumers should feel infinite resources
PT
Facility for add/remove of quantity should be there
N
Source: P Mell & T Grance, “A NIST Notional Definition of Cloud Computing”, version 15, 2009.
Measured service
Resource usage should be recorded and monitored
EL
Facility to dynamically control and optimize the resource usage
This facility should be transparent between the service provider and
PT
consumer.
N
Source: P Mell & T Grance, “A NIST Notional Definition of Cloud Computing”, version 15, 2009.
On-demand self-service
Provide server time and network storage to users automatically
EL
This facility should be available as a self-service
PT
N
Source: P Mell & T Grance, “A NIST Notional Definition of Cloud Computing”, version 15, 2009.
Resource pooling
Automatically pool the whole available resources
EL
Serve multiple end-users using a multi-tenant model
Resources should be allocated according to user’s demand
PT
N
Source: P Mell & T Grance, “A NIST Notional Definition of Cloud Computing”, version 15, 2009.
EL
Applications: Web apps, SaaS, etc.
Applications
Platform: Apps/Web hosting using PaaS
Platform
PT
Storage: Database, Data-Storage-as-a-Service (DSaaS)
Infrastructure: Virtualization, IaaS, EC2 Storage
Infrastructure
N Source: Wikipedia
Application
Platform-as-a-Service (PaaS)
EL
Components Services
PT
Compute Network Storage
Infrastructure
N Servers
Source: Wikipedia
EL
Services can be accessed via different types of client devices (e.g.
web browser, app)
PT
End-users do not posses the control of the cloud infrastructure
EL
Support for deployment of such applications
The user does not control the cloud infrastructure
PT
User can control the deployed applications using given
configurations
Examples: Windows Azure, Google App Engine N
Source: P Mell & T Grance, “A NIST Notional Definition of Cloud Computing”, version 15, 2009.
EL
User can deploy, execute and control any software (Operating
systems and other applications)
PT
In some case, the user can control selected networking components
(e.g., host firewalls).
N
Examples: Amazon EC2, GoGrid, iland, Rackspace Cloud Servers.
Source: P Mell & T Grance, “A NIST Notional Definition of Cloud Computing”, version 15, 2009.
EL
Hybrid cloud On-premise Off-premise
PT
Source: https://en.wikipedia.org/wiki/Cloud_computing
Community cloud
Distributed cloud
Multi-cloud
Inter-cloud
N
Introduction to Internet of Things 18
Public Cloud
Cloud set-up for the use of any person or industry
Typically owned by an organization who offers the cloud service.
Examples: Amazon Web Service (AWS), Google Compute Engine, Microsoft
EL
Azure
Advantages:
PT
Easy to set-up at low cost, as provider covers the hardware, application and
bandwidth costs.
Scalability to meet needs.
N
Pay-per-use ensures that from user’s perspective no resources wasted.
Source: Christian Baun and Marcel Kunze, "A Taxonomy Study on Cloud Computing Systems and Technologies“, Cloud Computing - Methodology, Systems, and Applications, L Wang et al. (Eds),
CRC Press, 2012
EL
(off-premises)
Advantages:
PT
Total control over the system and data
Minimum security concerns
Disadvantages:
Regular maintenance N
Source: Christian Baun and Marcel Kunze, "A Taxonomy Study on Cloud Computing Systems and Technologies“, Cloud Computing - Methodology, Systems, and Applications, L Wang et al. (Eds),
CRC Press, 2012
EL
Customer types Multiple Limited
PT
Connectivity Over Internet Over Internet/private network
Security Low
N High
Source: Christian Baun and Marcel Kunze, "A Taxonomy Study on Cloud Computing Systems and Technologies“, Cloud Computing - Methodology, Systems, and Applications, L Wang et al. (Eds),
CRC Press, 2012
EL
Pooled together by standardized tools
Supports data and application portability (e.g., facility for load-balancing
PT
between clouds)
Provides multiple deployment models
N
Source: Christian Baun and Marcel Kunze, "A Taxonomy Study on Cloud Computing Systems and Technologies“, Cloud Computing - Methodology, Systems, and Applications, L Wang et al. (Eds),
CRC Press, 2012
EL
Managed by internally or by third party
Distributed Cloud
PT
Collection of scattered set of computing devices in different locations, however, connected to
a single network
Two types – Public-resource Computing and Volunteer Cloud.
N
Source: Christian Baun and Marcel Kunze, "A Taxonomy Study on Cloud Computing Systems and Technologies“, Cloud Computing - Methodology, Systems, and Applications, L Wang et al. (Eds),
CRC Press, 2012
EL
Increases fault-tolerance and flexibility
Inter-cloud
Unified global ‘cloud of clouds’ based on the Internet
PT
Supports interoperability between cloud service providers
N
Source: Christian Baun and Marcel Kunze, "A Taxonomy Study on Cloud Computing Systems and Technologies“, Cloud Computing - Methodology, Systems, and Applications, L Wang et al. (Eds),
CRC Press, 2012
On-premise Off-premise
EL
Dedicated Access Private cloud Hosted private cloud
PT
Shared Access Community cloud Public cloud
N
Source: Christian Baun and Marcel Kunze, "A Taxonomy Study on Cloud Computing Systems and Technologies“, Cloud Computing - Methodology, Systems, and Applications, L Wang et al. (Eds),
CRC Press, 2012
PT
Prof. Sudip Misra
Associate Professor
N
Department of Computer Science and Engineering
IIT KHARAGPUR
Email: smisra@sit.iitkgp.ernet.in
Website: http://www.cse.iitkgp.ac.in/~smisra/
EL
Security Integration Application
Admin Service
Identify Workflow Grid PaaS Admin - Packaging
Database Service - Configuration
IaaS
PT
UI Services - Deployment
Grid
- Scaling
- Lifecycle
Management
N
IaaS Self-service Interface
Virtual
Machine
Virtual
Storage
Virtual
Grid
- Utilization
- User
Management
Applications
By User
Data
By User
Applications Applications
Runtime
EL
Data Data Applications
Middleware
By Service Provider
Runtime Data
OS
Middleware
By User
Runtime
By Service Provider
OS Runtime Middleware
By Service Provider
Virtualization Middleware OS
PT
Servers Virtualization OS Virtualization
Storage Servers Virtualization Servers
Networking Storage Servers Storage
Networking Storage Networking
Networking
Traditional
N IaaS PaaS SaaS
EL
Source: https://aws.amazon.com/types-of-cloud-computing/
PT
IaaS provides the following:
Servers- Compute, machines
Storage
Network
Operating system
N
Source: Rajkumar Buyya, “Mastering Cloud Computing: Foundations and Applications Programming”, Tata McGraw-Hill Education, 2013
or network equipment
EL
• Cloud service provider offers Operating Operating
Operating System System
resource management System VM1 VM2
PT
• Outsourced service on-
demand model Hypervisor
Hardware Hardware
N Physical Server Virtualized Server
Source: Wikipedia, Hardware Virtualization
EL
huge success immediately)
Suitable for serving fluctuating computing demands. (Ex. Flipkart, Amazon
PT
during festival seasons)
Suitable for new business model trials.
N
Helps in minimizing the capital expenses. (entrepreneurs starting on a
shoestring budget)
EL
Large amount of resource allocation/release in a short span of time
No variation in system performance while scale in or out
PT
N
Introduction to Internet of Things 7
Essential Characteristics
EL
Pre-configured facility for allocation of virtualized resources
The virtualized resources are to be monitored for their running status
PT
The Usage and Billing system records the use of infrastructure
resources and accordingly calculate payment
N
Introduction to Internet of Things 8
Essential Characteristics
EL
The clients should be able to access the computational resources
without failure
PT
Uninterrupted facility for computation and communication
N
Introduction to Internet of Things 9
Essential Characteristics
EL
To enable high computing power with the large pool of physical
resources using parallel processing
PT
To optimize the deployment of physical resources by dynamic
configuration of virtual infrastructure resources
N
Introduction to Internet of Things 10
Essential Characteristics
EL
infrastructure resources
To facilitate easy reallocation and duplication of allocated
PT
infrastructure resources
N
Introduction to Internet of Things 11
IaaS Categories
EL
Shared infrastructure resources
Available for self-service basis
PT
Private Cloud
Private infrastructure resources
Access control
N
Hybrid Cloud: A blend of public and private
EL
Medical records)
Network latency may degrade the level of expected
PT
performance
N
Introduction to Internet of Things 13
IaaS – Challenges and Limitations (contd.)
EL
Seamless scaling of services independent of traffic variation
Developers have to focus on low level system details
PT
N
Introduction to Internet of Things 14
Platform-as-a-Service (PaaS)
“Platform-as-a-service remove the need for organizations to manage the underlying
infrastructure (usually hardware and operating systems) and allow you to focus on the
deployment and management of your applications.” – Amazon
EL
Source: https://aws.amazon.com/types-of-cloud-computing/
PT
which can be offered as services via Internet
Simplifies the application development and deploy providing the cloud-
aware feature
N
PaaS is an application middleware offered as a service to developers
Provides abstraction and security for deployed applications.
Source: Rajkumar Buyya, “Mastering Cloud Computing: Foundations and Applications Programming”, Tata McGraw-Hill Education, 2013
EL
Allows customers to rent virtualized servers and associated
services
PT
Provides elastic scaling of the user’s deployed application
N
Introduction to Internet of Things 16
Features of PaaS Offering
Operating system
Server-side scripting environment
EL
Database management system
Server Software
PT
Support
Storage
Network access
Hosting
N
Tools for design and development
EL
Provides preconfigured features that customers can subscribe
Support available for managing the infrastructure and
PT
applications for customers
Services are regularly updated with new features
N
Introduction to Internet of Things 18
Business Advantages
EL
individual hardware and software elements
Ease of access for the development and deployment tools
PT
Freedom from managing development and deployment tools
individually
N
Introduction to Internet of Things 19
Software-as-a-Service (SaaS)
“Software as a Service provides you with a completed product that is run and
managed by the service provider. In most cases, people referring to Software as a
Service are referring to end-user applications.” – Amazon
EL
Source: https://aws.amazon.com/types-of-cloud-computing/
PT
Operation, maintenance and technical support is provided by the
service provider
Typically offered via web browser working as a thin-client
Supports a fully pay-as-you-go model N
Source: Software Services for e-Business and e-Society: Proceedings of 9th IFIP WG 6.1 Conference on e-Business, e-Services and e-Society, I3E 2009, Nancy,
France, September 23-25, 2009.
EL
Facility for access and control of commercial software via
Internet
PT
Multi-tenant application delivery in a one-to-many model
N
Introduction to Internet of Things 21
Advantages
Traditional Software SaaS
Customers install, manage & maintain Customers uses over the Internet
Runs on individual organization on Runs on multiple customers
EL
dedicated instantiation simultaneously
Cross platform support required No concerns for cross platform support
PT
Less frequent version updates & More frequent updates for enhanced user
purchased separately satisfaction
Separate costs incurred for upgrades
Vulnerable to software piracy
N No separate cost
Less vulnerable to software piracy
Source: Software Services for e-Business and e-Society: Proceedings of 9th IFIP WG 6.1 Conference on e-Business, e-Services and e-Society, I3E 2009, Nancy,
France, September 23-25, 2009.
EL
connections
Multi-tenancy
PT
Important architectural shift from designing isolated, single-tenant
applications
Ability to accommodate users from multiple companies at the same time
N
Transparency to all the users
Maximize the sharing of resources across tenants while distinguishing user’s
individual data
EL
To customize the application for one customer will change the application
for other customers as well
PT
Separate data space for different users
N
Introduction to Internet of Things 24
Limitations of SaaS
Centralized control
Switching cost
EL
Limited flexibility
PT
Data security and privacy
N
Introduction to Internet of Things 25
EL
PT
N
Introduction to Internet of Things 26
EL
Cloud Computing – Service Management and Security
PT
Dr. Sudip Misra
Associate Professor
N
Department of Computer Science and Engineering
IIT KHARAGPUR
Email: smisra@sit.iitkgp.ernet.in
Website: http://www.cse.iitkgp.ac.in/~smisra/
EL
on-demand, virtual environments
Aims to provide equal importance to desired outcomes of
PT
customers
Management of services at no cost and risk
N
Introduction to Internet of Things 2
Objectives
To provide standard services
Clear & complete description of services
Usage monitoring and billing
EL
High availability of networks and connectivity
Ease of access
PT
Portals for service selection
Rapid fulfillment/decommissioning of resources
Service guarantees
Secure computing and storage
N
Source : IBM Global Technology, Integrated Service Management and Cloud Computing: More than Just Technology Best Friends, White Paper, IBM Global Technology
Services, 2010
EL
Provides a roadmap with clearly defined deliverables
Describes the quality, utility and warranty of services
PT
expected by the customer
N
Note: Depending on the service provider exact metric for each SLA varies, however
areas covered remain unchanged like volume and quality of work, speed, efficiency
Source: K.T. Kearney, F. Torelli, "The SLA Model". In Wieder, P.; Butler, J.M.; Theilmann, W.; Yahyapour, R. Service Level Agreements for Cloud Computing. Springer Science+Business Media, LLC.
pp. 43–68, 2011. ISBN 9781461416142.
EL
obtained from metric measurements
Billing
PT
Service provider calculates billing information using
Accounting records
Resource prices
Billing rules N
Source : M. Lindner, F. Marquez, C. Chapman, S. Clayman, D. Henriksson, and E. Elmroth. The cloud supply chain: A framework for information, monitoring, accounting and
billing. In 2nd International ICST Conference on Cloud Computing (CloudComp 2010). Springer Verlag, 2010
EL
Networked computing
Remote server
PT
Cloud Computing
Off-premises
N
Virtual hosting solution
Heterogeneous hardware, software and networks on the cloud
Source : Wikipedia – Cloud Computing
EL
Flexibility and Scalability
Automation
PT
Running Costs
Security
N
Source : Wikipedia – Cloud Computing
EL
Duty cycles of customer set
Relative displacement duty cycle
PT
Load of customer set
N
Source : Kevin L. Jackson, 2011, "The Economic Benefit of Cloud Computing", Forbes
Economic incentives
Lower cost
EL
Cap-Ex free Computing
Deploy projects faster; foster innovation
PT
Scale as needed
Lower maintenance costs
Resiliency and redundancy N
Source : Jackson, Kevin L., 2011, "The Economic Benefit of Cloud Computing", Forbes
EL
protection, business intelligence, e-commerce
Determine how suitable these apps are for public or private clouds
PT
Factors affecting easy development process
N
Introduction to Internet of Things 10
Managing Data in Cloud (Contd.)
