INTERNET OF THINGS - EMBEDDED SYSTEMS AND INTERNET OF THINGS
Jeevanandhams14
491 views
132 slides
Aug 28, 2025
Slide 1 of 132
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
About This Presentation
INTERNET OF THINGS
Introduction to IOT, Physical Design of IOT, Logical Design of IOT, IOT Enabling Technologies–IOT
and M2M– Essential Characteristics of Cloud Computing – Service Models – Deployment Models.
Size: 2.14 MB
Language: en
Added: Aug 28, 2025
Slides: 132 pages
Slide Content
SRI RAMAKRISHNA ENGINEERING COLLEGE [Educational Service : SNR Sons Charitable Trust] [Autonomous Institution, Rea ccredited by NAAC with ‘A+’ Grade] [Approved by AICTE and Permanently Affiliated to Anna University, Chennai] [ISO 9001:2015 Certified and all Eligible Programmes Accredited by NBA] VATTAMALAIPALAYAM, N.G.G.O. COLONY POST, COIMBATORE – 641 022. 20EC211 – EMBEDDED SYSTEMS AND INTERNET OF THINGS Module 4: INTERNET OF THINGS Department of Information Technology
INTERNET OF THINGS Introduction to IOT, Physical Design of IOT, Logical Design of IOT, IOT Enabling Technologies-IOT and M2M-Essential Characteristics of Cloud Computing - Service Models - Deployment Models. Case Study: Air Quality Monitoring System and Data Logger-Landslide Detection and Disaster Management-Smart Motion Detector
CO5: Describe the concepts of Internet of Things and cloud computing CO6: Develop an IoT system for real time applications. Course Outcome
Introduction to Internet of Things 4 Definition A dynamic global network infrastructure with self –configuring based on standard and interoperable communication protocols where physical and virtual “things” have identified, physical attributes, and virtual personalities and use intelligent interfaces, often communicate data associated with users and their environment.
Introduction to Internet of Things 5 Characteristics Dynamic and self-Adapting- Surveillance cameras can adapt their modes based on whether it is day or night Self Configuring - allowing a large number of devices to work together to provide certain functionality Interoperable communication protocols - number of interoperable communication protocols and can communicate with other devices Unique Identity - Each IoT devices has a unique identity and a unique identifier, IPaddress , URI). Integrated into information network - allows them to communicate and exchange data with other devices and systems
Physical Design of IoT 6 Things of IoT The “Things” in IoT usually refers to IoT devices which have unique identities and can perform remote sensing, Actuating and monitoring capabilities. IoT devices can exchange data with other connected devices and applications (directly or indirectly), or collect data from other devices and process the data locally or send the data to Centralized servers or cloud based applications back ends for processing the data or from some task locally and other task within the IoT infrastructure, based on temporal and space constraints ( ie : Memory, processing calibrators, communication latencies and speed and deadlines)..
Physical Design of IoT 7 Things of IoT An IoT device may consist of several interfaces connections to other devices, both wired and wireless. These include I) IoT interfaces for sensors II) interfaces for internet connectivity III) memory and storage interfaces IV) audio video interfaces. An IoT Device can collect various types of data from the the onboard or attached sensors, such as temperature, humidity, light intensity. IoT devices can also be varied types, for instance, wearable sensors, smart watches, LED light automobiles and industrial machines. Almost all I would advise generate data in Some form or the other which when processed by Data Analytics systems leads to Useful information to guide further actions locally or remotely.
Physical Design of IoT 8 IoT Protocol Link Layer: Link Layer protocols determine how the data is physically sent over the networks physical layer or medium(example copper wire, electrical cable, or radio wave). The Scope of The Link Layer is the Last Local Network connections to which host is attached. Host on the same link exchange data packets over the link layer using the link layer protocol. Link layer determines how the packets are coded and signaled by the hardware device over the medium to which the host is attached.
Physical Design of IoT 9 IoT Protocol 802.3 Ethernet 802.3 is a collections of wired Ethernet standards for the link layer. For example 802.3 10BASE5 Ethernet that uses coaxial cable as a shared medium, 802.3.i is standard for 10 BASET Ethernet over copper twisted pair connection, Standards provide data rates from 10 Mb/s to 40 gigabits per second and the higher. The shared medium in Ethernet can be a coaxial cable , twisted pair wire or and Optical fiber. Shared medium carries the communication for all the devices on the network. .
Physical Design of IoT 10 IoT Protocol 802.1- WI-FI IEEE 802.3 is a collections of wireless Local area network.(WLAN) communication standards, including extensive descriptions of the link layer. For example 802.11a operate in the 5 GHz band, 802.11b and 802.11g operate in the 2.4 GHz band. 802.11ac operates in the 5G hertz band. 802.16 wiMAX IEEE 802.16 is a collection of wirless broadband and Standards, including extensive descriptions for the link layer also called WiMAX wimax standard provides a data rates from from 1.5 Mb/s to 1Gb/s the recent update provides data rates of hundred megabits per second for mobile station.
