You are on page 1of 60

CC Unit 5

UBIQUITOUS CLOUDS AND THE


INTERNET OF THINGS

VasundharaGhate,MITCOE.IT Dept 1
Syllabus
• UNIT – V UBIQUITOUS CLOUDS AND THE INTERNET OF
THINGS
Cloud Trends in Supporting Ubiquitous Computing,
Performance of Distributed Systems and the Cloud, Enabling
Technologies for the Internet of Things (RFID, Sensor
Networks and ZigBee Technology, GPS),
Innovative Applications of the Internet of Things (Smart
Buildings and Smart Power Grid, Retailing and
Supply-Chain Management, Cyber-Physical System), Online
Social and Professional Networking.

VasundharaGhate,MITCOE.IT Dept 2
Motivation
• Data-intensive applications and future trends
of Internet clouds should support:
• mobile computing, ubiquitous computing, and
social networking

VasundharaGhate,MITCOE.IT Dept 3
Cloud Trends in Supporting Ubiquitous
Computing
• Distributed computing :has changed rapidly in system
structure, scale of operation, and application domains in
recent years.
• Clustered systems appeared first in the 1990s. However, the
general public has not embraced grids due to their lack of
flexibility in general-purpose applications.
• Since 2005, many peer-to-peer (P2P) networks have
appeared as file-sharing networks and online social
networks.
• e-books, video streaming, movie downloads, and social
networking largely dominate Internet traffic today.
• Computing clouds over data-center resources did not
appear until 2007

VasundharaGhate,MITCOE.IT Dept 4
Introduction to IoT

• The Internet of Things (IoT) is the network of physical


objects—devices, vehicles, buildings and other items
embedded with electronics, software, sensors, and network
connectivity—that enables these objects to collect and
exchange data.
• M2M (Machine to Machine)

• ―Internet of Everything‖ (Cisco Systems)

• ―World Size Web‖ (Bruce Schneier)

VasundharaGhate,MITCOE.IT Dept 5
Smart Appliances

VasundharaGhate,MITCOE.IT Dept 6
Motivation/Driving Forces for IoT

• Ubiquitous Connectivity
• Widespread adoption of IP–based networking
• Computing Economics
• Miniaturization
• Advances in Data Analytics
• Rise of Cloud Computing

VasundharaGhate,MITCOE.IT Dept 7
Driving Forces of IoT

1. Sensor Technology – Tiny, Cheap, Variety


2. Cheap Miniature Computers
3. Low Power Connectivity
4. Capable Mobile Devices
5. Power of the Cloud

VasundharaGhate,MITCOE.IT Dept 8
1. Sensor Technology

Accelerometer Force Sensor Pulse Sensor


(4mm diameter)
(0.1N – 10N) $25

VasundharaGhate,MITCOE.IT Dept 9
2. Cheap Mini Computers

Key Parameters

Flash: 8 Kbytes
Pin Count: 8
Max. Operating Freq: 20 MHz
CPU: 8-bit AVR
Max I/O Pins: 6
Ext Interrupts: 6
SPI: 1
Lily Tiny I2C: 1

http://www.atmel.com/devices/ATTINY
85.aspx?tab=parameters

VasundharaGhate,MITCOE.IT Dept 10
3. Low Power Connectivity

Bluetooth Smart (4.0)


(Up to 2 years with a single
Coin-cell battery)

VasundharaGhate,MITCOE.IT Dept 11
4. Capable Mobile Devices

Quad Core 1.5 GHz


128 GB Internal Memory
3 GB RAM
16 MP Camera
2160p@30fps video
WiFI, GPS, BLE

VasundharaGhate,MITCOE.IT Dept 12
5. Power of the Cloud

VasundharaGhate,MITCOE.IT Dept 13
ABCD’s of IoT
Applications Big Data Analytics

Connectivity and Communication Devices – that are smart!

VasundharaGhate,MITCOE.IT Dept 14
Photos – Libelium, Google Image Search
VasundharaGhate,MITCOE.IT Dept 15
Applications
Setting Description Examples
Human Devices attached or inside the human BAN, wearables and
body ingestibles
Home Buildings where people live Home controllers and
security systems
Retail Spaces where consumers engage in Stores, banks, restaurants,
Environments commerce arenas
Offices Spaces where knowledge workers work Energy management and
security
Factories Standardized production environments Places with repetitive work
routines, optimizing
equipment
use and inventory
Worksites Custom production environments Mining, oil and gas,
construction; operating
efficiencies,
predictive maintenance,
VasundharaGhate,MITCOE.IT Dept health and safety 16
Applications Summary
Vehicles Systems inside moving condition-based maintenance, usage-based
vehicles design, pre-sales analytics
Cities Urban environments Public spaces and infrastructure in urban
settings; adaptive traffic control, smart
meters, environmental monitoring, resource
management
Outside Between urban Outside uses include railroad tracks,
environments (and outside autonomous vehicles (outside urban
other settings) locations), and flight navigation;
real-time routing, connected navigation,
shipment tracking