EL
Fault-Tolerance
Adaptive to heterogeneity
PT
Operational comfort on encrypted data
Capable of interfacing with other products/solutions
N
Source : D. Abadi. Data management in the cloud: Limitations and opportunities. IEEE Data Eng. Bull., 32(1):3–12, 2009.
Database-as-a-Service (DBaaS)
MicrosoftAzure/SQLDatabase
EL
AmazonWebServices/DynamoDB/RelationalDatabaseService
GoogleCloudSQL/GoogleAppEngine Datastore
PT
ClearDB
Database.com
N
Source : Wikipedia – Cloud Database
EL
Loss of data
Account seizing
PT
Service traffic hindrance
Vulnerable APIs
secure policies
N
Solution: Protection from theft, leakage and deletion by providing
Source: D.Velev and P.Zlateva "Cloud infrastructure security" in Open Research Problems in Network Security vol.6555 J.Camenisch V.Kisimov and M.Dubovitskaya Eds.Berlin Heidelberg:
Springer 2011 pp.140-148.
EL
For services SaaS, PaaS, IaaS
Building Levels for viewing, evaluating and executing infrastructure
PT
security are
Network level security
Host level security
Application level security
N
Source: D.Velev and P.Zlateva "Cloud infrastructure security" in Open Research Problems in Network Security vol.6555 J.Camenisch V.Kisimov and M.Dubovitskaya Eds.Berlin Heidelberg:
Springer 2011 pp.140-148.
EL
Proper access control for using resources
Achieving confidentiality and integrity of data-in-transit
PT
to and from the cloud service provider
Availability of internet resources correctly to genuine
users from cloud service provider N
Source: D.Velev and P.Zlateva "Cloud infrastructure security" in Open Research Problems in Network Security vol.6555 J.Camenisch V.Kisimov and M.Dubovitskaya Eds.Berlin Heidelberg:
Springer 2011 pp.140-148.
EL
Security responsibilities are transferred to Cloud service
providers
PT
Host security at IaaS Level:
Primary objective is to secure the allocated hosts
N
Example of threats: Blue Pill attack on hypervisor
Source: D.Velev and P.Zlateva "Cloud infrastructure security" in Open Research Problems in Network Security vol.6555 J.Camenisch V.Kisimov and M.Dubovitskaya Eds.Berlin Heidelberg:
Springer 2011 pp.140-148.
EL
SaaS Providers PaaS providers IaaS Providers
PT
• Security of deliverable • Security of • Application level
applications • PaaS platform security is not
• Deployed customer provided by IaaS
EL
Integrity Aspects of
Availability Data Security
PT
Solution: Data
Remanence
Data
including
Multitenancy
Identity management
Data Lineage
Encryption
Access control N
Source: L. Grandinetti; O. Pisacane; M. Sheikhalishahi; “Cloud Security” in 1st Edition, Pervasive Cloud Computing Technologies: Future Outlooks and Interdisciplinary Perspectives, IGI
Global, 31-Oct-2013.
EL
the legitimate reasons
User identities and access permissions are instigated, caught,
PT
administered and recorded by IAM
Authentication, authorization and evaluation of all users are
N
done according to the terms and conditions and the roles of
users
Source: Wikipedia – Identity Management
EL
Access Control over Resource-level
PT
Improvement of operational efficiency
Organizations attain access control and operational security
using IAM
N
Improvement of regulatory compliance management
Source: Wikipedia – Identity Management
EL
Server access
Service access
PT
Database access (direct and queries via web services)
VM access
Access to objects within a VM
N
Management of these layers depends on provider or
consumer, based on the deployment model
EL
Reputation: Belief of an entity’s standing by the community
These concepts are needed by the customer to select
PT
appropriate cloud provider
N
Source: Z. Raghebi and M. R. Hashemi, "A New Trust Evaluation Method based on Reliability of Customer Feedback for Cloud Computing", in Proc. Information Security and Cryptology
Conference, pp. 1-6, Iran, 2013.
Source: S. M. Habib; S. Hauke; S. Ries; M. Muhlhauser , "Trust as a facilitator in cloud computing: a survey", Journal of Cloud Computing, vol. 1 (1), pp. 1-18, 2012.
EL
Application of audit standards
Measuring and ratings
PT
Questionnaires for self-assessment
N
Source: Z. Raghebi and M. R. Hashemi, "A New Trust Evaluation Method based on Reliability of Customer Feedback for Cloud Computing", in Proc. Information Security and Cryptology
Conference, pp. 1-6, Iran, 2013.
Source: S. M. Habib; S. Hauke; S. Ries; M. Muhlhauser , "Trust as a facilitator in cloud computing: a survey", Journal of Cloud Computing, vol. 1 (1), pp. 1-18, 2012.
EL
Qualitative (high/moderate/low) versus quantitative (numbers)
techniques
PT
Consequence versus cause analysis
Inductive versus deductive techniques
N
Source: E. Cayirci, A. Garaga, A. S. De Oliveira, Y. Roudier, "A Cloud Adoption Risk Assessment Model", IEEE/ACM International Conference on Utility and Cloud Computing (UCC), 8-11 Dec.
2014, London, UK, pp. 908 – 913.
User Authentication
What: User authentication process between new users and service
EL
provider
When: During the authentication, the properties and safety of process
PT
can be invaded by attack causing severe damages
Where: User authentication is done at PaaS layer
N
Consequence: Threat to authentication process can lead to divulge of
confidential data to a fake user
Source: H. Chang; E. Choi ,"User authentication in cloud computing" ,Proc. UCMA CCIS,vol. 151 pp. 338-342 2011
PT
Dr. Sudip Misra
Associate Professor
N
Department of Computer Science and Engineering
IIT KHARAGPUR
Email: smisra@sit.iitkgp.ernet.in
Website: http://www.cse.iitkgp.ac.in/~smisra/
EL
The simulators facilitate pre-deployment tests of services
As the demand of cloud computing is growing everyday, the
PT
simulators and technologies are needed to be studied
N
Introduction to Internet of Things 2
Introduction (contd.)
EL
Testing at no cost
Enable repeatable evaluation
PT
Control the environment
Pre-detection of issues affecting performance
N
Design of countermeasures
EL
CloudAnalyst
GreenCloud
PT
iCanCloud
GroudSim
DCSim N
Introduction to Internet of Things 4
CloudSim
A simulation framework
Models cloud computing environments – Data Center, VM,
EL
applications, users, network topology
Written on Java-based environment
PT
Allows to examine the performance of application services
Dynamic addition/removal of resources during simulation
N
Developed at CLOUDS Lab. of University of Melbourne
Source : Calheiros RN, Ranjan R, Beloglazov A, Rose CAFD, Buyya R. CloudSim: A toolkit for modeling and simulation of cloud computing environments and evaluation of resource
provisioning algorithms. Software: Practice and Experience 2011; 41(1):23–50
EL
Minimum effort
Flexibility and applicability:
PT
Support for diverse cloud environments
Enables modelling of application services in any environment
N
Source : Calheiros RN, Ranjan R, Beloglazov A, Rose CAFD, Buyya R. CloudSim: A toolkit for modeling and simulation of cloud computing environments and evaluation of resource
provisioning algorithms. Software: Practice and Experience 2011; 41(1):23–50
EL
Virtualization of server hosts
Allocation of virtual machines (VMs)
PT
User defined policies for allocation of host resources to VMs
Energy-aware computational resources
Stop and resume of simulation
N
Dynamic addition/removal of simulation components
Source : Calheiros RN, Ranjan R, Beloglazov A, Rose CAFD, Buyya R. CloudSim: A toolkit for modeling and simulation of cloud computing environments and evaluation of resource
provisioning algorithms. Software: Practice and Experience 2011; 41(1):23–50
EL
Provides cloud environment
Enables modelling and simulation
PT
Core Simulation Engine: Bottom most layer
Event scheduling
Entity creation
Interaction between components
Clock management
N
Source : Calheiros RN, Ranjan R, Beloglazov A, Rose CAFD, Buyya R. CloudSim: A toolkit for modeling and simulation of cloud computing environments and evaluation of resource
provisioning algorithms. Software: Practice and Experience 2011; 41(1):23–50
Users Application
EL
Configuration
Physical Machines
Simulation
Virtual Machines Specification
PT
Applications & services Scheduling
Policy Data Center
User Broker
Scheduling policies Broker
Source : Calheiros RN, Ranjan R, Beloglazov A, Rose CAFD, Buyya R. CloudSim: A toolkit for modeling and simulation of cloud computing environments and evaluation of resource
provisioning algorithms. Software: Practice and Experience 2011; 41(1):23–50
EL
Helps in solving issues like
Hosts provisioning to VMs
PT
Application execution management
Dynamic system state monitoring
Allows a cloud service provider to
N
Implement customized strategies
Evaluating the efficiency of different policies in VM provisioning
EL
Cloud
Data Center
Cloud Services Coordinator
PT
Cloud Resources
Bandwidth
VM Provisioning
Allocation
Network
Memory Storage
CPU Allocation
Allocation
N
Allocation Network
Topology
Message Delay
Calculation
Source : Calheiros RN, Ranjan R, Beloglazov A, Rose CAFD, Buyya R. CloudSim: A toolkit for modeling and simulation of cloud computing environments and evaluation of resource provisioning
algorithms. Software: Practice and Experience 2011; 41(1):23–50
EL
Supports geographically distributed large-scale Cloud
PT
applications
The purpose is to study the behavior of such applications
under various deployment configurations
N
Source: B. Wickremasinghe, R. N. Calheiros, R. Buyya, “CloudAnalyst: A CloudSim-Based Visual Modeller for Analysing Cloud Computing Environments and Applications”, in Proc. of IEEE Intl.
Conf. on Advanced Information Networking and Applications (AINA), pp. 446-452, Perth, 2010.
EL
Flexibility of adding components
PT
Repeatability of experiments
Graphical output (e.g. charts, tables)
N
Easy to extend (Java Swing) and uses blended technology
Source: B. Wickremasinghe, R. N. Calheiros, R. Buyya, “CloudAnalyst: A CloudSim-Based Visual Modeller for Analysing Cloud Computing Environments and Applications”, in Proc. of IEEE Intl.
Conf. on Advanced Information Networking and Applications (AINA), pp. 446-452, Perth, 2010.
EL
Extensions
• UserBase: User traffic generation
• DataCenterController: Events of data center
• Internet: Internetworking & routing
PT
CloudSim Toolkit • InternetCharacteristics: Properties of Internet (delay,
Bandwidth, throughput, etc.)
Fig: CloudAnalyst Architecture
• VmLoadBalancer: Policies for load balancing
N • CloudAppServiceBroker: Entities for routing between
UserBase & data center.
Source: R. Buyya, CloudAnalyst: A CloudSim-based Tool for Modelling and Analysis of Large Scale Cloud Computing Environments, Distributed computing project, CSSE Dept., University of
Melbourne, 433-659, Jun 22, 2009
EL
Energy consumption by data center is the major factor driving the operational expense
What:
Operational cost is the energy utilized by computing and communication units within a
PT
data center
How:
N
GreenCloud monitors the energy consumption of servers, switches, etc.
Developed as an extension of a packet-level network simulator NS2
Source: D. Kliazovich, P. Bouvry, S. U. Khan, "GreenCloud: A packet-level simulator of energy-aware cloud computing data centers", J. Supercomput., vol. 62, no. 3, pp. 1263-1283, Dec. 2012
EL
Facility for monitoring energy consumption of network &
devices
Supports simulation of cloud network components
PT
Supports monitoring of energy consumption of individual
components
N
Enables improved power management schemes
Dynamic management and configuration of devices
EL
Eucalyptus Microsoft Azure, Google App Engine
PT
Facility Mostly offers IaaS IaaS, PaaS, SaaS Services on
subscription
Security Implemented by user Implemented by service provider
Type N
Private/On-premise Public/Off-premise/Hosted-private
EL
Preconfigured software suit VM Storage Monitoring
Different services available for users Tools
Container
Considered Infrastructure as a Service (IaaS).
PT
Ease of use: add new instances quickly to run other Common Network
cloud components
N
Provides a platform to create software applications
Developed software applications can be used by
the end users
Dashboard GUI
EL
Identity (Keystone) Allows set up of cloud management
Image (Glance) environment
Object storage (Swift) Supports easy horizontal scaling – dynamic
addition/removal of instances to support
PT
Dashboard (Horizon)
Database (Trove) more users in real-time
Elastic map reduce (Sahara) Open source software – free to access the
Shared file system (Manila) source code and share their own code to
DNS (Designate)
Search (Searchlight)
Key manager (Barbican)
N community
EL
Supports extensive set of services to quickly create, deploy
and manage applications
PT
Many programming languages and frameworks are supported
Available across a worldwide Microsoft-managed datacenters
N
Source URL: https://azure.microsoft.com/en-in/overview/what-is-azure
EL
Data management
Messaging
PT
Media services
Content Delivery Network (CDN)
Developer
Management
Machine Learning
N
Introduction to Internet of Things 21
Azure as PaaS (Platform as a Service)
Platform is provided to clients to develop and deploy software
Clients focus on application development rather than worry
EL
about hardware and infrastructure
Low Cost
PT
less vulnerable to security attacks
Ease to move on to new tools
N
Solves the issues related to most of the operating systems,
servers and networking.