Physical Design of IoT 11 IoT Protocol 802.15.4 LR-WPAN IEEE 802.1 5.4 is a collections of standard for low rate wireless personal area network(LR-WPAN). These standard form the basis of specifications for high level communication Zigbee . LR-WPAN standards provide data rates from 40 k b/ s. These standards provide low cost and low speed Communications for power constrained devices. 2G / 3G / 4G mobile communications These are the different generations of mobile communication standards including second generation (2G including GSM and CDMA). 3rd Generation (3G including UMTS and CDMA2000) and 4th generation 4G including LTE.
Physical Design of IoT 12 Network / internet layer The network layer are responsible for sending of IP datagrams from the source network to the destination network. This layer Performs the host addressing and packet routing. The datagrams contains a source and destination address which are used to route them from the source to the destination across multiple networks. Host Identification is done using the hierarchy IP addressing schemes such as ipv4 or IPv6.
Physical Design of IoT 13 Network / internet layer IPV4: Internet protocol versions for open parents close (IPV4) is there most deployed internet protocol that is used to identify the device is on a network using a hierarchy latest schemes. It uses 32 bit addresses scheme that allows total of 2 32 address. As more and more devices got connected to the internet. The Ipv4 has succeeded by IPv6. IPv6: It is the newest versions of internet protocol and successor to IPv4. IPv6 uses 128 bit address schemes that are lost total of 2 128 are 3.4* 10 38 address. 6LoWPAN: IPv6 over low power wireless personal area networks brings IP protocol to the low power device which have limited processing capability it operate in the 2.4 GHz frequency range and provide the data transfer rate off to 50 kb/s.
Physical Design of IoT 14 Transport layer The Transport layer protocols provides end-to-end message transfer capability independent of the underlying network. The message transfer capability can be set up on connections, either using handshake or without handshake acknowledgements. Provides functions such as error control , segmentation, flow control and congestion control
Physical Design of IoT 15 Transport layer TCP: Transmission control protocol is the most widely used to transport layer protocol that is used by the web browsers along with HTTP , HTTPS application layer protocols email program (SMTP application layer protocol) and file transfer protocol. TCP is a connection Oriented and stateful protocol while IP protocol deals with sending packets, TCP ensures reliable transmissions of packets in order. TCP also provide error deduction capability so that duplicate packets can be discarded and low packets are retransmitted. The flow control capability ensures that the rate at which the sender since the data is now to too to high for the receiver to process.
Physical Design of IoT 16 Transport layer UDP: unlike TCP, which requires carrying out an initial setup procedure, UDP is a connection less protocol. UDP is useful for time sensitive application they have very small data units to exchange and do not want the overhead of connection setup. UDP is a transactions oriented and stateless protocol. UDP does not provide guaranteed delivery, ordering of messages and duplicate eliminations..
Physical Design of IoT 17 Application layer layer Application layer protocol define how the application interfaces with the lower layer protocols to send the data over the network. Data are typically in files, is encoded by the application layer protocol and encapsulated in the transport layer protocol . Application layer protocol enable process-to-process connection using ports.
Physical Design of IoT 18 Application layer layer Http: Hypertext transfer protocol is the application layer protocol that forms the foundations of world wide web http includes, ,commands such as GET, PUT, POST, DELETE, HEAD, TRACE, OPTIONS etc. The protocol follows a request-response model where are client sends request to server using the http, commands. Http is a stateless protocol and each http request is independent father request and http client can be a browser or an application running on the client example and application running on an IoT device ,mobile mobile applications or other software.
Physical Design of IoT 19 Application layer layer CoAP : Constrained application protocol is an application layer protocol for machine to machine application M2M meant for constrained environment with constrained devices and constrained networks. Like http CoAP is a web transfer protocol and uses a request- response model, however it runs on the top of the UDP instead of TC CoAP uses a client –server architecture where client communicate with server using connectionless datagrams. It is designed to easily interface with http like http,CoAP supports method such as GET, PUT, DELETE
Physical Design of IoT 20 Application layer layer Websocket:Websocket protocol allows full duplex communication over a single socket connections for sending message between client and server. Websocket is based on TCP and Allows streams of messages to be sent back and forth between the client and server while keeping the TCP connection open. The client can be a browser, a mobile application and IoT device
Physical Design of IoT 21 Application layer layer MQTT : Message Queue Telemetry Transport it is a lightweight message protocol based on public -subscribe model MQTT uses a client server Architecture by the clients such as an IoT device connect to the server also called the MQTT broker and publishers message to topic on the server. The broker forward the message to the clients subscribed to topic MQTT is well suited for constrained and environments
Physical Design of IoT 22 Application layer layer XMPP: Extensible Messaging and Presence Protocol it is a protocol for real-time communication and streaming XML data between network entities XMPP powers wide range of applications including messaging, presence, data syndication, gaming multiparty chat and voice / voice calls. XMPP Allows sending small chunks of XML data from one network entity to another in real time. XMPP supports both client to server and server –client communication path
Physical Design of IoT 23 Application layer layer DDS: Data distribution service is the date centric middleware standard for device-to-device machine to machine communication DDS uses a publish subscribe model where publisher example device that generate data create topics to which subscribers per can subscribe publisher is an object responsible for data distributions and the subscriber responsible for receiving published data. DDS provide quality of service ( QoS ) control and configurable reliability
Physical Design of IoT 24 Application layer layer AMQP: Advanced Message Queuing protocols. it is an open application layer protocol for business messaging. AMQP support point to point and publish - subscribe model routing and queuing. AMQP broker receive message from publishers example devices or applications that generate data and about them over connections to consumers publishers publish the message to exchange which then distribute message copies to queues.