VasundharaGhate,MITCOE.IT Dept 17
Connected Rail Operations
PASSENGER SECURITY
 In-station and onboard safety
 Visibility into key events

ROUTE OPTIMIZATION
 Enhanced Customer Service
 Increased efficiency
 Collision avoidance
 Fuel savings

CRITICAL SENSING
 Transform “data” to “actionable intelligence”
 Proactive maintenance
 Accident avoidance

Cost savings, improved safety, superior service

18
Smart City
CONNECTED TRAFFIC SIGNALS
 Reduced congestion
 Improved emergency services response times
 Lower fuel usage

PARKING AND LIGHTING


 Increased efficiency
 Power and cost savings
 New revenue opportunities

CITY SERVICES
 Efficient service delivery
 Increased revenues
 Enhanced environmental monitoring capabilities

Safety, financial, and environmental benefits

19
The Connected Car
WIRELESS ROUTER
 Online entertainment
 Mapping, dynamic re-routing, safety and security

CONNECTED SENSORS
 Transform “data” to “actionable intelligence”
 Enable proactive maintenance
 Collision avoidance
 Fuel efficiency

URBAN CONNECTIVITY
 Reduced congestion
 Increased efficiency
 Safety (hazard avoidance)

Actionable intelligence, enhanced comfort, unprecedented convenience

20
VasundharaGhate,MITCOE.IT Dept 21
IoT Enabling Technologies

• RFID
• WSN
• ZigBee
• GPS

VasundharaGhate,MITCOE.IT Dept 22
Identification of Objects in Internet of Things
Every object in IoT needs to be identified
• Identity plays a crucial role in writing a success story of the Internet of
Things
• Traditional approaches to collect the identity are:
• Bar-codes
• Smartcards
• Face,retina scans and Finger Biometrics(especially for human beings)

VasundharaGhate,MITCOE.IT Dept 23
Types of approaches to collect the identity:
1.Contact type
• Object storing the identity information has to
make physical contact with the reader
2.Proximity type
• No physical contact

VasundharaGhate,MITCOE.IT Dept 24
• Radio Frequency IDentification(RFID)
RFID is an Automated Data Collection technology that:
• Uses radio waves to transfer data between a reader
and an item to be identified
• Is fast and does not require line-of-sight or physical
contact between reader/scanner and the tagged item
• Performs the operation using low cost components
• Provide unique identification and backend integration
that allows for wide range of applications

VasundharaGhate,MITCOE.IT Dept 25
Reads and captures information stored on a tag attached to an object
The information stored on the tag is the identifier for the object

VasundharaGhate,MITCOE.IT Dept 26
Components of RFID System

• The RFID system consists of:


1. Tag(Transponder) :Attached to the object being
identified.
• The tag usually consists of an integrated circuit and an
antenna.
2. Reader : (Interrogator) :The reader queries the tag using
RF waves, and gets the identity of the tag via the RF waves.
3. RFID Middleware :Provide seamless connectivity
between the RFID hardware and the application
VasundharaGhate,MITCOE.IT Dept 27
Basic Conceots RFID
• RF Wave:Type of electromagnetic radiation.
• Mainly used for communication.

VasundharaGhate,MITCOE.IT Dept 28
VasundharaGhate,MITCOE.IT Dept 29
• Analog Modulation Digital Modulation

VasundharaGhate,MITCOE.IT Dept 30
RFID Frequency Bands

• The RFID systems operate in various frequency


bands:
• 125 kHz to 134.2 kHz (LF: low frequency)
• 13.56 MHz (HF: high frequency)
• 860 to 915 MHz (UHF: ultra-high frequency)
• 2.45 GHz to 5.8 GHz (microwave frequency)

VasundharaGhate,MITCOE.IT Dept 31
Types of RFID Tags

• Active RFID tags:


 Contain a power source, to broadcast a signal, up to 100
meters away
 This capability makes RFID a strong choice for asset tracking

• Passive RFID tags:


 Have no power
 Activated by an electromagnetic signal sent from the RFID
reader
 The signal doesn’t travel as far as active RFID, so they’re
used for short read ranges

VasundharaGhate,MITCOE.IT Dept 32
RFID Tag Memory

• Read-only tags:
 Tag ID is assigned at the factory during
manufacturing
 Can never be changed
 No additional data can be assigned to the tag

• Read/Write tags:
 Data can be changed over time
 Part or all of the data section can be locked

VasundharaGhate,MITCOE.IT Dept 33
How different RFID Tags can be used?