Source URL : https://azure.microsoft.com/en-in/overview/what-is-paas/
EL
Ideal for the application where complete control is required
PT
Facility for loading of custom configurations
N
Source URL: https://blogs.msdn.microsoft.com/hanuk/2013/12/03/which-windows-azure-cloud-architecture-paas-or-iaas
EL
Provides various APIs, tools and utilities
Facilitate dynamic computation scaling in the
PT
Amazon Web Services (AWS) cloud
N
Supports pay-per-use billing rather than making
large and expensive hardware purchases
Source: amazon web services Website https://aws.amazon.com/ec2/
EL
Dynamic instance allocation by AWS according to user demand
Instance types
PT
General purpose: T2, M4, M3
Compute optimized: C4, C3
N
Memory optimized: X1, R4, R3
Accelerated computing instances: P2, G2, F1
Source URL: https://aws.amazon.com/ec2/
EL
Persistent storage:
Temporary: Local ‘Instance Store’
PT
Amazon Elastic Block Store (EBS)
Simple Storage Service (S3)
N
Automated scaling: Rule based / Schedule based
Different “availability zones” in data centers increases fault-tolerance
EL
Elastic IP address: Mapping between IP and any VM of user
Amazon CloudWatch: CPU, disk, network resource utilization monitoring
PT
Enhanced security for instances using public-private key pair
Virtual private clouds (VPCs):
Logically separate from the rest of the AWS cloud
N
Optionally connected to user’s own network
EL
Components
Installation
Creating a key‐pair and manage security group
Launce Instances
Creating an image PT
Accessing and Communicating with instances
N
EL
Launched as a joint project of Rackspace Hosting and NASA in 2010
Opensource
Presently many companies are contributing to openstack
Eg. IBM, CISCO, HP, Dell, Vmware, Redhat, suse, Rackspace hosting
PT
It has a very large community
Can be used to develop private cloud or public cloud
Versions:
N
Austin, Bexar, Cactus, Diablo, Essex, Folsom, Grizzly, Havana, Icehouse, Juno,
Kilo, Liberty, Mitaka, Newton, Ocata (Latest)
EL
Dashboard
Nova Glance
PT
Swift Neutron Cinder Heat Ceilometer Keystone
N
EL
Identity service
Provides authentication and authorization
Horizon
Dashboard
GUI of the software
PT
Provides overview of the other components
N
EL
Compute service
Where you launce your instances
Glance
Image service PT
Discovering, registering, retrieving the VM
Snapshots
N
EL
Object storage
Helps in storing data safely, cheaply and efficiently
Neutron
PT
Provides networking service
Enables the other services to communicate with each other
Make your own network
N
EL
Block storage
Virtualizes the management of block service
Heat
Orchestration
Ceilometer
Billing
PT
What service you are using
N
How long are you using
EL
We will use devstack
Steps:
PT
Install git ( sudo apt‐get install git )
Clone devstack ( git clone https://git.openstack.org/openstack‐
dev/devstack )
N
Go to devstack directory ( cd devstack )
EL
ADMIN_PASSWORD=<YOUR PASSWORD>
DATABASE_PASSWORD =<YOUR PASSWORD>
RABBIT_PASSWORD =<YOUR PASSWORD>
SERVICE_PASSWORD =<YOUR PASSWORD>
PT
HOST_IP=<the IP of your PC>
Run the stack.sh file ( ./stack.sh)
N
For uninstallation, go to devstack directory and run unstack.sh file
EL
https://docs.openstack.org/developer/devstack/
PT
N
EL
It is not only “dumping the sensor data into cloud”
PT Cloud
Cloud
N
Introduction to Internet of Things 2
Wireless Sensor Networks (WSNs): Recap
Contain sensor nodes which sense some physical phenomena from the
EL
environment
Transmit the sensed data (through wireless communication) to a centralized
unit, commonly known as Sink node
The communication between Sink node and other sensor nodes in the
PT
network may be single/multi‐hop
Sink node further process data
N
Introduction to Internet of Things 3
Wireless Sensor Networks (WSNs): Recap
Sink Applications
Target Tracking
EL
Sensing unit Wildlife Monitoring
Healthcare
Processing unit Industrial Applications
Communication unit Smart Home
Major Components of a
Sensor Node PT Smart City
Agriculture
…
N
Wireless Sensor Networks
EL
Advantages
Elasticity: Scaling up/down
Pay‐per‐use: Payment for the resource as per requirement
Self Service: Resource can be accessed by self
PT
N
Introduction to Internet of Things 5
Cloud Computing: Services
Cloud‐Clients
App, Web browser, terminal
EL
Software‐as‐a‐Service (SaaS)
PT Platform‐as‐a‐Service (PaaS)
Infrastructure‐as‐a‐Service (IaaS)
N
Introduction to Internet of Things 6
Cloud Computing: Services
Software‐as‐a‐Service (SaaS)
EL
A third party provides a host application over internet
Example: Microsoft Office 365
Platform‐as‐a‐Service (PaaS)
Provide a platform to develop and run applications
PT
Example: Windows Azure
Infrastructure‐as‐a‐Service (IaaS)
Provide computing resources
N
Example: Storage space
EL
(VM)
Improve IT throughput and costs by using physical resources as a pool from
which virtual resources can be allocated.
Benefit
PT
Sharing of resources: Same resource can be shared, in turn cost reduction
Encapsulation: A complete computing environment
Independence: Runs independently of underlying hardware
Portability: VM Migration
N
Introduction to Internet of Things 8
Limitations of WSNs
Change of Requirement
Procurement An example
EL
Price
Right vendor Today Tomorrow
Types of sensor integrated with it
Deployment
Maintenance
PT
Right way of deployment
Right place of deployment Agriculture Smart Home
Not only the mere integration of cloud computing and sensor networks, but
EL
sensor‐cloud is more than that
Concept of virtualization of sensor node
Pay‐per‐use
One sensor node/network appears as many
PT
A stratum between sensor nodes and end‐users
N
Introduction to Internet of Things 10
Difference with WSN
Multiple applications/
WSN user users
EL
Sensor‐cloud
Aggregated data Virtualization
infrastructure
Dedicated to a
single user
PT Serves multiple
applications
N
WSN Sensor‐Cloud
Source: S. Misra; S. Chatterjee; M. S. Obaidat, "On Theoretical Modeling of Sensor Cloud: A Paradigm Shift From Wireless Sensor Network," in IEEE
Systems Journal , vol.PP, no.99, pp.1-10
EL
Ownership WSN‐user Sensor‐owner
Deployment WSN‐user Sensor‐owner
Redeployment WSN‐user SCSP
Maintenances
Overhead
Usage
PT WSN‐user
WSN‐user
WSN‐user
SCSP
SCSP
End‐user
N
Source: S. Misra; S. Chatterjee; M. S. Obaidat, "On Theoretical Modeling of Sensor Cloud: A Paradigm Shift From Wireless Sensor Network," in IEEE
Systems Journal , vol.PP, no.99, pp.1-10
End‐users
EL
Enjoy Se‐aaS through applications as per the requirements.
Unknown about what and which physical sensor is/are allocated to serve the
application
Sensor‐owner
PT
Plays a role from business perspective.
They purchase physical sensor devices, deployed over different geographical
locations, and lend these devices to the sensor‐cloud
Sensor‐Cloud Service Provider (SCSP)
N
A business actor.
SCSP charges price from the end‐users as per their usage of Se‐aaS.
EL
templates, and request for application(s)
Sensor‐owner: Deploy heterogeneous/
homogeneous physical sensor nodes over
different geographical location
PT
SCSP: Plays managerial role
N
Introduction to Internet of Things 14
Sensor-cloud: View
User Login
Xml
interpretation
specification
Interaction with
Application 1 Dynamic Scaling physical sensor
Template
EL
On‐demand physical
Data feed Template sensor scheduling
Web portal
display Vast data storage and Heterogeneous
User Browser specialized processing pool of physical
organization Interface sensors
Sensed Energy
Sensed data
Application 2
Data feed
PT
information
Template specification
management, QoS
Application
specific real‐time
data aggregation
On‐demand
sensor data
N
User organization view Real View
Source: S. Misra; S. Chatterjee; M. S. Obaidat, "On Theoretical Modeling of Sensor Cloud: A Paradigm Shift From Wireless Sensor Network," in IEEE
Systems Journal , vol.PP, no.99, pp.1-10
Operations
request Create virtual
EL
sensor instance Manage
operations
Response
Response
Data request
XML template Decode
Compatible
Data
provisioning
PT Data
aggregation
Data retrieval
sensor
scheduling,
allocation,
deallocation
Sensor
resource pool
(WSN)
Physical sensor definition,
Virtual sensor
Group definition
Client information
Metadata
Templates
N
Delete Release
virtual sensor instance Release
resource
EL
refuses to share the sensed information with an external body, even in
exchange of money. Consequently, any organization that wishes to detect
intrusion within a particular zone has to deploy its own WSN. This leads to a
long‐term investment due to costly network setup and maintenance
PT
overheads. However, in a sensor‐cloud environment, the same organization
can use the same tracking application and still get the service without actually
owning the WSN”
N
Source: S. Misra; S. Chatterjee; M. S. Obaidat, "On Theoretical Modeling of Sensor Cloud: A Paradigm Shift From Wireless Sensor Network," in IEEE
Systems Journal , vol.PP, no.99, pp.1-10
EL
Data Caching
Optimal Pricing
PT
N
Introduction to Internet of Things 2
EL
Optimal Composition of Virtual Sensor
PT
N
Source: S. Chatterjee and S. Misra, “Dynamic Optimal Composition of a Virtual Sensor for Efficient Virtualization Within Sensor‐cloud”,
IEEE ICC 2015.
EL
An optimal composition of VSs
Consider same geographic region: CoV‐I
Spanning across multiple regions: CoV‐II
PT
N
Source: S. Chatterjee and S. Misra, “Dynamic Optimal Composition of a Virtual Sensor for Efficient Virtualization Within Sensor‐cloud”,
IEEE ICC 2015.
EL
Dynamic change in sensor conditions
The composition of virtual sensors are non‐traditional
PT
N
Source: S. Chatterjee and S. Misra, “Dynamic Optimal Composition of a Virtual Sensor for Efficient Virtualization Within Sensor‐cloud”,
IEEE ICC 2015.
EL
Sensor (VS) VS
Homogeneous sensor nodes
within same geographical
boundary
PT
N
Source: S. Chatterjee and S. Misra, "Optimal composition of a virtual sensor
for efficient virtualization within sensor‐cloud," 2015 IEEE International
Conference on Communications (ICC), London, 2015, pp. 448‐453
EL
Group (VSG)
Heterogeneous physical sensor VS1 VS2 VS3
nodes across different
geographical locations
PT
N
Source: S. Chatterjee and S. Misra, "Optimal composition of a virtual sensor
for efficient virtualization within sensor‐cloud," 2015 IEEE International
Conference on Communications (ICC), London, 2015, pp. 448‐453
EL
PT
N
Source: S. Chatterjee and S. Misra, "Optimal composition of a virtual sensor for efficient virtualization within sensor‐cloud," 2015 IEEE International Conference on
Communications (ICC), London, 2015, pp. 448‐453
PT
N
Source: S. Chatterjee, S. Misra, “Dynamic and Adaptive Data Caching Mechanism for Virtualization within Sensor‐Cloud”, IEEE ANTS 2014.
EL
Ensures efficiency in resource utilization
Flexible with the varied rate of change of the physical environment
PT
N
Source: S. Chatterjee, S. Misra, “Dynamic and Adaptive Data Caching Mechanism for Virtualization within Sensor‐Cloud”, IEEE ANTS 2014.
EL
Allocation of physical sensor nodes and virtualization takes place
Physical sensor nodes continuously sense and transmit data to sensor‐cloud
PT
N
Source: S. Chatterjee, S. Misra, “Dynamic and Adaptive Data Caching Mechanism for Virtualization within Sensor‐Cloud”, IEEE ANTS 2014.
EL
significantly slow
Due to the slow change in environment, the sensed data of physical sensors
unaltered
In such a situation, unnecessary sensing causes energy consumption
PT
N
Source: S. Chatterjee, S. Misra, “Dynamic and Adaptive Data Caching Mechanism for Virtualization within Sensor‐Cloud”, IEEE ANTS 2014.
EL
Handles requests from end‐user
Takes decision whether the data should be provided directly to the end
user or is it required to re‐cache the data from external cache
External Cache (EC)
PT
After every certain interval data are required to re‐cache
Initially, few data are used to be transmitted to IC
N
Source: S. Chatterjee, S. Misra, “Dynamic and Adaptive Data Caching Mechanism for Virtualization within Sensor‐Cloud”, IEEE ANTS 2014.
Sensor‐Cloud
EL
Sensor‐Cloud IC
Resource
EC
pooling
PT
N
Existing Architecture Cache‐enabled Architecture
Source: S. Chatterjee, S. Misra, “Dynamic and Adaptive Data Caching Mechanism for Virtualization within Sensor‐Cloud”, IEEE ANTS 2014.
EL
PT
N
Source: S. Chatterjee, S. Misra, “Dynamic and Adaptive Data Caching Mechanism for Virtualization within Sensor‐Cloud”, IEEE ANTS 2014.
EL
No scheme for SeaaS.
The proposed pricing scheme comprises of two components:
Pricing attributed to hardware (pH)
Pricing attributed to Infrastructure (pI)
PT
Goal of the proposed pricing scheme:
Maximizing profit of SCSP
Maximizing profit of sensor owner
N
End users’ satisfaction
EL
Web Portal
PT Base
Station Sensor‐Cloud
EL
Optimal pricing to the end‐users
End users satisfaction
Pricing attributed to hardware (pH)
Deals with usage of physical sensor nodes
PT
Pricing attribute to infrastructure (pI)
Deals with the price associated with infrastructure of sensor‐cloud
N
Introduction to Internet of Things 19
References
Madoka Yuriyama and Takayuki Kushida , “Sensor‐Cloud Infrastructure ‐ Physical Sensor Management with
EL
Virtualized Sensors on Cloud Computing”, Research Report , IBM Research ‐ Tokyo IBM Japan, Ltd., 2010
(http://domino.research.ibm.com/library/cyberdig.nsf/papers/70E4CC6AD71F2418852577670016F2DE/$File
/RT0897.pdf)
S. Chatterjee, R. Ladia and S. Misra, "Dynamic Optimal Pricing for Heterogeneous Service‐Oriented
Architecture of Sensor‐Cloud Infrastructure," in IEEE Transactions on Services Computing, vol. 10, no. 2, pp.
203‐216, 2017
PT
S. Chatterjee and S. Misra, "Optimal composition of a virtual sensor for efficient virtualization within sensor‐
cloud," 2015 IEEE International Conference on Communications (ICC), London, 2015, pp. 448‐453
S. Misra; S. Chatterjee; M. S. Obaidat, "On Theoretical Modeling of Sensor Cloud: A Paradigm Shift From
Wireless Sensor Network," in IEEE Systems Journal , vol.PP, no.99, pp.1‐10
N
Introduction to Internet of Things 20
EL
PT
N
Introduction to Internet of Things 21
EL
Fog Computing – Part I
EL
The idea of fog computing is to extend the cloud nearer to the IoT devices.
