Chapter 7 IoT
Chapter 7 IoT
Chapter 7 IoT
WHAT IS CLOUD?
Cloud is a technical term that refers to a Network (Internet). Cloud is present at distant location.
It can provide services over public networks or on private networks, like WAN, LAN or VPN.
Services like e-mail, internet conferencing, client relationship management, all are executed in
cloud.
There’s no need not to install any software on our local PC because cloud computing overcomes
the problem of platform dependency. Hence, it is due to the Cloud Computing that business and
mobile services are able to collaborate.
There are certain backend services working in order to make the cloud computing accessible
and feasible to the front end users.
Following are the working models for cloud computing:
∙ Deployment Models
∙ Service Models
DEPLOYMENT MODELS
Deployment models are the type of access to the cloud, i.e., how the cloud is located? Cloud
has four types of access: Public, Private, Hybrid and Community.
PUBLICCLOUD
It’s a cloud computing model in which a third party provider makes compute resources available
to the general public via the internet. With this, the enterprises do not have to set up and maintain
their own cloud in the house.
PRIVATECLOUD
It’s a cloud computing model in which an enterprise uses a proprietary architecture and runs
cloud servers within its own data centre. It has a single tenant architecture, on-premises hardware
and direct control of the underlying cloud infrastructure.
Example: VMWare, DELL EMC, Red hat
HYBRIDCLOUD
The Hybrid Cloud is mixture of public and private cloud. It includes a mix of on-premises,
private cloud and third party public cloud services with arrangement between the two phases. It
has cloud bursting capabilities.
Example: Vaulten organization.
∙ Virtualization
∙ Service-Oriented Architecture (SOA)
∙ Grid Computing
∙ Utility Computing
VIRTUALIZATION
Virtualization allows to share single physical detail of an application or resource among various
organizations or customers. It is done by assigning a logical name to a physical resource and then
by providing a pointer to that physical resource when needed.
The Multitenant architecture offers implicit segregation among the multiple tenants and therefore
the organizations and customers can use and personalize the application as if each of them have
its own instance running.
GRID COMPUTING
It is the distributed computing in which a cluster of computers from various distant locations are
connected with one another to achieve some common aim. These resources are different and
geographically varied. Grid Computing breaks down the complex task into smaller chunks.
These smaller chunks are distributed to CPUs that reside within the grid.
Cloud computing and the IoT both aims to boost efficiency in everyday tasks. The IoT generates
huge amounts of data, and cloud computing provides a pathway for this data to travel and reach
the desired destination.
Cloud providers usually charge on a basis, according to which we only pay for the computer
services that we use and nothing more. Economies of scale is a way in which the cloud providers
benefit the smaller IoT start-ups by reducing the all over costs to IoT companies.
Another benefit of Cloud Computing for the IoT is that Cloud Computing enables better
collusion essential for developers nowadays. By allowing them to store and access information
remotely, developers can access the data instantly and work on projects without any stoppage.
Finally by storing data in the Cloud, the IoT companies can change the resources directly quickly
and assign the resources to various areas. Big Data has developed with such emergence that the
cloud has become the architecture of choice. Most companies are opting to access the huge
quantities of Big Data through the cloud.
Figure 7.11 IOT
3. Sensor networks
Sensor networks have intensified the advantages of IoT. These networks have allowed users to
measure, receive and understand the minute indicators from the environment. The timely
processing of this data is a challenge because no matter that the cloud provides a new
convenience in collecting the data it also blocks the progress because of security and privacy
issues.
The integration of cloud computing and IoT signifies a next huge step in the world of internet.
New applications are coming from this integration which is known as the IoT Cloud and it is
opening newer channels for business and research. This combination is soon expected to reveal a
new example for the future of multi-networking and an open service platform for users.
The greater usage of the IoT in cloud has aggravated the improvement and deployment of
scalable applications and models. The cloud computing and IoT are closely related to the future
internet technologies with one paving a way for success for the other.
The main motive of cloud computing is to distribute data handling. This results in a number of
applications.