• RFID tags come in a wide variety of shapes, sizes


and encased in a variety of materials:
• Animal tracking tags,inserted beneath the
skin,can be rice-grainsized
• Tags can be screw-shaped to identify trees or
wooden items
• Credit-card shaped for use in access applications
• The anti-theft hard plastic tags attached to
merchandise in stores are also RFID tags

VasundharaGhate,MITCOE.IT Dept 34
RFID System

VasundharaGhate,MITCOE.IT Dept 35
Applications of RFID

Manufacturing and Processing


 Inventory and production process monitoring
 Warehouse order fulfillment
Security
 Access control
 Counterfeiting and Theft control/prevention
Location Tracking
 Traffic movement control and parking management
 Wildlife/Livestock monitoring and tracking

VasundharaGhate,MITCOE.IT Dept 36
Real Time Applications of RFID

VasundharaGhate,MITCOE.IT Dept 37
VasundharaGhate,MITCOE.IT Dept 38
RFID Middleware

VasundharaGhate,MITCOE.IT Dept 39
RFID Issues

• Technical problems with RFID


RFID Reader Collision
RFID Tag Collision
• Security, privacy and ethics problems with
RFID
RFID tags can be read without your knowledge

VasundharaGhate,MITCOE.IT Dept 40
Technical problems with RFID:
• RFID Tag Collision :
Tag collision occurs when many tags are present in a small area; but since the read time is very fast, it is
easier for vendors to develop systems that ensure that tags respond one at a time.

 Tag collision in RFID systems happens when multiple tags are energized by the RFID tag reader
simultaneously,and reflect their respective signals back to the reader at the same time.This
problem is often seen whenever a large volume of tags must be read together in the same RF
field.The reader is unable to differentiate these signals; tag collision confuses the reader.

 Different systems have been invented to isolate individual tags;the system used may vary by vendor.
 For example,when the reader recognizes that tag collision has taken place,it sends a special
signal(a"gap pulse").Upon receiving this signal,each tag consults a random number counter to
determine the interval to wait before sending its data.Since each tag gets a unique number
interval,the tags send their data at different times.

• Security, privacy and ethics problems with RFID


 RFID tags can be read without your knowledge: Since the tags can be read without being swiped
or obviously scanned(as is the case with magnetic strips or barcodes),anyone with an RFID tag
reader can read the tags embedded in consumer products without your knowledge.

VasundharaGhate,MITCOE.IT Dept 41
WSN

• Wireless sensor network(WSN)refers to a group of spatially


dispersed and dedicated sensors for monitoring and recording the
physical conditions of the environment and organizing the collected
data at a central location.
• A sensor node,alsoknown as a mote,is a node in a sensor network
that is capable of performing some processing,gathering sensory
information and communicating with other connected nodes in the
network.
• In wireless sensor networks(WSNs),all the data collected by the
sensor nodes are forwarded to a sink node.
• Therefore,the placement of the sink node has a great impact on the
energy consumption and lifetime of WSNs

VasundharaGhate,MITCOE.IT Dept 42
VasundharaGhate,MITCOE.IT Dept 43
Applications of Wireless Sensor Networks

• Area monitoring
• Environmental/Earth monitoring
• Military applications like battlefield surveillance,targeting,nuclear attack
detection,etc.
• Air pollution monitoring
• Forest fire detection
• Landslide detection
• Natural disaster prevention
• Machine health monitoring
• Smart home monitoring
• Traffic flow surveillance
• Vehicle tracking and detection
• Detecting structural faults in buildings or cracks in bridges,etc.

VasundharaGhate,MITCOE.IT Dept 44
VasundharaGhate,MITCOE.IT Dept 45
Characteristics of Wireless Sensor Networks

• Sensors are constrained by small size-


 Small size implies small battery
 Low cost & energy implies low power CPU,radio with minimum
bandwidth and range

• Ad-hoc deployment implies no maintenance or battery


replacement

 Although deployed in an adhoc manner it needs to be self


organized and self healing

• To increase network lifetime,no raw data is transmitted

VasundharaGhate,MITCOE.IT Dept 46
Operational Challenges of Wireless Sensor
Networks

• Energy Efficiency
• Limited storage and computation
• Low bandwidth
• Errors are common
• Wireless communication
• Noisy measurements
• Node failure are expected
• Scalability to a large number of sensor nodes
• Survivability in harsh environments

VasundharaGhate,MITCOE.IT Dept 47
Lifetime of Wireless Sensor Networks

• Lifetime
• Nodes are battery-powered
• Nobody is going to change the batteries.So,each
operation brings the node closer to death.
• WSN Lifetime is crucial;hence to save energy:
 Use data fusion and compression.
 Transmit and receive only if necessary. Receiving
is just as costly as sending

VasundharaGhate,MITCOE.IT Dept 48
Data Collection in Wireless Sensor Networks

• Centralized data collection puts extra burden on nodes


close to the base station

• Clever routing can alleviate that problem

• Clustering: Data from groups of nodes are fused before


being transmitted, so that fewer transmissions are
needed

• Security and authenticity should be guaranteed.