The primary aim: solve the problems faced by cloud computing during IoT
data processing.
PT
an intermediate layer between cloud and devices.
N
Introduction to Internet of Things 2
Introduction (contd.)
EL
Cloud
Fog
PT Device
EL
90% of the world’s data were generated only during the period of last two
years.
2.5 quintillion bytes of data is generated per day.
PT
total expenditure on IoT devices will be $1.7 Trillion by 2020
N
Introduction to Internet of Things 4
Introduction (contd.)
the total number of connected vehicles worldwide will be 250 millions by
EL
2020.
there will be more than 30 billion IoT devices
The amount of data generated by IoT devices is simply huge.
PT
N
Introduction to Internet of Things 5
Why Fog Computing
The ability of the current cloud model is insufficient to handle the
EL
requirements of IoT.
Issues are:
Volume
Latency
Bandwidth PT
N
Introduction to Internet of Things 6
Why Fog Computing (contd.)
EL
Cloud
PT
for analysis
and storage
command or
action
required
Devices
N
Fig.1: Present day cloud model
EL
By 2020, about 50 billion devices will be online.
Presently billions of devices produce exabytes of data everyday.
Device density is still increasing everyday.
PT
Current cloud model is unable to process this amount of data.
N
Introduction to Internet of Things 8
Why Fog Computing (contd.)
EL
airplane companies produces Cloud
colossus amount of data
Storing data
everyday
PT
Current cloud model cannot
store all these data
Data need to be filtered
N
Private firms Factories
Airplane firms
EL
Time taken by a data packet for a round trip
An important aspect for handing a time sensitive data.
If edge devices send time sensitive data to cloud for analysis and wait
for the cloud to give a proper action, then it can lead to many
PT
unwanted results.
While handling time sensitive data, a millisecond can make a huge
differences.
N
Introduction to Internet of Things 10
Why Fog Computing (contd.)
Cloud
Sending time‐sensitive data to cloud for Analysis of
EL
data
analysis
Latency = +
+
PT
where T = Time
Latency will be increased
When the action reaches the device,
accident may have already
Sending time
sensitive data for
analysis
Appropriate
action
N
occured
EL
Bit‐rate of data during transmission
If all the data generated by IoT devices are sent to cloud for storage
and analysis, then, the traffic generated by these devices will be
simply gigantic.
PT
consumes almost all the bandwidths.
Handling this kind of traffic will be simply a very hard task.
N
Introduction to Internet of Things 12
Why Fog Computing (contd.)
EL
Billions of devices consuming bandwidth Cloud
If all the devices become online even IPv6
will not be able to provide facility to all
the devices
PT
Data may be confidential which the firms
do not want to share online
Sending data for
analysis and
storage
Appropriate
action
N
Introduction to Internet of Things 13
Requirements of IoT
Reduce latency of data:
EL
Appropriate actions at the right time prevents major accidents machine failure
etc.
A minute delay while taking a decision makes a huge difference
Latency can be reduced by analyzing the data close to the data source
PT
N
Introduction to Internet of Things 14
Requirements of IoT (contd.)
Data security:
EL
IoT data must be secured and protected from the intruders.
Data are required to be monitored 24x7
An appropriate action should be taken before the attack causes major
PT
harm to the network
N
Introduction to Internet of Things 15
Requirements of IoT (contd.)
Operation reliability:
EL
The data generated from IoT devices are used to solve real time
problem
Integrity and availability of the data must be guaranteed
PT
Unavailability and tampering of data can be hazardous
N
Introduction to Internet of Things 16
Requirements of IoT (contd.)
Processing of data at respective suitable place:
EL
Data can be divided into three types based on sensitivity
time sensitive data
less time sensitive data
PT
data which are not time sensitive
Extremely time sensitive data should be analyzed very near to the data
source
Data which are not time sensitive will be analyzed in the cloud.
N
Introduction to Internet of Things 17
Requirements of IoT (contd.)
Monitor data across large geographical area:
EL
The location of connected IoT devices can be spread across a large
geographical region
E.g. monitoring the railway track of a country or a state
PT
the devices are exposed to the harsh environments condition
N
Introduction to Internet of Things 18
When should we use fog
If the data should ne analyze with fraction of second
EL
If there are huge number of devices
If the devices are separated by a large geographical distance
If the devices are needed to be subjected to extreme conditions
PT
N
Introduction to Internet of Things 19
EL
PT
N
Introduction to Internet of Things 20
EL
Fog Computing – Part II
EL
Fog is a layer between cloud and IoT devices
many fog nodes can be present
Sensor data are processed in the fog before it is sent to the cloud
PT
Reduces latency, save bandwidth and save the storage of the cloud
N
Introduction to Internet of Things 2
Architecture of Fog (contd.)
EL
PT
N
Introduction to Internet of Things 3
Fog nodes
Characteristics for a fog node:
EL
Storage ‐ To give transient storage
Computing facility
‐ To process the data before it is sent to cloud
PT
‐ To take quick decisions
Network connectivity ‐ To connect with IoT devices, other fog nodes
and cloud
N
Introduction to Internet of Things 4
Fog nodes (contd.)
E.g. ‐ routers, embedded servers, switches, video surveillance cameras,
EL
etc.
deployable anywhere inside the network.
Each fog nodes have their aggregate fog node.
PT
N
Introduction to Internet of Things 5
Working of Fog
Three types of data
EL
Very time‐sensitive data
Less time‐sensitive data
Data which are not time‐sensitive
PT
Fog nodes works according to the type of data they receive.
An IoT application should be installed to each fog nodes
N
Introduction to Internet of Things 6
Working of Fog (contd.)
Sends the summary for historical analysis and storage
EL
Cloud
Sends the summary for
historical analysis and
Non‐time‐sensitive
storage
data
Nearest Sends the summary for
Ingest data
PT
Fog Node
If time‐sensitive
data then take
immediate action
Less time‐sensitive
data
historical analysis and
storage
Aggregate fog
node
N
Devices
Action
Fig : Working of fog
EL
Most time‐sensitive data
Data which should be analyzed within fraction of a second
Analyze at the nearest node itself
PT
Sends the decision or action to the devices
Sends and stores the summary to cloud for future analysis
N
Introduction to Internet of Things 8
Working of Fog (contd.)
Less time‐sensitive data
EL
Data which can be analyzed after seconds or minutes
Are sent to the aggregate node for analysis
After analysis, the aggregate node send the decision or action to the
PT
device through the nearest node
The aggregate node sends the summary to cloud for storage and
future analysis.
N
Introduction to Internet of Things 9
Working of Fog (contd.)
Non‐time‐sensitive data
EL
Data which can be wait for hours, days, weeks
Sent to cloud for storage and future analysis.
Those summaries from fog nodes can be considered as less time
sensitive data.
PT
N
Introduction to Internet of Things 10
Working of Fog (contd.)
EL
Fog node closest to Fog aggregate nodes Cloud
devices
Very local
Hour, days
Wider
Months to years
Global
N
coverage
EL
Provides better security
Fog nodes can use the same security policy
Low operation cost
PT
Data are processed in the fog nodes before sending to cloud
Reduces the bandwidth consumption
N
Introduction to Internet of Things 12
Advantages of Fog (contd.)
Reduces unwanted accidents
EL
Latency will be reduce during decision making
Quick decision making
Better privacy
PT
Every industry can analyze their data locally
Store confidential data in their local servers
Send only those data which can be shared to the cloud
N
Introduction to Internet of Things 13
Advantages of Fog (contd.)
Business agility
EL
Fog application can be easily developed according to tools available
Can be deployed anywhere we need
Can be programed according to the customer’s need
Support mobility
PT
Nodes can be mobile
Nodes can join and leave the network anytime
N
Introduction to Internet of Things 14
Advantages of Fog (contd.)
Deployable in remote places
EL
Can be deployed in remote places
Can be subjected to harsh environmental conditions
Under sea, railway tracks, vehicles, factory floor etc
PT
Better data handling
Can operate with less bandwidth
Data can be analyzed locally
N
Reduce the risk of latency
EL
Patients with chronic illness can be monitored in real time
Stroke patients
Analyze the data real time
PT
During emergency, alerts the respective doctors immediately
Historical data analysis can predict future dangers of the patient
N
Introduction to Internet of Things 16
Applications of Fog (contd.)
Intelligence power efficient system
EL
Power efficient
Reports detail power consumption report everyday
Suggest economical power usage plan
PT
N
Introduction to Internet of Things 17
Applications of Fog (contd.)
Real time rail monitoring
EL
Fog nodes can be deployed to railway tracks
Real time monitoring of the track conditions
For high speed train, sending the data in cloud for analysis is inefficient
PT
Fog nodes provide fast data analysis
Improve safety and reliability
N
Introduction to Internet of Things 18
Applications of Fog (contd.)
Pipeline optimization
EL
Gas and oils are transported through pipelines
Real time monitoring of pressure, flow, compressor is necessary
Terabytes of data are created
PT
Sending all this data to cloud for analysis and storage is not efficient
Network latency is not acceptable
Fog is a solution
N
Introduction to Internet of Things 19
Applications of Fog (contd.)
Real time wind mill and turbine analysis
EL
Wind direction and speed analysis can increase output
Data can be monitored real time
PT
N
Introduction to Internet of Things 20
Challenges
Power consumption
EL
Fog use addition nodes
Power consumption is higher than centralized cloud
Data Security
Data generating nodes are distributed
EL
Failure of a node should be immediately fixed
Individual failure should not affect the whole scenario
Real time analysis
PT
Real time analysis is a primary requirement for minimizing latency
Dynamic analysis and decision making reduces danger and increase output
Monitor huge number of nodes is not easy
N
Introduction to Internet of Things 22
Challenges (contd.)
Programming architecture
EL
Fog nodes may be mobile
Nodes can connect and leave the network when necessary
Many data processing frameworks are statically configured
PT
These frameworks cannot provide proper scalability and flexibility
N
Introduction to Internet of Things 23
Conclusion
Fog is a perfect partner for cloud and IoT
EL
Solves the primary problems faced by cloud while handling IoT data
Benefits extends from an individual person to huge firms
Provides real time analysis and monitoring
PT
N
Introduction to Internet of Things 24
References
Amir Vahid Dastjerdi, Rajkumar Buyya, Fog Computing: Helping the Internet of Things
EL
realize its potential, IEEE Fog computing, August 2016
CISCO white paper, Fog Computing and the Internet of Things: Extend the Cloud to
Where the Things Are, 2015
R System white paper, Fog Computing for Big Data analytics, October 2016
Redowan Mahmud,Rajkumar Buyya, Fog Computing: A Taxonomy, Survey and future
PT
Directions,Cornell University Library, November 2016
http://www.businessinsider.in/THE‐INTERNET‐OF‐EVERYTHING‐2015‐SLIDE‐
DECK/articleshow/45695215.cms
http://www.gartner.com/newsroom/id/2970017
https://www.uschamberfoundation.org/bhq/big‐data‐and‐what‐it‐means
N
https://www.afcea.org/content/?q=node/12239
Smart Homes
Health monitoring.
Conservation of resources (e.g. electricity, water, fuel).
Security and safety.
Smart Parking Lots
Auto routing of vehicles to empty slots.
Auto charging for services provided.
Detection of vacant slots in the parking lot.
Smart Agriculture
Automatic detection of plant water stress.
Monitoring of crop health status.
Auto detection of crop infection.
Auto application of fertilizers and pesticides.
Scheduling harvesting and arranging proper transfer of harvests to
warehouses or markets.
Reliability
Unreliable communication due to vehicle mobility.
Device failures still significant
Large scale
Delay due to large scale deployments.
Delay due to mobility of deployed nodes.
Distribution of devices can affect monitoring tasks.
Source: Arasteh, H., et al. "Iot-based smart cities: A survey." IEEE 16th International Conference on Environment and Electrical
Engineering (EEEIC), 2016.
Sensor Networks
Choice of appropriate sensors for individual sensing tasks is crucial.
Energy planning is crucial.
Device placement and network architecture is important for reliable
end-to-end IoT implementation.
Communication medium and means play an important role in
seamless function of IoT in smart cities.
Source: Arasteh, H., et al. "Iot-based smart cities: A survey." IEEE 16th International Conference on Environment and Electrical
Engineering (EEEIC), 2016.
Conflicts Same sensor type reports different data for the same location.
Alignment Arises when sensor data frames are converted to a singular frame prior to
transmission
Trivial features Processing of trivial data features may bring down the accuracy of the whole
system
Source: Alam, Furqan, et al. "Data Fusion and IoT for Smart Ubiquitous Environments: A Survey." IEEE Access (2017).
Source: Alam, Furqan, et al. "Data Fusion and IoT for Smart Ubiquitous Environments: A Survey." IEEE Access (2017).
AI based
Source: Alam, Furqan, et al. "Data Fusion and IoT for Smart Ubiquitous Environments: A Survey." IEEE Access (2017).
Information Collection
System Deployment
Service Dissemination
Source: Lin, Trista, Hervé Rivano, and Frédéric Le Mouël. "A Survey of Smart Parking Solutions." IEEE Transactions on Intelligent Transportation
Systems (2017).
Sensors
Parking Meters
Sensor Networks
Crowd sensing
Source: Lin, Trista, Hervé Rivano, and Frédéric Le Mouël. "A Survey of Smart Parking Solutions." IEEE Transactions on Intelligent Transportation
Systems (2017).
Information Management
E-parking
Guidance
Data Analytics
Source: Lin, Trista, Hervé Rivano, and Frédéric Le Mouël. "A Survey of Smart Parking Solutions." IEEE Transactions on Intelligent Transportation
Systems (2017).
Strategies
Infrastructure-based information
Infrastructure-free information
Parking Choice
Vehicular Activities
Source: Lin, Trista, Hervé Rivano, and Frédéric Le Mouël. "A Survey of Smart Parking Solutions." IEEE Transactions on Intelligent Transportation
Systems (2017).