Because the data is distributed among the devices where it is produced, it's difficult to take the
control of the whole network or bargain all of the data in a single go.
This approach is: the less sensitive the information is sent through the network and stored in the
cloud, the better it is.
By storing and retrieving the data close to its source, the latency and improve the overall app
result. So the data analysis can be done in real-time, without any lag.
Moreover, the connection issues won't be very problematic as they are for other IoT products that
are dependent on the cloud. This is due to the fact that the devices can work individually, without
an Internet connection.
5. Unlimited Scalability
Cloud computing allows to scale the IoT network as needed, without reference to the available
storage (or its costs).
4. SUMMARY
Cloud computing has gained a lot of popularity in past few years so far we have seen that cloud
computing is delivery of on-demand resources on a pay for use basis i.e. –we pay for only that
service which has been utilized by the organization. It is very effective and efficient in delivery
resources.
It has been proved to be very cost efficient for organizations.
There are four types of development models which when chosen wisely can reduce the cost of
projects. Organizations should choose model according to the workload to attain maximum
benefit.
In public cloud we don’t have to buy hardware, servers or infrastructure. It is used by general
public.
Whereas public cloud is meant to be used only for respective organization, it provides more
security. Community cloud allows using resources by a group of organizations. Also hybrid
cloud is the combination of public and private cloud.
Apart from deployment models, we also have service models.
In IaaS, we don’t have to invest in any hardware. Flexible services are provided to us. In PaaS,
we don’t have to buy any software. We can develop any application faster. At last in SaaS we
can directly use applications available online from anywhere.
The major advantage of cloud computing is flexible storage. We can access our data from
anywhere, at any time. Technologies used in cloud computing are virtualizations, serviceoriented
architecture, grid computing and utility computing.
Connecting multiple devices and sensors through internet is Internet of things.
Few important and famous innovations are smart home and medical care. We can achieve a real
time control of devices.
IoT and cloud computing complement each other in several ways. Cloud can advance growth of
IoT. With so many devices interconnected, huge amount of data is obtained. Which, with the
help of cloud computing is stored in its destination. Also developers are able to access their data
without any delay. It aids inter-device communication
The main issue with IoT is its security. With the help of preventive, detective and corrective
control measures it is now more secure.
Security and privacy issues can be a hindrance for sensory data to work in real time. Several
companies now adopt cloud environments to establish higher business value.
Together IoT and cloud computing have increased data security and efficiency of an application.
They reduce operational costs of the project.
5. KEY TERMS
A
Apache thrift: an interface definition language and binary communication protocol.
Auto-scaling: Helps make sure that you've got the proper range of Amazon EC2 instances
obtainable to handle the load for your application.
Azure: Microsoft’s public cloud computing platform. Provides services like computing, storage,
analytics, and networking.
Actuator: A mechanism that performs a physical task supported input from a connected system.
Advanced Message Queuing Protocol (AMQP): An open application layer protocol for
messageoriented middleware with attention on queuing, routing (P2P, PubSub), security, and
dependability.
Application Agents: facilitate address the dearth of overhead for end-to-end, peer-to-peer
networking in IoT design by their presence within the propagator nodes in An enterprise. They
move intelligence to the sting of the network to assist manage traffic, enable a period of time
response to ever-changing IoT conditions, and supply native consumer services.
B
Bluetooth Low Energy (BLE): A wireless personal area network (PAN) geared toward devices
with reduced power consumption and value whereas maintaining an analogous communication
vary to regular Bluetooth.
BASE (basic availability, soft state, efficiency): an approach to storage that divides physical or
computer storage medium into severally available chunks ('blocks'); will increase performance
by narrowing search area (specified as a path) for a specific store or retrieve operation; usually
accessed via logical abstraction layer that adds information (filesystem, DBMS).
C
CAP theorem: the concept that a distributed system will solely offer 2 out of 3 benefits:
consistency, handiness, and partition tolerance.
Circuit breaker: A cloud-native style pattern to make and operate resilient, scalable
microservices.
