Unit 3 IoT
Unit 3 IoT
Unit 3 IoT
Unit 3
Q1 Note on webserver for IoT.
ANS:
● IoT devices typically generate a large amount of data, which requires a robust
web server to handle and process it effectively. A web server is software that
accepts requests from web clients (such as IoT devices) and responds with the
appropriate data.
● The web server used for IoT should be able to handle requests from a variety of
IoT devices with different protocols and interfaces, including HTTP, MQTT, CoAP,
and others. It should also support different data formats, such as JSON, XML,
and CSV.
● Security is a critical concern for IoT web servers, as these servers often handle
sensitive data. The web server should be designed with strong security
measures, such as encryption and authentication, to protect against
unauthorized access and data breaches.
● The web server should be highly scalable to accommodate large numbers of IoT
devices and handle spikes in traffic. This can be achieved through techniques
such as load balancing, clustering, and horizontal scaling.
● An IoT web server should be able to communicate with other systems, such as
databases and analytics platforms, to store and analyze IoT data. This requires
integration with other software and APIs.
● Finally, an IoT web server should be highly reliable, with minimal downtime and
fast response times. This can be achieved through redundancy, failover
mechanisms, and effective monitoring and management tools.
@_.vedangs._13
IOT U3 Notes
2) IoT devices can generate data in 2) Web servers, on the other hand, typically
various formats, depending on the serve data in standard formats, such as
type of device and its sensors. For JSON or XML.
example, data from a temperature
sensor may be in Fahrenheit or
Celsius, or data from a motion sensor
may be in binary form.
3) IoT devices can use various protocols 3)which require different processing and
to transmit data, such as HTTP, handling than the standard HTTP protocol
MQTT, or CoAP, used by web servers
4) IoT devices may transmit sensitive 4)which require stronger security measures
data, such as personal information or than those used by web servers.
control signals,
5)The data generated by IoT devices is 5)while data served by web servers is
often used to monitor and control typically used for informational or
physical systems, such as machines entertainment purposes. This context can
or appliances, affect how the data is processed and used.
● Data storage: Cloud platforms provide secure and reliable storage for IoT data,
eliminating the need for businesses to maintain expensive on-premises storage
solutions.
@_.vedangs._13
IOT U3 Notes
● Data processing: Cloud platforms offer a range of data processing and analytics tools
that can help organizations extract insights and value from their IoT data.
● Cost-effective: Using cloud services can be more cost-effective than building and
maintaining a dedicated infrastructure for IoT data management and analysis.
● Security: Cloud providers have extensive security measures in place to protect IoT data
from cyber threats, including encryption, access controls, and intrusion detection
systems.
● Integration: Cloud platforms can integrate with a wide range of IoT devices and
protocols, enabling seamless data transmission and analysis.
● Availability: Cloud providers offer high availability and uptime guarantees, ensuring that
IoT services remain accessible even in the event of system failures or outages.
● Visual interface: The Node-RED interface is highly visual, allowing users to create and
manipulate nodes, connect them with wires, and build flows without writing any code.
● Built-in nodes: Node-RED comes with a wide range of built-in nodes that can be used to
connect to different devices and protocols, such as MQTT, HTTP, and TCP.
● Custom nodes: Users can create their own custom nodes using JavaScript or other
programming languages, allowing for greater flexibility and customization.
@_.vedangs._13
IOT U3 Notes
● Integration with other tools: Node-RED can be easily integrated with other tools and
platforms, such as cloud services, databases, and analytics tools, using built-in nodes or
custom nodes.
● Ease of deployment: Node-RED can be deployed on a wide range of devices, from small
microcontrollers to large servers, and can be run on-premises or in the cloud.
● Open source: Node-RED is open source, which means that users can access the source
code, contribute to the project, and build their own custom nodes and extensions.
● Community support: Node-RED has a large and active community of developers and
users, who provide support, share knowledge, and contribute to the development of the
platform.
@_.vedangs._13
IOT U3 Notes
There are several types of WSNs based on their characteristics, such as:
Static WSN: These WSNs have sensors that are stationary and fixed in place, and are often
used for monitoring physical conditions in a particular location.
Mobile WSN: These WSNs have sensors that are mounted on mobile objects such as robots or
vehicles, and are often used for tasks such as surveillance or environmental monitoring.
@_.vedangs._13
IOT U3 Notes
Hybrid WSN: These WSNs combine both static and mobile sensors to provide a more
comprehensive view of the physical environment.
Acoustic WSN: These WSNs use acoustic sensors to detect sounds in the environment, and
are often used for applications such as wildlife monitoring or noise pollution monitoring.
Visual WSN: These WSNs use cameras or image sensors to collect visual data, and are often
used for applications such as surveillance or traffic monitoring.
Chemical WSN: These WSNs use chemical sensors to detect various chemicals in the
environment, and are often used for applications such as air quality monitoring or water pollution
monitoring.
Health WSN: These WSNs use sensors to monitor the health and well-being of individuals, and
are often used in healthcare applications such as remote patient monitoring or elderly care.
Base Station: This is the central node in a WSN architecture, which collects data from multiple
sensor nodes and acts as a gateway to external networks. The base station is responsible for
processing the data received from the sensor nodes and transmitting it to other networks or
devices.
Network Topology: The network topology of a WSN defines the structure of the network and
the way in which sensor nodes are connected to each other. The topology can be star, mesh,
tree, or hybrid, depending on the requirements of the application.