Source: Ejaz, Waleed, et al. "Efficient Energy Management for Internet of Things in Smart Cities.“ IEEE Communications Magazine, 2017
Source: Ejaz, Waleed, et al. "Efficient Energy Management for Internet of Things in Smart Cities.“ IEEE Communications Magazine, 2017
Source: Ejaz, Waleed, et al. "Efficient Energy Management for Internet of Things in Smart Cities.“ IEEE Communications Magazine, 2017
Source: Toschi, Guilherme Mussi, Leonardo Barreto Campos, and Carlos Eduardo Cugnasca. "Home automation networks: A survey." Computer
Standards & Interfaces 50 (2017): 42-54.
Wireless HAN
Can use popular home Wi-Fi,
ZigBee, and even new
standards, such as 6LoWPAN.
Wireless makes
implementation easy.
Wireless HAN
Source: Toschi, Guilherme Mussi, Leonardo Barreto Campos, and Carlos Eduardo Cugnasca. "Home automation networks: A survey." Computer
Standards & Interfaces 50 (2017): 42-54.
Source: Toschi, Guilherme Mussi, Leonardo Barreto Campos, and Carlos Eduardo Cugnasca. "Home automation networks: A survey." Computer
Standards & Interfaces 50 (2017): 42-54.
Security
Privacy
Scalability
Reliability
Quality of service
Lack of global standards
Source: Kim, Younsun, Hyunggoy Oh, and Sungho Kang. "Proof of Concept of Home IoT Connected Vehicles." Sensors 17.6 (2017): 1289.
Source: Kim, Younsun, Hyunggoy Oh, and Sungho Kang. "Proof of Concept of Home IoT Connected Vehicles." Sensors 17.6 (2017): 1289.
Efficiency
• Congestion management, electronic toll collection, parking availability
Commercial
• Internet access, multimedia stream
Comfort
• Weather information, autonomous driving, journey time estimation
Source: Zhu, Z., et al. "Recent advances in connected vehicles via information-centric networking." Intelligent and Connected Vehicles (ICV 2016),
IET International Conference on. IET, 2016.
Counter
Close Pneumatic Transformer
clockwise
Source: J. Wang, D. Yang and X. Lian, "Research on electrical/electronic architecture for connected vehicles," IET International Conference on
Intelligent and Connected Vehicles (ICV 2016), Chongqing, 2016, pp. 1-6
For
communication
Intelligent
Transportation
Transport
Infrastructure
ICV Pedestrian
Communication
Channel
Source: Li, Yan, et al. "Big wave of the intelligent connected vehicles." China Communications 13.Supplement2 (2016): 27-41.
Phase-2
• Intelligent transportation service
• Based on 4G LTE or DSRC
Phase-3
• Vehicles connected to the cloud
Source: Li, Yan, et al. "Big wave of the intelligent connected vehicles." China Communications 13.Supplement2 (2016): 27-41.
Source: Li, Yan, et al. "Big wave of the intelligent connected vehicles." China Communications 13.Supplement2 (2016): 27-41.
Source: Li, Yan, et al. "Big wave of the intelligent connected vehicles." China Communications 13.Supplement2 (2016): 27-41.
Domains Ad-hoc
Infrastructure
Source: Pressas, Andreas, et al. "Connected vehicles in smart cities: interworking from inside vehicles to outside." Sensing, Communication, and
Networking (SECON), 2016 13th Annual IEEE International Conference on. IEEE, 2016.
Source: Pressas, Andreas, et al. "Connected vehicles in smart cities: interworking from inside vehicles to outside." Sensing, Communication, and
Networking (SECON), 2016 13th Annual IEEE International Conference on. IEEE, 2016.
Source: Pressas, Andreas, et al. "Connected vehicles in smart cities: interworking from inside vehicles to outside." Sensing, Communication, and
Networking (SECON), 2016 13th Annual IEEE International Conference on. IEEE, 2016.
EL
Energy generation is done in centralized power plants
Energy distribution is one directional – from the power plant to the homes or industries.
Monitoring and restoration of grid is done manually
Smart Grid – PT
Uni‐directional communication
EL
Smart grid is also named as –
Electricity with a brain
The energy internet
The electronet
PT
According to the definition given by NIST, smart grid is – “a modernized grid that
enables bidirectional flows of energy and uses two‐way communication and control
capabilities that will lead to an array of new functionalities and applications.”
N
Source: https://www.nist.gov/engineering‐laboratory/smart‐grid/about‐smart‐grid/smart‐grid‐beginners‐guide
EL
Quicker restoration of electricity after power disturbances
Reduced operations and management costs for utilities, and ultimately lower power
costs for consumers
Reduced peak demand, which will also help lower electricity rates
PT
Increased integration of large‐scale renewable energy systems
Better integration of customer‐owner power generation systems, including renewable
energy systems
Improved security
N
Using smart grid, both the consumers and the energy service providers or
stakeholders get benefited.
EL
Enabling electric cars, smart appliances, and other smart devices to be
charged
Program the smart devices to run during off‐peak hours to lower energy bills
Different pricing options
PT
N
EL
Reduce the frequency of power blackouts and brownouts
Provide infrastructure for monitoring, analysis, and decision‐making
Increase grid resiliency by providing detailed information
PT
Reduce inefficiencies in energy delivery
Integrate the sustainable resources of wind and solar alongside the main grid
Improve management of distributed energy resources, including micro‐grid
operations and storage management.
N
EL
Control of smart appliances
Building Automation
Real‐time Pricing
Distributed Generation
PT
Integration of renewable energy resources
Integration of micro‐grid
N
EL
Asset Management and optimal utilizations
Distribution Automation and Protection
Power Quality
Self‐Healing PT
Frequency Monitoring and Control
Load Forecasting
N
Anticipation of Disturbances
EL
PT
N
Fig 1: Basic architecture of smart grid [D. Niyato and P. Wang, IEEE CM, 2012]
EL
PT
N
Source: NIST Framework and Roadmap for Smart Grid Interoperability Standards, Release 3.0
EL
Smart Home Renewable Energy Consumer Engagement
PT
N
Operation Center Distribution Intelligence Plug‐in Electric Vehicle
Source: https://www.smartgrid.gov/the_smart_grid/
EL
electric grid
PT
consumers helps in proper functioning of smart grid technologies
EL
Smart appliances
Home power generation
PT
N
EL
provider
Operate digitally
Allow for automated and complex transfers of information between consumer‐end
and the energy service provider
PT
Help to reduce the energy costs of the consumers
Provides information about usage of electricity in different service areas to the
energy service providers
N
EL
Allows consumers to monitor real‐time information and price signals from the
energy service provider
Allows to create settings to automatically use power when prices are lowest
Avoids peak demand rates
Prevents blackouts
PT
Helps to balance the energy load in different area
In return, the service provider also may choose to provide financial incentives
N
EL
Response to signals from the energy service provider to avoid using energy
during times of peak demand
Include consumer controls to override the automated controls
By overriding, the consumer can consume energy as per their requirement,
PT
while paying minimum is not ensured
N
EL
Rooftop solar electric systems
Small wind turbines
Small hydropower System
PT
Home fuel cell systems – produce heat and power from natural gas
Surplus energy generated by the home power generation systems can be fed
back into the grid
In case of “Islanding”, a home can have power from distributed resources, i.e.,
N
home power generation systems
EL
In its various forms, it derives directly from the sun, or from heat generated deep
within the earth. Included in the definition is electricity and heat generated from
solar, wind, ocean, hydropower, biomass, geothermal resources, and biofuels and
hydrogen derived from renewable resources.”
PT
Reduced environmental pollution
Consumers capable of generating energy from renewable energy resources are
less dependent on the micro‐grid or main grid
N
In addition to that, they can supply surplus amount of energy from the
renewable resources and can make profit out of it
EL
Pay less for consuming energy in off‐peak hours
Energy service provider gives incentives based on the energy consumption of the
PT
consumer and they can save money
EL
load is less
Throughout the day, the energy load on the grids are dynamic
In on‐peak hours, if the requested amount of energy is higher, it leads to –
Less‐efficient energy distribution
requirement PT
More pollution – it depends on the non‐renewable energy resource to meet the peak
Home energy management system tries to schedule the smart appliances in off‐
N
peak hours
To ensure efficient service
To pay less
EL
Consumers are paid high, if they are supplying excess amount of generated energy
to the grid in on‐peak hours
The price is less in case of off‐peak hours
PT
Final bills to be paid by the consumers depends on
The in‐flow of energy (from the grid to the consumers‐end)
The out‐flow of energy (from the consumers‐end to the grid)
N
The consumer may get incentives from the energy service provider at the end of
the year based on the net metering value
EL
participation
Incentives for shifting operation of appliances to the off‐peak hours
Incentives for using stored energy at the battery installed at the consumers‐end or
PT
at the plug‐in hybrid electric vehicles (PHEVs)
Smart grid enables consumers engagement to a large extend
Consumers get financial incentives by different means from the energy service
providers
N
Energy service providers maintain efficient and load balancing energy
distribution
EL
The grid is unstable, if the grid voltage drops due to excess energy generation
Limited control capabilities
No means to detect oscillation which leads to blackout
Smart grid PT
Limited information about the energy flow through the grid
EL
PMU samples voltage and current with a fixed sample rate at the installed
location
It provides a snapshot of the active power system at that location
By increasing the sampling rate, PMU provides the dynamic scenario of the
PT
energy distribution system
PMU helps to identify the possibility of blackout in advance
Multiple PMUs form a phasor network
N
Collected information by the phasor network is analyzed at centralized system,
i.e., Supervisory Control And Data Acquisition (SCADA) system
EL
Avoid unwanted flows of current through the grid
Reroute power flows in order to avoid overloading in a transmission line
This is part of distribution intelligence
Demand side energy distribution
PT
Energy supply is done based on the requirement of the consumers
The consumers pay according the consumed energy and price decide by the energy
service provider at that time
N
In smart grid, the energy distributors can form coalition and serve the energy
requirement in a specific geographic location
EL
Identify the source of a power outage
Ensure power flow automatically by combining automated switching
Optimize the balance between real and reactive power
Reactive power:
PT
Devices that store and release energy
Cause increased electrical currents without consuming real power
Intelligent distribution System
N
Maintains the proper level of reactive power in the System
Protect and control the feeder lines
EL
Using PEVs –
Reduce dependency on oil
No pollution when running on electricity
PEVs rely on power plants to charge their batteries
off‐peak hours
PT
Energy service provider encourages the consumers to charge batteries of PEVs in
EL
PT
N
Fig 2: Smart Grid Communication[D. Niyato and P. Wang, IEEE CM, 2012]
EL
Smart Meters
Gateways
Data Aggregator Units (DAUs)
Meter Data Management Systems (MDMSs)
PT
Different networks associated with smart grid communication
Home Area Networks (HANs)
Neighborhood Area Networks (NANs)
Wide Area Networks (WANs)
N
IP Networks
Sensors and Actuators Networks (SANETs)
8
Smart Grid Communication (Contd.)
For Smart Home Appliances, the available protocol are as follows:
C‐Bus:
Data Rate: 3500 bits/sec
EL
Able to handle cable lengths upto 1000 m
DECT
Data rate: 64000 bits/sec
EnOcean
PT
Operates in 1880 – 1930 MHz
EL
Zigbee
Data Rate: 20‐250 Kbits/sec
Operates in 2.4 GHz band
PT
IEEE 802.15.4 protocol
Communication range ~100 m
Simplified Cable Solution (SCS)
Data rate: 9.6 Kbits/sec
N
Works on twisted pair
Developed based on OpenWebNet
EL
Gateways communicate mostly based on WiFi, i.e., IEEE 802.11
Gateways helps in two‐way communication
Smart meters
gateways
PT
Forward the energy consumption information fro the home appliances to the
Forward the billing amount and the control information from the gateways to the
home appliances
N
Gateway acts as link between the smart meters and the data aggregator units
(DAUs)
EL
area
Forward the energy consumption information to the centralized coordinator –
meter data management system (MDMS)
Maintains a buffer to queue the energy consumption information of the
consumers
PT
N
EL
Handled by the energy service providers
Part of operation center
Decide the price per unit energy to be paid by the consumers
PT
N
EL
Integrity – credibility of the data collected and transferred over the grid
Availability – accessibility to every grid component as well as to the information
transmitted and collected
PT
Dynamic system attacks – based on the previous information same type of request
can be replicated by the attacker
Physical threats – physical attack to the smart grid components
Coordinated attacks – cascading failure of systems in smart grid
N
EL
Manipulation of exchanged data such as sensor readings, feedback control signals, and
electricity price signals
Performed by compromising the hardware components (as in the case of Stuxnet), or
intercepting the communication links
System Damage PT
An attacker can manipulate system measurements so that a congested transmission line
falsely seems to not have reached its thermal transmission limit
N
Induce large fluctuations in system dynamics that can lead to tripping additional lines,
disconnecting generators, load shedding, or even a system blackout
EL
Manipulating the electricity prices
Doing this one can buy energy with lesser price from a service provider and make high
profit
Time synchronization attacks
PT
An adversary can manipulate the time reference of the time stamped measured phasors to
create a false visualization of the actual system conditions thus yielding inaccurate control
and protection actions
Attacks that target PMU time synchronization are known as time synchronization attacks
N
(TSAs)
EL
transmitted and collected, whenever needed
Attacks compromising this availability are known as denial of service (DoS) attacks
Block key signals to compromise the stability of the grid and observability of its states
PT
Manipulating generation‐load balance
N
EL
Injects input data in the system without causing changes to the measurable outputs
In RAs –
Compromises sensors, monitors their outputs
Learns the outputs and repeats them while injecting its attack signal
PT
Dynamic data injection attacks (D‐DIA)
Uses knowledge of the grid’s dynamic model to inject data that causes unobservability of
unstable poles
Can lead to a system collapse
N
Covert attack
Closed loop version of replay attacks
EL
prominent
Physical manipulation of smart meters for energy theft purposes
Coordinated Attacks
PT
Power system typically incorporates robustness measures
An attack leading to the failure of one or few components
Exploit the dense interconnections between grid components to launch
N
simultaneous attacks of different types targeting various components
EL
Energy management
Information management
Security
PT
S. Bera, S. Misra, and J. J. P. C. Rodrigues, “Cloud Computing Applications for
Smart Grid: A Survey,” IEEE Transactions on Parallel and Distributed Systems, vol.
N
26, no. 5, pp. 1477–1494, May 2015.