Cloud architecture: The elements that area unit needed for cloud computing together with a
frontend platform, a back-end platform, a cloud-based delivery, and a network.
Cloud broker: (Like the other broker) abstracts far from supplier details to supply users easier
access to cloud computing resources; usually provides simplified API and/or human UI,
information lifecycle management, and targeted service integrations and aggregations.
Cloud computing: present, convenient, on-demand access to shared computing resources; offers
on-demand self-service (without human interaction), broad network access, resource pooling
(dynamically assigned as workloads vary), location independence (to varying degrees), fast
physical property, metered service (charging just for resources used); usually offered at 3
elementary service levels (IaaS, PaaS, SaaS); deployed to be used at intervals a corporation
(private cloud), for any organization or individual (public cloud), or some combination (hybrid
cloud).
Cloud migration: the method of moving applications And information from an onsite pc to the
cloud. It may also embrace moving information from one cloud atmosphere to a different.
Cloud-native application: An application that may take full advantage of a cloud atmosphere
(e.g. quantifiability, high availability).
Co-location: an information center that gives rental area, network connections, power, cooling,
and security for servers that you simply manage and maintain.
Container: Resource isolation at the OS (rather than machine) level, sometimes (in UNIX-based
systems) within the user area. Isolated components vary by containerization strategy and
infrequently embrace filing system, disk quota, processor and memory, I/O rate, root privileges,
and network access. a lot of lighter-weight than machine-level virtualization and ample for
several isolation demand sets.
Content delivery network (CDN): Physically distributed servers that offer (often static) content
on ways optimized per user; decrease transport time and overall network load; modify
permachine resource management; stop DoS by distributing (and thereby absorbing) requests.
Chirps: Lighter, purpose-made protocols that enable the “things” in IoT to speak and
interchange. designed for machine-to-machine communication, they're economical,
extensile information frames that have An ASCII text file structure, non-public information
fields, and an easy confirmation.
Competing Consumers: an electronic communication pattern within which a lot of customers get
messages from a typical supply (i.e. queue), however every message is delivered to only 1 client.
Connected Devices: elements that structure the web of Things. several have intrinsic sensors
and/or actuators and collect information to assist users or different devices create enlightened
selections and monitor or have an effect on outside events.
Connectivity Protection: a neighborhood of the sting Layer that serves to confirm that device
property doesn’t fail if there's a network failure or An unreliable association.
D
Data Filtration: a neighborhood of the sting Layer that reduces the quantity of transmitted info,
however retains the that means of it.
Device-Agnostic Control: a part of the sting Layer that gives web site abstraction to permit the
server and/or cloud application to be agnostic to the device implementation it controls.
Direct Messaging: an electronic communication mechanism within which the sender and receiver
area unit directly connected or will exchange messages through one or a lot of intermediate hops,
that don't take possession of every message however simply forward it (routing).
Data volume: A marked directory inside an instrumentality that exists to carry persistent or
usually shared information.
Docker: An open supply platform aimed to deploy and manage virtualized containers.
Dockerfile: A file that contains one or a lot of directions that dictate however an instrumentality
is to be created.
Dynamic or agile atmosphere: An environment wherever servers area unit oftentimes scaled up
or down.
E
Elastic transient computing: transient storage and computing via instance store volumes
obtainable on EC2.
Edge Gateway: The connecting issue between device analytics and cloud processing and
analytics
Edge Layer: a study shift in IoT that breaks the norm of the standard client-server model. this can
be the primary layer of property for devices to attach to before aiming to the server. answerable
for the native property of devices and for managing the info assortment and association to the
present server.
F
Flow-Based Programming: a sort of programming that defines applications as networks of
method that exchange information across outlined connections by message-passing, wherever the
connections area unit such that outwardly to the processes.
Functions(-as-a-Service): Cloud services that change app serverless app management and
development. Common FaaS suppliers embrace AWS Lambda, Azure Functions, and Google
Cloud Functions.
G
Geofencing: A technology that makes virtual boundaries around a physical space so as to trigger
An action on a connected device, sometimes through a mix of GPS and RFID tags.