VasundharaGhate,MITCOE.IT Dept 49
WSN Architecture (Protocol Stack)

• The most common WSN architecture follows the OSI architecture Model.
• The architecture of the WSN includes five layers and three cross layers.

• Mostly in sensor network, we require five layers, namely


Application,Transport,Network,Data Link & Physical Layer.

• The three cross planes are namely Power Management,Mobility


Management,and Task Management.

• These layers of the WSN are used to accomplish the network and make
the sensors work together in order to raise the complete efficiency of the
network

VasundharaGhate,MITCOE.IT Dept 50
Protocol Stack

VasundharaGhate,MITCOE.IT Dept 51
1.Application Layer
• The application layer includes a variety of application layer
protocols that perform various sensor network applications,such as:
 Query dissemination,
 Node localization,
 Time synchronization,and
 Network security

• For example,the sensor management protocol (SMP) is an


application–layer management protocol that provides software
operations to perform a variety of tasks,for example:
exchanging location–related data,synchronizing sensor nodes,moving
sensor nodes,scheduling sensor nodes,and querying the status of
sensor nodes

VasundharaGhate,MITCOE.IT Dept 52
2.TransportLayer
• The transport layer is responsible for reliable data delivery required by the
application layer.

• In general, the transport layer is responsible for reliable end–to–end data


delivery between sensor nodes and the sink(s).

• Due to the energy, computation,and storage constraints of sensor nodes,


traditional transport protocols can not be applied directly to sensor
networks without modification.

• For example, the conventional end–to–end retransmission–based error


control and the window–based congestion control mechanisms used in
the transport control protocol(TCP) cannot be used for sensor networks
directly because they are not efficient in resource utilization

VasundharaGhate,MITCOE.IT Dept 53
3.Network Layer:
• Responsible for routing the data sensed by source sensor nodes to the data
sink(s)

• A source node can transmit the sensed data to the sink either directly via
single–hop long–range wireless communication or via multi hop short–range
wireless communication.
• long–range wireless communication is costly in terms of both energy
consumption and implementation complexity for sensor nodes.
• In contrast, multi hop short–range communication cannot only significantly
reduce the energy consumption of sensor nodes, but also effectively reduce
the signal propagation and channel fading effects inherent in long–range
wireless communication ,and is therefore preferred.

• To send the sensed data to the sink, a source node must employ a routing
protocol to select an energy-efficient multi hop path from the node itself to
the sink.

VasundharaGhate,MITCOE.IT Dept 54
4.DataLinkLayer
Is responsible for data stream multiplexing, data frame creation and
detection, medium access, and error control in order to provide
reliable point–to–point and point–to–multipoint transmissions.

• One of the most important functions of the data link layer is


medium access control(MAC).

• The primary objective of MAC is to fairly and efficiently share the


communication resources or medium among multiple sensor nodes
in order to achieve good network performance in terms of energy
consumption,network throughput,and delivery latency

VasundharaGhate,MITCOE.IT Dept 55
5.Physical Layer
• The physical layer is responsible for converting bit streams from the data
link layer to signals that are suitable for transmission over the
communication medium.

• For this purpose,it must deal with various related issues,for


example,transmission medium and frequency selection,carrier frequency
generation,signal modulation and detection,and data encryption.

• In addition,it must also deal with the design of the underlying


hardware,and various electrical and mechanical interfaces

VasundharaGhate,MITCOE.IT Dept 56
1.PowerManagementPlane:
• It is responsible for managing the power level of a sensor
node for sensing,processing,and transmission and
reception,which can be implemented by employing efficient
power management mechanisms at different protocol layers.

• For example,at the MAC layer,a sensor node can turn off its
transceiver when there is no data to transmit and receive.

VasundharaGhate,MITCOE.IT Dept 57
2.Mobility Management Plane:
• Detects and registers the movements of the sensor nodes

VasundharaGhate,MITCOE.IT Dept 58
3.Task Management Plane:
• It is responsible for task distribution among sensor nodes in a
sensing region in order to improve energy efficiency and prolonged
network lifetime

• Since sensor nodes are usually densely deployed in a sensing region


and are redundant for performing a sensing task,not all sensor
nodes in the sensing region are required to perform the same
sensing task.

• A task management mechanism can be used to perform task


distribution among multiple sensors.

VasundharaGhate,MITCOE.IT Dept 59
Sensor Node Architecture

• Sensor Node has 4 Units (Parts):


1. Sensing Unit
2. Computing/Computation Unit
3. Communication Unit
4. Power/Energy Unit

VasundharaGhate,MITCOE.IT Dept 60

You might also like