EL
Cloud‐Based Demand Response for fast response times in large scale deployment
Two cloud‐based demand response models are proposed as follows:
Data‐centric communication and
PT
Topic‐based group communication
With the integration of cloud, requests from customers are scheduled which are
to be executed depending on the available resources, priority, and other
applicable constraints
N
Incoming jobs from users are scheduled according to their priority, available
resources, and applicable constraints
EL
The number of supported customers increases
PT
multiple smart meters simultaneously can be done, in order to balance the real‐
time demand and supply curves
Real‐time energy usage and pricing information can be shared
N
Mobile agent can be used to monitor power system using cloud computing
platform due to the smart grid’s heterogeneous architecture
EL
available for cloud applications
Information from different components, and
the supply and demand state conditions can
PT
be shared with the help of cloud computing
Real‐time distributed data management and
parallel processing of information can be
utilized using smart grid data cloud
N
application
EL
Dynamic pricing mechanism in smart grid is feasible with the use of cloud
application
Cloud computing services are used as a dynamic data centers to store the real‐
PT
time information from the smart meters
Use of multi‐mobile agent combined with cloud computing for profitable smart
grid operation
N
Interactive cooperation using cloud services to support multiple customers and
multiple energy sources for large‐scale development of smart grid for energy
management
EL
based on cloud security
Private cloud platforms are suitable for
scaling out and processing millions of data
from users
PT
Using the cloud computing platform, the
electrical utilities can quickly and
effectively deal with malicious software
N
EL
Servers act as cloud and take decision according to the clients’ data
Privacy issue in smart grid
Quickly and effectively deal with malicious software with the implementation of
cloud computing applications
application PT
Data storage security for distributed verification in smart grid using cloud
Real‐time data can be analyzed and estimated using cloud in smart grid
N
Cloud‐based information privacy scheme can be used for smart grid data privacy
EL
S. Misra, P. V. Krishna, V. Saritha, and M. S. Obaidat, “Learning Automata as a Utility for Power Management in Smart Grids,”
IEEE Communications Magazine, vol. 51, no. 1, pp. 98–104, 2013.
V. Bakker, M. G. C. Bosman, A. Molderink, J. L. Hurink, and G. J. M. Smit, “Demand Side Load Management Using a Three Step
Optimization Methodology,” in Proceedings of the 1st IEEE International Conference on Smart Grid Communications,
Gaithersburg, Oct 2010, pp. 431–436.
PT
S. Misra, S. Bera, and T. Ojha, “D2P: Distributed Dynamic Pricing Policy in Smart Grid for PHEVs Management,” IEEE
Transactions on Parallel and Distributed Systems, vol. 26, no. 3, pp. 702–712, Mar 2015.
S. Bera, S. Misra, and J. J. P. C. Rodrigues, “Cloud Computing Applications for Smart Grid: A Survey,” IEEE Transactions on
Parallel and Distributed Systems, vol. 26, no. 5, pp. 1477–1494, May 2015.
S. Misra, A. Mondal, S. Banik, M. Khatua, S. Bera, and M. S. Obaidat, “Residential Energy Management in Smart Grid: A
Markov Decision Process‐Based Approach,” in IEEE International Conference on Internet of Things, Beijing, Chaina, Aug 2013,
N
pp. 1152–1157.
A. Mondal and S. Misra, “Game‐Theoretic Green Electric Vehicle Energy Networks Management in Smart Grid,” in IEEE
International Conference on Advanced Networks and Telecommunications Systems,Dec 2015, pp. 1–6.
EL
in Smart Grids,” in the 72nd IEEE Vehicular Technology Conference Fall, Ottawa, ON, Sept 2010, pp. 1 – 5.
A. Mondal and S. Misra, “Dynamic Coalition Formation in a Smart Grid: A Game Theoretic Approach,” in Proceedings of IEEE
International Workshop on Smart Communication Protocols and Algorithms in conjunction with IEEE ICC, Budapest, Hungary,
Jun 2013, pp. 1067 – 1071.
F. Farzan, F. Farzan, M. A. Jafari, and J. Gong, “Integration of Demand Dynamics and Investment Decisions on Distributed
PT
Energy Resources,” IEEE Transactions on Smart Grid, vol. 7, no. 4, pp. 1886–1895, Jul 2016.
A. Mondal and S. Misra, “Game‐Theoretic Energy Trading Network Topology Control for Electric Vehicles in Mobile Smart
Grid,” IET Networks, vol. 4, no. 4, pp. 220–228, 2015.
F. Kamyab, M. Amini, S. Sheykhha, M. Hasanpour, and M. M. Jalali, “Demand Response Program in Smart Grid Using Supply
Function Bidding Mechanism,” IEEE Transactions on Smart Grid, vol. 7, no. 3, pp. 1277–1284, May 2016.
A. Sanjab, W. Saad, I. Guvenc, A. Sarwat, and S. Biswas, "Smart Grid Security: Threats, Challenges, and Solutions," arXiv
N
preprint arXiv:1606.06992 (2016).
A. Mondal and S. Misra, “Dynamic Data Aggregator Unit Selection in Smart Grid: An Evolutionary Game Theoretic Approach,”
in IEEE India Conference, Dec 2014, pp. 1–6.
EL
6th International Conference on Cloud Computing Technology and Science (CloudCom), Dec 2014, pp. 54–61.
A. Mondal, S. Misra, and M. S. Obaidat, “Distributed Home Energy Management System With Storage in Smart Grid Using
Game Theory,” IEEE Systems Journal, pp. 1–10, 2015.
C. P. Mediwaththe, E. R. Stephens, D. B. Smith, and A. Mahanti, “A Dynamic Game for Electricity Load Management in
Neighborhood Area Networks,” IEEE Transactions on Smart Grid, vol. 7, no. 3, pp. 1329–1336, May 2016.
PT
X. Liang, X. Li, R. Lu, X. Lin, and X. Shen, “UDP: Usage‐Based Dynamic Pricing With Privacy Preservation for Smart Grid,” IEEE
Transactions on Smart Grid, vol. 4, no. 1, pp. 141–150, Mar 2013.
S. Shivshankar and A. Jamalipour, “An Evolutionary Game Theory‐Based Approach to Cooperation in VANETs Under Different
Network Conditions,” IEEE Transactions on Vehicular Technology, vol. 64, no. 5, pp. 2015–2022, May 2015.
P. Samadi, H. Mohsenian‐Rad, R. Schober, and V. W. S. Wong, “Advanced Demand Side Management for the Future Smart
N
Grid UsingMechanism Design,” IEEE Transactions on Smart Grid, vol. 3, no. 3, pp. 1170–1180, Sept 2012.
EL
reality with many industries implementing IoT solutions.”
‐ Paul Howarth, Senior Manager, Corporate Development, CISCO
PT
N
Source : http://www.mcrockcapital.com
EL
to globally connect smart ‘things’ or ‘objects’ .
objects are uniquely identified.
interoperability among the objects.
PT
The Industrial Internet of Things (IIoT) is an application of IoT in industries
to modify the various existing industrial systems. IIoT links the automation
system with enterprise, planning and product lifecycle.
N
Introduction to Internet of Things 3
Introduction (contd.)
EL
‐ Automation and data
exchange in manufacturing
technologies
Internet of IIoT ‐ Cyber‐physical systems, the
Industry 4.0 Internet of things and cloud
Things
PT computing
‐ Smart factory
N
Fig 1(a) : IIoT as an intersection of industries and IoT
Consumer IoT
EL
Industrial
Internet of
Things Internet
Internet of IIoT Industries of Things
Things 4.0
PT
N
Fig 1(a) : IIoT as an intersection of industries and IoT Fig 1(b) : IIoT ≠ IoT
EL
machine learning
big data technology
machine ‐ to ‐ machine interaction (M‐2‐M)
automation.
PT
IIoT is supported by huge amount of data collected from sensors. It is
based on “wrap & re‐use” approach, rather than “rip & replace” approach.
N
(Source : http://www.mhi.org)
EL
1st Industrial Revolution : Mechanized
production Smart
2nd Industrial Revolution : Mass Electronic
Automation
(today)
production
PT
3rd Industrial Revolution : Internet
evolution and automation
4th Industrial Revolution : IIoT
(1870)
Power Generation
& Mechanical
Automation (1782)
Automation
Industrialization (1969)
N
Fig 2: Industry 4.0
Source: http://www.industry40wood.com
EL
Cloud
computing
Source: https://www.artika.info
PT
Source: http://www.rehm‐group.com
EL
physical objects
systems
platforms
applications
EL
Hardware
and Cloud
Software platform
connectivity
PT Big Data
analytics
Application
Development
N
Introduction to Internet of Things 10
IIoT Requirements (contd.)
Access
EL
(anything,
anytime,
anywhere)
Cloud for
End‐to‐end
efficiency
security
and agility
PT Big data
Industrial
Internet
of Things User
experience
N
Transition
Asset
management to smart
machines
EL
Physical Plant
Sensor
readings
Machine
PT Virtual Plant
N
instructions
EL
objectives are to be considered –
Energy : Time for which the IoT device can operate with limited power
supply.
PT
Latency : Time required to transmit the data.
Throughput : Maximum data transmitted across the network.
Scalability : Number of devices supported.
N
Topology: Communication among the devices, i.e. interoperability.
Safety and Security: Degree of safety and security of the application.
EL
PT
N
Introduction to Internet of Things 14
Difference between IoT and IIoT
The main differences between IoT and IIoT are :
EL
IoT IIoT
• Focused on convenience • Focused on efficiency,
of individuals safety and security of
PT
• M‐2‐M communication:
Limited
• Applications areas are
at consumer‐level
the operation.
• M‐2‐M communication:
Extensively.
• Application areas are at
N
industries.
EL
Devices
PT
Network
(connectivity)
M‐2‐M focus
Service
enablement
Application and
data
System
integration
N
IoT focus
EL
the quality of services which meets the end‐users demand”
“Service is a collection of data and associated behaviors to accomplish a
particular function or feature of a device or portions of a device”.
PT
N
Source: Ning Lu, Nan Cheng, Ning Zhang, Xuemin Shen, Jon W. Mark, Connected Vehicles : Solutions and Challenges, IEEE
Internet of Things Journal, Vol. 1, No. 4, August 2014.
EL
Primary service ‐ The basic services which are responsible for the
primary node functions are termed as primary service.
Secondary service ‐ The auxiliary functions which provide services to
PT
the primary service or secondary services are termed as secondary
service.
N
Introduction to Internet of Things 18
EL
PT
N
Introduction to Internet of Things 19
EL
IIoT: Industrial Internet of Things – Part II
EL
Manufacturing industry
Healthcare Service industry
Transportation & logistics
Mining
Firefighting PT
N
Introduction to Internet of Things 2
Manufacturing Industry
The devices, equipment, workforce, supply chain, work platform are
EL
integrated and connected to achieve smart production. This will led to –
reduction in operational costs
improvement in the productivity of the worker
PT
reduction in the injuries at the workplace
resource optimization and waste reduction
end‐to‐end automation.
N
Introduction to Internet of Things 3
Healthcare Service Industry
Patients can be continuously monitored due to the implanted on‐body
EL
sensors. This has led to –
improved treatment outcome
costs has reduced
PT
improved disease detection
improved accuracy in the collection of data
improved drugs management.
N
Introduction to Internet of Things 4
Transportation & logistics
To improve safety, efficiency of transportation, Intelligent Transportation
EL
system (ITS) is developed which consists of connected vehicles. ITS
provides –
Vehicle – to – sensor connectivity
Vehicle – to – vehicle connectivity
PT
Vehicle – to – internet connectivity
Vehicle – to – road infrastructure
Dedicated short‐range communications (DSRC) is the key enabling
N
technology for V2V and V2R communications.
EL
bar codes
RFID tags
hence, real‐time monitoring of the status and location of the physical
PT
objects from destination to the origin, across the supply chain is possible.
Security and privacy of the data should be maintained.
N
Introduction to Internet of Things 6
Mining
To prevent accidents inside the mines ‐ RFID, Wi‐Fi and other wireless
EL
technologies are used, which
provides early warning of any disaster
monitors air‐quality
PT
detects the presence of poisonous gases inside the mines
oxygen level inside the mines.
N
Introduction to Internet of Things 7
Firefighting
Sensor networks, RFID tags are used to perform
EL
automatic diagnosis
early warning of disaster
emergency rescue
PT
provides real‐time monitoring
Hence, improves public security.
N
Introduction to Internet of Things 8
Examples of IIoT
Examples of IIoT are ‐
EL
unmanned aerial vehicles (UAVs) to inspect oil pipelines.
monitoring food safety using sensors.
minimizing workers’ exposure to noise, chemicals and other hazardous
gases.
PT
unmanned marine vehicle which can collect data up to a year without
fuel or crew.
N
Introduction to Internet of Things 9
Connected Ecosystems in IIoT scenario
Traditional supply chains in industries are linear in nature.
EL
To shift the business focus from products to outcomes, new ecosystem
should be followed.
Digital ecosystems progress at a much faster rate than physical industries.
PT
Hence, it can quickly adapt to the changes in the external environments.
N
Introduction to Internet of Things 10
Integration of Digital and Human Workforce
In IIoT, machines become more intelligent. Hence, the automated tasks
EL
can be done in the industries at lower costs and higher quality level.
Humans will work with machines, the outcome will be higher overall
productivity.
PT
IIoT will reform and redefine the skills of the workers.
N
Introduction to Internet of Things 11
Creation of New Jobs
The creation of new composite industries, such as precision agriculture,
EL
digital healthcare system, digital mines etc., will lead to development of
new job opportunities.
Highly automated machines will require lesser number of unskilled
PT
workers, but will require skilled experts with digital and analytical skills.
N
Introduction to Internet of Things 12
Reformation of Robots
In IIoT environment, robots are featured with three capabilities : sensing,
EL
thinking and acting. They will be reformed with the ability to carry out
repetitive tasks.
Robots will be more intelligent but will work under the supervision of
PT
human beings. Their availability will increase.
Robots will be reprogrammable to perform new tasks. They have the
capability to ‘learn’ faster.