H
Haze Computing: A dynamic model for Analytics applications whereby an application at the info
supply analyzes a pooled read of resources for the native and international figure obtainable
across the cloud, edge, and device layers. This info informs however and wherever information
analytics turn up.
Home Automation: a mix of hardware and computer code solutions that afford the management
and management of physical science, appliances, and devices at intervals a home.
Host-based intrusion detection system HIDS;: A computer code application that monitors and
analyzes a system for any unauthorized activity.
Hybrid cloud: An atmosphere that uses a mix of on-premises, non-public cloud, and public cloud
services.
I
iBeacon (or Beacon Technology): alittle network transmitter accustomed establish, track, and act
with connected systems victimisation Bluetooth low energy. iBeacon is An Apple trademark,
however it's conjointly obtainable on automaton devices.
Industrial Internet: the combination of machine learning, huge information technology, sensing
element information, and machine-to-machine communication automation. this can be finished
the data that the web of Things are going to be scaled and driven by enterprises. the concept is
that sensible machines will a lot of accurately capture and communicate information to assist
firms notice issues sooner and increase overall potency.
Integrator: The “tree trunk” of specification that performs the large information functions to
produce a higher-level analysis of human interaction for near-edge analytics and broader-scope
analysis and management.
Internet of Things (IoT): A network of objects (such as sensors and actuators) that may capture
information autonomously and self-configure showing intelligence supported physical world
events, permitting these systems to become active participants in numerous public, commercial,
scientific, and private processes.
Internet Protocol Suite (TCP/IP): The language a pc uses to access theInternet. It consists of a
collection of protocols designed to determine a network of networks to produce a number with
access to the web.
IoT Cloud Platform: A cloud platform that gives a group of services that modify the combination
method between the services provided by cloud platforms and IoT devices. Some platforms
embrace development tools and information analytics capabilities.
IoT Development Board: A board that may be accustomed paradigm and make IoT hardware.
There area unit many boards obtainable on the market with totally different options.
J
Jenkins: open supply automation server with plugins to support building, deploying, and
automating any project.
K
Kubernetes: An ASCII text file instrumentality cluster management platform maintained by
Google.
L
Lambda (serverless architecture): AWS cloud service that allows the building of we tend to apps
and mobile backends in an exceedingly quicker, a lot of agile means.
Lift and shift: Common cloud migration choice that replicates in-house apps within the cloud
while not re-design.
Lightweight Protocol: Any protocol that contains a lesser and throw payload once getting used
and transmitted over a network association.
Long vary Communication Protocols: accustomed discuss with universal long-range radio
frequencies for multi-generation wireless standards like 2G, 3G, 4G, and4G LTE.
Low-Power Devices: physical science that are designed to use less wattage than ancient devices.
These area unit necessary to the long run success of IoT as a result of, as sensors become a lot of
advanced, devices ought to be ready to operate for extended periods of your time while not
counting on manual maintenance or loss of knowledge.
M
Machine-to-Machine (M2M): This refers to a network setup that permits connected devices to
speak freely, sometimes between an oversized range of devices; M2M usually refers to the
employment of distributed systems in industrial and producing applications.
Mesh Network: a sort of topology within which a tool transmits its own information and
conjointly is a relay for different nodes by providing the foremost economical information path
through routers.
Microcontroller (MCU): a little pc on one computer circuit designed for embedded applications
and utilized in mechanically controlled embedded systems.
Messaging Protocols: The means info is transferred and communicated amongst devices, the
cloud, and information storage. totally different protocols area unit used for various results.
Multi-Agent System: A network of multiple agents that act in An atmosphere and act or
communicate with one another to realize their style objective.
Managed DNS: An external service supplier that runs authoritative DNS servers on your behalf,
respondent queries concerning your domain names.
N
Near-Field Communication (NFC): A feature supported technical standards that permits devices
to determine radio communication with different near systems or mobile devices.
O
Orchestration: the method of managing however containers area unit created and the way they're
connected.