Routing Protocol: The routing protocol is responsible for determining the path that data should
take from the sensor nodes to the base station. There are several routing protocols used in
WSNs, such as direct transmission, single hop routing, and multi-hop routing.
Data Management: Data management in a WSN involves collecting, processing, storing, and
retrieving data from the sensor nodes. The data collected from the sensor nodes may be raw or
processed, and may need to be filtered or aggregated before being transmitted to the base
station.
@_.vedangs._13
IOT U3 Notes
techniques such as duty cycling, sleep mode, and energy harvesting are used to optimize the
energy consumption of the sensor nodes and prolong their battery life.
Smart Healthcare: IoT is being used in healthcare to monitor patients remotely, automate
patient monitoring, and improve healthcare delivery. For example, the Philips Healthcare eICU
program uses sensors and cameras to monitor patients in the ICU, enabling doctors to remotely
diagnose and treat patients in real-time.
Smart Home: IoT technology is being used to create smart homes, which are homes equipped
with connected devices that can be controlled remotely. For example, Amazon's Echo is a
voice-controlled speaker that can be used to control smart devices such as lights, thermostats,
and security cameras.
Smart Cities: IoT technology is being used to make cities more efficient and sustainable by
optimizing energy use, traffic flow, and waste management. For example, Barcelona's Smart
City project uses IoT sensors to monitor traffic flow, reduce energy consumption, and improve
public safety.
Industrial IoT: IoT technology is being used in industrial settings to optimize production, reduce
downtime, and improve safety. For example, General Electric's Predix platform uses sensors
and analytics to optimize the performance of industrial equipment, resulting in reduced
maintenance costs and increased productivity.
@_.vedangs._13
IOT U3 Notes
Smart Cities: Edge computing can be used in smart cities to enable real-time monitoring and
control of traffic, energy consumption, and public safety. This can help to optimize the use of
resources, reduce traffic congestion, and improve public safety.
Healthcare: Edge computing can be used in healthcare to enable real-time monitoring and
analysis of patient data, such as heart rate, blood pressure, and oxygen levels. This can help to
improve the accuracy and timeliness of diagnosis and treatment, while reducing the risk of
errors and improving patient outcomes.
Retail: Edge computing can be used in retail to enable real-time analysis of customer behavior
and preferences, such as purchasing history, location data, and social media activity. This can
help retailers to personalize the customer experience, optimize inventory management, and
increase sales.
@_.vedangs._13
IOT U3 Notes
Edge Servers/Gateways: These are the intermediate devices that sit between the edge
devices and the cloud servers. Edge servers/gateways can perform local data processing,
storage, and analytics. They can also aggregate data from multiple edge devices and act as a
communication bridge between the edge devices and the cloud servers. Edge servers/gateways
are typically more powerful than edge devices, with more connectivity options and computing
and storage resources.
Cloud Servers: These are the servers in the cloud that provide additional processing, storage,
and analytics capabilities. They receive data from the edge devices and edge servers/gateways
for further processing, analysis, and storage. Cloud servers are typically highly scalable, with a
large number of computing and storage resources, and can support multiple applications and
users.
Data Management: Edge computing platforms provide mechanisms for collecting, storing, and
processing data from the edge devices. They support different data formats, protocols, and
storage options, and they enable data processing and analytics at the edge.
Application Management: Edge computing platforms provide tools for deploying, managing,
and scaling edge applications. They offer APIs, SDKs, and other development tools that enable
developers to create custom applications and services.
Security: Edge computing platforms provide security mechanisms that protect the edge
devices, data, and applications from cyber threats. They provide authentication, encryption,
access control, and other security features that ensure the integrity, confidentiality, and
availability of the data and applications.
@_.vedangs._13
IOT U3 Notes
Orchestration: Edge computing platforms provide mechanisms for orchestrating and managing
the communication between the edge devices, edge servers/gateways, and cloud servers. They
ensure that the data and applications are processed and distributed efficiently and effectively.
Fog Computing: Fog computing is a hierarchical model that extends cloud computing to the
edge devices.
In this model, edge devices send their data to local servers called fog nodes for processing and
analytics, which reduces network latency and improves data security.
Fog computing is ideal for use cases such as remote monitoring, video surveillance, and smart
homes.
Sensor Nodes: Sensor nodes are composed of the sensor, a microcontroller, and wireless
communication hardware. The sensor node is responsible for processing the data collected by
the sensor, transmitting the data to a central location, and performing other tasks such as data
compression, encryption, and aggregation.
@_.vedangs._13
IOT U3 Notes
Gateway: The gateway acts as a bridge between the sensor nodes and the back-end
infrastructure. The gateway is responsible for collecting the data from the sensor nodes and
forwarding it to a cloud-based or on-premise server for storage and analysis.
Back-end Infrastructure: The back-end infrastructure consists of the servers, databases, and
software applications that process and store the data collected by the sensors. The back-end
infrastructure is responsible for performing data analytics, visualization, and reporting.
Communication Protocol: The communication protocol specifies the rules and standards for
how the sensor nodes communicate with each other and the gateway. Common communication
protocols used in sensor networks include Zigbee, Bluetooth Low Energy (BLE), and LoRaWAN.
Power Management: Sensor nodes are typically battery-powered and may need to operate for
long periods without maintenance. Therefore, the sensor network architecture includes
mechanisms for energy-efficient data collection, transmission, and processing. Techniques such
as duty cycling, sleep modes, and energy harvesting are used to prolong the lifespan of the
sensor network.
@_.vedangs._13