N
Introduction to Internet of Things 13
Challenges in IIoT
Primary challenges
EL
Identification of objects or
things
PT Integrate existing
infrastructures into new IIoT
infrastructure
N
Enabling data storage
EL
Worker health and safety
Regulatory compliance
PTEnvironmental protection
N
Optimized operations
EL
Handling, storing or using hazardous substances
Oxygen deficiency
PT
Particulates
Radiation
N
Physiological stress
EL
Standardization plays an important role in the development of the system.
Goal: To improve the interoperability of the different systems/ applications
and allow the products/services to perform better.
PT
N
Introduction to Internet of Things 17
Challenges in IIoT(contd.)
Standardization
EL
The problems related to standardization are:
Interoperability
Semantic interoperability (data sematics)
PT
Security and privacy
Radio access level issues.
N
Introduction to Internet of Things 18
Challenges in IIoT(contd.)
Privacy and security issues
EL
The two most important concerns related with IIoT are ‐
information security
data privacy protection
PT
The devices/things can be tracked, monitored and connected. So there are
chances of attack on the personal and private data.
N
Introduction to Internet of Things 19
Challenges in IIoT(contd.)
Privacy and security issues
Examples –
EL
Healthcare industry – the medical data of a patient must not be
tampered, or altered by any person in the middle.
Food industry – the deterioration of any food item being sent to the
PT
company must be kept confidential as it will affect the reputation of
the company.
N
Introduction to Internet of Things 20
Risks associated with IIoT in Manufacturing
Though IIoT provides new opportunities, but few factors may cause
EL
hindrance in the path to success, which are :
lack of vision and leadership
lack of understanding of values among management employees
costly sensors
PT
inadequate infrastructure.
N
Introduction to Internet of Things 21
Meet the challenges: Sensor improvement
Improvement in sensor technologies –
EL
miniaturization
performance
cost and energy consumption.
PT
N
Introduction to Internet of Things 22
Meet the challenges : Manufacturing
Manufacturers use software capabilities to improve operational efficiency
EL
through –
predictive maintenance
savings on scheduled repairs
PT
reduced maintenance costs
reduced number of breakdowns.
N
Introduction to Internet of Things 23
Case study : Rt Tech Software
Rt Tech particularizes in software which –
EL
improves industrial facilities’ efficiency
improves productivity.
Energy management solution, which leads to reduction in the plant’s
PT
highest variable cost.
Rt Tech automates the process of mapping and managing energy
consumption.
N
Source : http://www.mcrockcapital.com
EL
IRM 1500 & ACE 1000 ‐ IRM
simple
M‐2‐M connectivity
data transmission
PT
These devices provide easy maintenance and installation. They can be
connected to IP and non‐IP serial devices to extend the capability to
monitor and communicate with other technologies.
N
Source : https://www.motorolasolutions.com
EL
It can be easily integrated into the industrial
network with existing and new installations.
It supports Ethernet/IP, PROFINET (PNIO)
and Modbus TCP.
PT
N
Source :
http://pdfserv.maximintegrated.com
http://www.comtrol.com
EL
among devices
Improved efficiency
Upgraded scalability
Remote diagnosis
Cost effective
N
Introduction to Internet of Things 27
Recent Research trends in IIoT
Recent research challenges in IIoT are ‐
EL
To improve the communications among the different things or objects.
To develop energy‐efficient techniques so as to reduce power
consumption by sensors.
PT
To develop context‐aware IoT middleware for better understanding of
the sensor data.
To create smart objects with larger memory, processing and reasoning
capabilities.
N
Introduction to Internet of Things 28
Conclusion
IIoT system requires the following :
EL
Smaller, less expensive sensors which makes them easily accessible.
Distributed control of assembly line, automated monitoring, control
and maintenance.
PT
N
Introduction to Internet of Things 29
References
Daniele Miorandi, Sabrina Sicari, Francesco De Pellegrini, Imrich Chlamtac, Internet of things: Vision,
EL
applications and research challenges, Ad Hoc Networks, Volume 10, Issue 7, September 2012.
http://internetofthingsagenda.techtarget.com/definition/Industrial‐Internet‐of‐Things‐IIoT.
Ning Lu, Nan Cheng, Ning Zhang, Xuemin Shen, Jon W. Mark, Connected Vehicles : Solutions and
Challenges, IEEE Internet of Things Journal, Vol. 1, No. 4, August 2014.
Zhibo Pang, Qiang Chen, Junzhe Tian, Lirong Zheng and E. Dubrova, Ecosystem analysis in the design of
PT
open platform‐based in‐home healthcare terminals towards the internet‐of‐things, 2013, 15th
International Conference on Advanced Communications Technology (ICACT), PyeongChang, 2013.
Wei Qiuping, Zhu Shunbing, Du Chunquan, Study On Key Technologies Of Internet Of Things Perceiving
Mine, Procedia Engineering, Volume 26, 2011.
Bill Karakostas, A DNS Architecture for the Internet of Things: A Case Study in Transport Logistics, Procedia
Computer Science, Volume 19, 2013.
N
Ying‐cong Zhang, Jing Yu, A Study on the Fire IOT Development Strategy, Procedia Engineering, Volume 52,
2013.
EL
elements, and future directions, Future Gen. Comput. Syst., vol. 29, no. 7, 2013 .
D. Bandyopadhyay and Jaydip Sen, Internet of things: Applications and challenges in technology and
standardization, Wireless Personal Communications 58.1 (2011).
Industry 4.0, The Industrial Internet of Things, by Alasdair Gilchrist
http://pdfserv.maximintegrated.com
http://www.comtrol.com
PT
http://www.mcrockcapital.com
http://web.stanford.edu
http://www.accenture.com
N
Introduction to Internet of Things 31
EL
PT
N
Introduction to Internet of Things 32
EL
Data Handling and Analytics – Part I
Data is Precious
PT Dr. Sudip Misra
Associate Professor
Department of Computer Science and Engineering
N
IIT KHARAGPUR
Email: smisra@sit.iitkgp.ernet.in
Website: http://cse.iitkgp.ac.in/~smisra/
EL
Ensures that research data is stored, archived or disposed off in a safe and secure
manner during and after the conclusion of a research project
Includes the development of policies and procedures to manage data handled
electronically as well as through non‐electronic means.
PT
In recent days, most data concern –
Big Data
N
Due to heavy traffic generated by IoT devices
Huge amount of data generated by the deployed sensors
EL
designed to economically extract value from very large volumes of a wide variety of
data, by enabling the high-velocity capture, discovery, and/or analysis.”
[Report of International Data Corporation (IDC)]
“Big data shall mean the data of which the data volume, acquisition speed, or data
PT
representation limits the capacity of using traditional relational methods to conduct
effective analysis or the data which may be effectively processed with important
horizontal zoom technologies.”
N
[National Institute of Standards and Technology (NIST)]
EL
Usually stored in relational databases.
Structured Query Language (SQL) manages structured data in databases.
It accounts for only 20% of the total available data today in the world.
Unstructured data
PT
Information that do not possess any pre‐defined model.
Traditional RDBMSs are unable to process unstructured data.
Enhances the ability to provide better insight to huge datasets.
N
It accounts for 80% of the total data available today in the world.
EL
Volume
Velocity
Variety
Variability
Veracity
Visualization
Value
PT
N
EL
Sources of data are added continuously
Example of volume ‐
30TB of images will be generated every night from the Large Synoptic Survey Telescope
(LSST)
PT
72 hours of video are uploaded to YouTube every minute
N
EL
Data processing time decreasing day‐by‐day in order to provide real‐time services
Older batch processing technology is unable to handle high velocity of data
Example of velocity –
PT
140 million tweets per day on average (according to a survey conducted in 2011)
New York Stock Exchange captures 1TB of trade information during each trading
session
N
EL
No restriction over the input data formats
Data mostly unstructured or semi‐structured
Example of variety –
PT
Pure text, images, audio, video, web, GPS data, sensor data, SMS, documents, PDFs, flash
etc.
N
EL
Meaning of the data depends on the context.
Data appear as an indecipherable mass without structure
Example:
Veracity PT
Language processing, Hashtags, Geo‐spatial data, Multimedia, Sensor events
EL
Enables decision makers to see analytics presented visually
Identify new patterns
Value
PT
It means extracting useful business information from scattered data.
Includes a large volume and variety of data
N
Easy to access and delivers quality analytics that enables informed decisions
EL
On‐demand self service
Broad network access
Resource pooling
PT
Rapid elasticity
Measured service
Basic service models provided by cloud computing
Infrastructure‐as‐a‐Service (IaaS)
N
Platform‐as‐a‐Service (PaaS)
Software‐as‐a‐Service (SaaS)
EL
objects will be connected to the internet and will be able to identify themselves
to other devices.”
Sensors embedded into various devices and machines and deployed into fields.
PT
Sensors transmit sensed data to remote servers via Internet.
Continuous data acquisition from mobile equipment, transportation facilities,
public facilities, and home appliances
N
EL
objects will be connected to the internet and will be able to identify themselves
to other devices.”
Sensors embedded into various devices and machines and deployed into fields.
PT
Sensors transmit sensed data to remote servers via Internet.
Continuous data acquisition from mobile equipment, transportation facilities,
public facilities, and home appliances
N
EL
Estimates and provides necessary processing capacity.
Provides sufficient network infrastructure.
Effectively manages energy consumption.
PT
Replicates data to keep backup.
Develop business oriented strategic solutions from big data.
Helps business personnel to analyze existing data.
Discovers problems in business operations.
N
EL
Generation Acquisition Storage Analysis
Enterprise data
IoT data
PT
Data collection
Data transportation
Hadoop
MapReduce
Bloom filter
Parallel computing
N
Bio‐medical data Data pre‐processing NoSQL databases Hashing and
Other data indexing
EL
Production and inventory data. sequencing.
Sales and other financial data. Data from medical clinics and medical
IoT data R&Ds.
PT
Data from industry, agriculture,
traffic, transportation
Medical‐care data,
Data from public departments, and
Other fields
Fields such as – computational biology,
astronomy, nuclear research etc
N
families.
EL
activities for further analysis.
Sensory data such as sound wave, voice, vibration, automobile, chemical, current,
weather, pressure, temperature etc.
Complex and variety of data collection through mobile devices. E.g. – geographical
Data transmission PT
location, 2D barcodes, pictures, videos etc.
After collecting data, it will be transferred to storage system for further processing and
N
analysis of the data.
Data transmission can be categorized as – Inter‐DCN transmission and Intra‐DCN
transmission.
EL
processing of data is necessary.
Pre‐processing of relational data mainly follows – integration, cleaning, and
redundancy mitigation
view of data.
PT
Integration is combining data from various sources and provides users with a uniform
EL
and fault tolerance of data.
GFS is a notable example of distributed file system that supports large‐scale file
system, though it’s performance is limited in case of small files
Hadoop Distributed File System (HDFS) and Kosmosfs are other notable file systems,
Databases PT
derived from the open source codes of GFS.
PT
N
EL
distributed processing of large datasets
across large clusters of computers.
Hadoop is open-source implementation for
PT
Google ‘s GFS and MapReduce.
Apache Hadoop's Map Reduce and Hadoop
Distributed File System (HDFS)
components originally derived respectively
N
from Google's MapReduce and Google File
System (GFS) .
Source: https://www.cloudnloud.com/hadoop-hdfs-operations/
EL
A module containing the utilities that support the other Hadoop components
Hadoop Distributed File System (HDFS)
Provides reliable data storage and access across the nodes
MapReduce
PT
Framework for applications that process large amount of datasets in parallel.
Yet Another Resource Negotiator (YARN)
Next‐generation MapReduce, which assigns CPU, memory and storage to applications
N
running on a Hadoop cluster.
EL
Namenode
Maintains metadata info about files
Distributed node
Datanode
Store the actual data
PT
Files are divided into blocks
N
Each block is replicated
Source: http://hadoop.apache.org/docs/r1.2.1/hdfs_design.html
EL
Stores filesystem metadata.
Maintains two in‐memory tables, to map the datanodes to the blocks, and vice versa
Datanode
Stores actual data
PT
Data nodes can talk to each other to rebalance and replicate data
Data nodes update the namenode with the block information periodically
N
Before updating datanodes verify the checksums.
EL
Receives the user’s job
Decides on how many tasks will run (number
of mappers)
Decides on where to run each mapper
Task Tracker – PT
(concept of locality)
EL
Executes operations like opening, closing,
and renaming files and directories.
Determines the mapping of blocks to
Datanodes.
Slave
PT
Serves read and write requests from the
file system’s clients.
N
Performs block creation, deletion, and
replication as instructed by the Namenode.
Source: http://ankitasblogger.blogspot.in/2011/01/hadoop-cluster-setup.html
EL
vol. 33, no. 3, pp 707‐734, Dec. 2012.
S. Aral and D. Walker, “Identifying Influential and Susceptible Members of Social Networks,” Science, vol. 337, pp. 337‐341,
2012.
A. Machanavajjhala and J.P. Reiter, “Big Privacy: Protecting Confidentiality in Big Data,” ACM Crossroads, vol. 19, no. 1, pp. 20‐
23, 2012.
PT
S. Banerjee and N. Agarwal, “Analyzing Collective Behavior from Blogs Using Swarm Intelligence,” Knowledge and Information
Systems, vol. 33, no. 3, pp. 523‐547, Dec. 2012.
E. Birney, “The Making of ENCODE: Lessons for Big‐Data Projects,” Nature, vol. 489, pp. 49‐51, 2012.
S. Borgatti, A. Mehra, D. Brass, and G. Labianca, “Network Analysis in the Social Sciences,” Science, vol. 323, pp. 892‐895, 2009.
J. Bughin, M. Chui, and J. Manyika, Clouds, Big Data, and Smart Assets: Ten Tech‐Enabled Business Trends to Watch. McKinSey
N
Quarterly, 2010.
D. Centola, “The Spread of Behavior in an Online Social Network Experiment,” Science, vol. 329, pp. 1194‐1197, 2010.
http://hadoop.apache.org/
EL
conclusions about the information they contain, increasingly with the aid of
specialized systems and software. Data analytics technologies and techniques are
widely used in commercial industries to enable organizations to make more‐
informed business decisions and by scientists and researchers to verify or disprove
PT
scientific models, theories and hypotheses.”