Operability: Operability is that the lives of however well a software package works once in
operation in production, whether or not that's the general public cloud, a co-located data center,
An embedded system, or a far off sensing element forming a part of An IoT network.
Origin server: Application servers that serve content to a CDN once An object isn't any longer
cached or has invalid.
P
Private cloud: Dedicated to one organization and delivers quantifiability and self-service through
proprietary design.
Private instrumentality registry: a personal and secure location to publish, store, and retrieve
instrumentality pictures for computer code you employ in your infrastructure.
Public cloud: supported the quality cloud computing model wherever a service supplier makes
applications, storage, and different resources obtainable to the final public via the web.
Propagator: The “leaves” of the specification tree that area unit repaired by intermediate branch
network components. They manage message routing protocol translation services.
R
Radio Frequency Identification (RFID): A technology that includes magnetic attraction coupling
and oftenness to spot objects and persons. It consists of 3 components: An antenna, a transceiver,
and electrical device.
Real-Time software (RTOS): Designed to ensure the completion of a task at intervals a precise
time constraint. usually utilized in safety-critical systems and once building IoT devices.
Releasability: the power to quickly deploy changes to a software package, however conjointly to
quickly endure disaster and adapt to ever-changing technical and business challenges.
S
Scalability: the power for the cloud to still perform well once the usage and storage has fully
grown.
Scale elastically: Delivering capability on demand then eliminating once it's not required.
Semantic versioning: A governance theme for the way to structure a version range and once to
regulate it.
Serverless: A platform providing computing, networking, and storage while not the necessity of
managing (virtual) machines.
Sensor Network: a bunch of sensors with a communications infrastructure meant to observe and
collect information from multiple locations.
Single-Board Computer: an entire pc designed on one card with all the elements needed for a
practical pc.
Site-Level Management: permits site-level arrangement across devices from totally different
vendors victimisation dissimilar protocols.
Store and Forward: an electronic communication mechanism within which a broker is concerned
between sender and receiver in order that the broker gets possession of the message from the
sender, stores it for dependability, then delivers the message itself to the receiver.
T
Transmission management Protocol/Internet Protocol (TCP/IP): A basic client/server model
communication protocol for the web and personal networks.
U
Ubiquitous Computing: a technique of enhancing pc use by creating many computers obtainable
throughout a physical atmosphere, however creating them effectively invisible to the user.
V
Vendor lock-in: wherever customers area unit addicted to one cloud supplier technology
implementation and can't simply move within the future to a special trafficker while not
substantial prices, legal constraints, or technical incompatibilities.
W
Web API: a hypertext transfer protocol end point designed to simply accept and come
information, instead of hypertext mark-up language.
Wi-Fi: A wireless native space network (WLAN) that uses radio waves to produce wireless
highspeed Internet and network connections.
Z
ZigBee: An open commonplace for wireless communication designed to use low-power digital
radio signals for private space networks (PAN); it's accustomed produce networks that need an
occasional information transfer rate, energy potency, and secure networking.
Z-Wave: A wireless protocol for home automation that communicates employing a low-power
oftenness technology specifically designed for remote applications.
6. REVIEW QUESTIONS:
Q1. Name some platforms that are used for huge level cloud computing?
Ans. Apache Hadoop
MapReduce
Q2. How hybrid clouds are so important?
Ans. Cloud Bursting:
Some access capacity or special softwares are present exclusively in public cloud not in private
cloud.
ex:Virtual Amazon & Dynamo
Q8. Name the code which will be used to implement load balancing and tell advantages?
Ans. Apache mod_proxy_balancer. Load balancing is often used to increase utilization and
output, lowering the latency, cut back response time, and avoid system overloading.
Q9. What do you understand by the term fsck?
Ans. fsck stands for File System Check. It is a command used by HDFS. This command is used
to check inconsistencies and if there is any problem in the file.
Q11. How big data and Hadoop are related to each other?
Ans. Hadoop is a framework that specializes in big data operations. This framework can be used
by professionals to analyze big data and help businesses to make decisions.