[An admin's guide to AWS data management]
N
EL
Qualitative Analysis
Deals with the analysis of data that is categorical in nature
Quantitative Analysis
PT
Quantitative analysis refers to the process by which numerical data is analyzed
N
EL
Described by some sort of descriptive context such as text
Data can be gathered by many methods such as interviews, videos and audio
recordings, field notes
Data needs to be interpreted
PT
The grouping of data into identifiable themes
Qualitative analysis can be summarized by three basic principles (Seidel, 1998):
Notice things
N
Collect things
Think about things
EL
Involves descriptive statistics such as mean, media, standard deviation
The following are often involved with quantitative analysis:
Statistical models
Data dispersion
PT
Analysis of variables
EL
Data is observed Data is measured
Emphasis is on quality
PT
Examples are color, smell, taste, etc.
Emphasis is on quantity
EL
Helps businesses identify performance problems that require some sort of action
Can be viewed in a visual manner, which leads to faster and better decisions
Better awareness regarding the habits of potential customers
PT
It can provide a company with an edge over their competitors
N
EL
in the form of relationships between variables.
A statistical model illustrates how a set of random variables is related to another
set of random variables.
A statistical model is represented as the ordered pair (X , P)
PT
X denotes the set of all possible observations
P refers to the set of probability distributions on X
N
EL
Complete models
Incomplete models
Complete model does have the number of variables equal to the number of
equations
PT
An incomplete model does not have the same number of variables as the number
of equations
N
EL
Data Gathering
Descriptive Methods
Thinking about Predictors
Building of model
PT
Interpreting the Results
N
EL
datasets.
ANOVA is best applied where more than 2 populations or samples are meant to be
compared.
To perform an ANOVA, we must have a continuous response variable and at least one
PT
categorical factor (e.g. age, gender) with two or more levels (e.g. Locations 1, 2)
ANOVAs require data from approximately normally distributed populations
N
EL
Independence of case
The sample should be selected randomly
There should not be any pattern in the selection of the sample
Normality
Homogeneity PT
Distribution of each group should be normal
Variance between the groups should be the same (e.g. should not compare data from
cities with those from slums)
N
EL
One way analysis
One fixed factor (levels set by investigator). Factors: age, gender, etc.
Two way analysis
Factor variables are more than two
K‐way analysis
Factor variables are k
PT
N
EL
as being the sum, over all observations, of the squared differences of each
observation from the overall mean.
F –ratio
Helps to understand the ratio of variance between two data sets
PT
The F ratio is approximately 1.0 when the null hypothesis is true and is greater than
1.0 when the null hypothesis is false.
Degree of freedom
N
Factors which have no effect on the variance
The number of degrees of freedom is the number of values in the final calculation of a
statistic that are free to vary.
EL
the data are the same and increases as the data becomes more diverse.
PT
Average absolute deviation
Variance and Standard deviation
N
EL
The range is calculated by simply taking the difference between the maximum and
minimum values in the data set.
Average absolute deviation
The average absolute deviation (or mean absolute deviation) of a data set is the average of the
PT
absolute deviations from the mean.
Variance
Variance is the expectation of the squared deviation of a random variable from its mean
Standard deviation
N
Standard deviation (SD) is a measure that is used to quantify the amount of variation
or dispersion of a set of data values
EL
type of table in a matrix format that displays the (multivariate) frequency
distribution of the variables.
PT
A crucial problem of multivariate statistics is finding (direct‐)dependence structure
underlying the variables contained in high‐dimensional contingency tables
N
EL
quantitative, continuous variables
PT
Correlations are useful because they can indicate a predictive relationship that can
be exploited in practice
N
EL
relationships among variables
PT
Regression analysis estimates the conditional expectation of the dependent
variable given the independent variables
N
EL
regression function
Characterize the variation of the dependent variable around the regression
function which can be described by a probability distribution
Regression analysis is widely used for prediction and forecasting, where its use has
PT
substantial overlap with the field of machine learning
Regression analysis is also used to understand which among the independent
variables are related to the dependent variable
N
EL
between a given variation and the baseline is not due to random chance
Statistical significance level reflects the risk tolerance and confidence level
Sample size
Effect size
PT
There are two key variables that go into determining statistical significance:
N
EL
The larger your sample size, the more confident you can be in the result of the
experiment (assuming that it is a randomized sample)
PT
The effect size is just the standardized mean difference between the two groups
If a particular experiment replicated, the different effect size estimates from each
N
study can easily be combined to give an overall best estimate of the effect size
EL
The standard error is a measure of precision
EL
underestimate from the combination of the sampling and the non‐sampling errors
PT
Critical value: Determines the tolerance level of error.
N
EL
Agresti, A. (2002). Categorical Data Analysis (2nd Ed.), Wiley, New York
Anderson, T. (2003). An Introduction to Multivariate Statistical Analysis, 3rd ed., Wiley, New York.
Bair, E., Hastie, T., Paul, D. and Tibshirani, R. (2006). Prediction by supervised principal components, Journal of the American
Statistical Association, 101: 119–137.
Barron, A. (1993). Universal approximation bounds for superpositions of a sigmoid function, IEEE Transactions on
Information Theory, 39: 930–945.
PT
Benjamini, Y. and Hochberg, Y. (1995). Controlling the false discovery rate: a practical and powerful approach to multiple
testing, Journal of the Royal Statistical Society Series B. 85: 289–300.
Copas, J. B. (1983). Regression, prediction and shrinkage (with discussion), Journal of the Royal Statistical Society, Series B,
Methodo logical, 45: 311–354.
N
1
Future of IoT application in agriculture
Soil moisture and
water level
EL
monitoring
Automated
irrigation system
Automation in
Recycling of
PT Organic Waste
and
Vermicomposting
Automated
sowing and
N
weeding system
2
EL
Case study on
Smart Water Management Using IoT
PT
N
3
AgriSens: Smart Water Management using IoT
Objectives
EL
More yields with less water
Save limited water resource in a country
Automatic irrigation
PT
Dynamic irrigation treatments in the different phases of a crop’s life
cycle
Remote monitoring and controlling
N
Source: Project name: Development of a Sensor based Networking System for Improved Water Management for Irrigated Crops, funded by MHRD, Govt. of India
4
AgriSens: Smart Water Management using IoT
(Contd.)
Proposed architecture
EL
Sensing and actuating layer
Processing, storage, and service
layer
Application layer
PT
N
Fig 1: The proposed architecture of AgriSens
Source: Project name: Development of a Sensor based Networking System for Improved Water Management for Irrigated Crops, funded by MHRD, Govt. of India
5
AgriSens: Smart Water Management using IoT
(Contd.)
Design
EL
Integrated design for sensors
Integrated design for sensor node
Integrated design for remote server
PT
N
Source: Project name: Development of a Sensor based Networking System for Improved Water Management for Irrigated Crops, funded by MHRD, Govt. of India
6
AgriSens: Smart Water Management using IoT
(Contd.)
Integrated design for sensors
EL
PT
Fig 4: Designed water‐level sensor
N
Fig 5: EC‐05 soil moisture sensor
Source: Project name: Development of a Sensor based Networking System for Improved Water Management for Irrigated Crops, funded by MHRD, Govt. of India
7
AgriSens: Smart Water Management using IoT
(Contd.)
Integrated design for sensor node
EL
PT
N
Fig 2: The block diagram of a sensor node
8
AgriSens: Smart Water Management using IoT
(Contd.)
Integrated design for sensor node
EL
PT
N
Fig 3: Designed sensor node
Source: Project name: Development of a Sensor based Networking System for Improved Water Management for Irrigated Crops, funded by MHRD, Govt. of India
9
AgriSens: Smart Water Management using IoT
(Contd.)
Integrated design for remote server
EL
Repository data server: Communicates with the deployed IoT gateway
in the field by using GPRS technology
Web server: To access field data remotely
PT
Multi users server: Sends field information to farmer’s cell using SMS
technology and also executes farmer’s query and controlling messages
N
Source: Project name: Development of a Sensor based Networking System for Improved Water Management for Irrigated Crops, funded by MHRD, Govt. of India
10
AgriSens: Smart Water Management using IoT
(Contd.)
Implementation
EL
Field demo
Website demo
Project details from website
PT
N
11
AgriSens: Smart Water Management using IoT
(Contd.)
Results Reproductive phase
EL
Vegetative phase Maturity phase
PT
N
Fig. 6: Average soil moisture
Source: Project name: Development of a Sensor based Networking System for Improved Water Management for Irrigated Crops, funded by MHRD, Govt. of India
12
AgriSens: Smart Water Management using IoT
(Contd.)
Results
EL
Vegetative phase Reproductive phase Maturity phase
PT
N
Fig. 7: Average water level
Source: Project name: Development of a Sensor based Networking System for Improved Water Management for Irrigated Crops, funded by MHRD, Govt. of India
13
AgriSens: Smart Water Management using IoT
(Contd.)
Results
EL
Avg. PDR:
98.75 – 89.75%
Noises:
PT Air flow,
Temperature,
Solar radiation,
Rain
N
Fig. 8: Average packet delivery ratio
Source: Project name: Development of a Sensor based Networking System for Improved Water Management for Irrigated Crops, funded by MHRD, Govt. of India
14
N
PT
15
EL
EL
Case study: Healthcare
1
Emergence of IoT Healthcare
EL
Collect patient data over time
Enable preventive care
Understanding of effects of therapy on a patient
Ability of devices to collect data on their own
PT
Automatically obtain data when and
where needed by doctors
Automation reduces risk of error
Lower error implies increased efficiency
N
and reduced cost
2
Components of IoT Healthcare
Components of IoT is organized in 4 layers
EL
Sensing layer: Consists of all sensor, RFIDs and wireless sensor
networks (WSN). E.g: Google glass, Fitbit tracker
Aggregated layer: Consists of different types of aggregators based on
PT
the sensors of sensing layer. E.g: Smartphones, Tablets
Processing layer: It consists of servers for processing information
coming from aggregated layer.
Cloud platform: All processed data are uploaded in cloud platform,
N
which can be accessed by large no. of users
3
EL
PT
N
Sensing & Measurement Data Aggregation Cloud storage & Analytics
4
EL
IoT in Healthcare : Directions
PT
N
5
IoT Healthcare : Remote Healthcare
Many people without ready access to
EL
effective healthcare
Wireless IoT driven solutions bring
healthcare to patients rather than bring
patients to healthcare
Securely capture a variety of medical data
with smart algorithms PT
through IoT based sensors, analyze data
6
IoT Healthcare : Real-time Monitoring
IoT‐driven non‐invasive monitoring
EL
Sensors to collect comprehensive
physiological information
Gateways and cloud‐based
PT
analytics and storage of data
Wirelessly send data to caregivers
Lowers cost of healthcare
N
7
IoT Healthcare : Preventive care
EL
Emergency situation detection
and alert to family members
Machine learning for health
PT
trend tracking and early
anomaly detection
N
8
EL
AmbuSens: Use-case of Healthcare system using IoT
PT
N
9
Problem Definition & its Scope
Telemedicine and Remote Healthcare:
EL
Problem ‐ Physical presence
necessary
Solution ‐ Wireless sensors
Emergency Response Time:
Solution
PT
Problem – Not equipped to deal
with complications.
10
Problem Definition & its Scope (cont.)
Real Time Patient Status Monitoring:
EL
Problem – Lack of collaboration.
Solution ‐ Real‐time monitoring.
Digitized Medical History:
Problem
Inconsistent
PT
Physical records vulnerable to wear
and tear and loss.
Solution ‐ Consistent cloud‐based
N
digital record‐keeping system
11
AmbuSens: Physiological Parameters
EL
PT
Electrocardiogram (ECG)
Temperature
N
Heart Rate
Galvanic Skin Response (GSR)
12
AmbuSens: Development of WBAN
Single hop wireless body
EL
area network (WBAN)
Communication protocol
used is Bluetooth i.e. IEEE
802.15.1
PT
Power management and
data‐rate tuning
Calibration of data
N
Filtering and noise removal
13
AmbuSens: Development of Cloud Framework
Health‐cloud framework
EL
The developed system is
strictly privacy‐aware
Patient‐identity masking
PT
involves hashing and
reverse hashing of patient
ID
Scalable architecture
N
14
AmbuSens: Web Interface
URL: ambusens.iitkgp.ac.in
EL
Paramedic and Doctor portals
for ease of use.
Provision for recording medical
history and sending feedback.
data streaming. PT
Allows sensor initialization and
EL
PT
N
16
AmbuSens: Implementation
EL
Field demo animation
Part 1
AmbuSens in the Hospital
Part 2 PT
Brief description of the sensors
Ambulatory Healthcare
N
17
AmbuSens: System Trials
EL
PT
Figure 1: Hospital system trials Figure 2: Ambulatory system trials
N
18
AmbuSens: Results (Comparison of ECG tracing)
EL
PT
N
ECG tracing from manual system Real‐time ECG tracing from AmbuSens
19
EL
Thank You
PT
N
20
EL
Activity Monitoring - Part 1
PT Dr. Sudip Misra
Associate Professor
Department of Computer Science and Engineering
IIT KHARAGPUR
N
Email: smisra@sit.iitkgp.ernet.in
Website: http://cse.iitkgp.ac.in/~smisra/
EL
such as:
Medical
Child‐care
Elderly‐care
Entertainment
Security
PT
N
These sensors help in monitoring the physical activities of humans
EL
important role for providing better quality of life and safe
guarding humans.
Provides information accurately in a reliable manner
PT
Provides continuous monitoring support.
N
Introduction to Internet of Things 3
Traditional Architecture
EL
Analyzer
PT
Continuous
monitoring
N
Introduction to Internet of Things 4
Advantages
Continuous monitoring of activity results in daily observation of
EL
human behavior and repetitive patterns in their activities.
Easy integration and fast equipping
Long term monitoring
Accelerometer
Gyroscope
GPS
PT
Utilization of sensors of handheld devices
N
Others
EL
• Running
Actions • Jumping
PT
Gesture
• Folding legs
• Moving hand
N
Introduction to Internet of Things 6
Types of Sensors
EL
Camera
PT Smart Phone Activity Tracker Band
N
Introduction to Internet of Things 7
Data Analysis Tools
Statistical
EL
Sensor data
Machine Learning Based
Sensor data
Sensor data
Images
PT
Deep Learning Based
N
Videos
EL
On the device
Power intensive
No network connection required
Network Based
PT
Larger and processing intensive methods can be applied
Group based analytics possible
Low power consumption
N
Average to good network connection