Logical design of IoT 25 Logical design of an IoT system refers to an abstract representation of the entities and process without going into low level specification of the implementations . IoT functional block An IoT system comprises of a number of functional blocks that provide the system the capabilities for identification , sensing, actuation ,communication and Management.The function blocks are described as follows Devices-provide sensing, actuation, monitoring and control function Communication-communication block handle the communication systems Services-device monitoring ,device control services ,data publishing services and services for device Discovery Management -Functional blocks provide various functions Security -application authorization message and content integrity and data security Application -users to view the system status and view or analyze the processed to data.
Logical design of IoT 26 IoT communication model Request response: Request-response is a Communications model in which the client sends request to the server and the server responds to the requests. when the server receives a request it decides how to respond, if it shows the data retrieved resources definitions for the response , and then send the response to the client. Access to response model is a stateless communication model and each request response per is independent of others the crime and server interactions in the request response model
Logical design of IoT 27 IoT communication model Publish - Subscribe: Respect is a communication model that involve Publishers brokers and consumers. Publishers are the source of data. Publishers send the data to the topics which is managed by the broker. Publishers are not aware of the consumer. Consumers Subscribe to the topic which are managed by the broker. When the broker receives the data for a topic from the publisher, it send the data to all the subscribed consumers
Logical design of IoT 28 IoT communication model Push pull: Push pull is communication model in which the data producers push the data to queues and the consumers pull the data from the queues. Producers do not need to be aware of the consumer. Queues help in decoupling the messaging between the Producers and Consumers . It also act as a buffer which helps in situations when there is a mismatch between the rate at which the produces push data and the rate at which the consumers full the data
Logical design of IoT 29 IoT communication model Exclusive pair: Exclusive pair is a bi directional, fully duplex communication model that uses a persistent connections between the client and the server. once the condition is setup it remains open until the client sends a request to close the connection. client and server can send messages to each other after connection setup. Exclusive pair is a stateful Communications model and the server is aware of all the open connections
Logical design of IoT 30 IoT communication API REST- based communication API: Representational state transfer is a set of architectural principles by which you can design web service and Web API that focus on a system resources and how resources states and addressed the transferred. REST API follow the request- response communication model. The REST architectural constraints apply to the components, connectors, and data elements
Logical design of IoT 31 IoT communication API Client server: The principle behind the client-server conference separations of concerns for example client should not be concerned with the storage of data which is their concern of the server. Similarly the server should not be concerned about the user interface which is a concern of the client. separation allows client and server to be independently deployed and updated
Logical design of IoT 32 IoT communication API Stateless: Each request from client to server must contain all the information necessary to understand the request , and cannot take advantage of any stored context on the server . Catchable: Catch constrain requires that the data within the response to a request be implicitly or explicitly labeled as catchable or non-catchable. Then a client cache is given the right to reuse that response data for later, equivalent requests. completely eliminate some attractions and improve efficiency and scalability.
Logical design of IoT 33 IoT communication API Layered system: System constraint come off constraints, constrains the behavior of components such that each component cannot see beyond the immediate layer with which they are interacting. Example client cannot tell whether it is connected directly to the end server or to an intermediary along the way system scalability can be improved allowing intermediaries to respond to request instead of tender server.
Logical design of IoT 34 IoT communication API Uniform interface: Uniform interface constraints requires that the method of communication between client and server must be uniform. Resources are identified in the request and separate from the representation of the resource that are returned to the client. When climbing holds a representation of your resource it has all the information required to update or delete the resource Code on demand : Service can provide executable code script for clients to execute in their context.
Logical design of IoT 35 WebSocket based communication API WebSocket API allow bi directional, full duplex communication between client and server. Unlike request-response API allow full duplex communication and do not require new connection to be set up for each message to be sent. Websocket communication begins with connection setup request send by the client to the server. The request is sent over http and the server interprets it as an upgrade request. If the server support protocol response to the website handshake response after the connection setup the client and the server can send data or messages to each other in full duplex model. WebSocket API reduce network traffic and latency as there is no overhead for connection setup and determination records to each message.
IoT enabling Technologies 36 It is enabled by several Technologies including wireless sensor networks, cloud computing big Data Analytics, embedded system, security protocols and architectures, communication protocols, web service, mobile internet and semantic search engine wireless sensor network Wireless sensor network ( wsn ) comprise of distributed devices with the sensor which are used to monitor the environmental and physical conditions. A WSN consists of a number of end nodes and routers and a coordinator. End nodes have several sensors attached to them. End node can also act as a routers. Routers are responsible for routing the data packet from end nodes to the coordinator. The coordinator node collect the data from all the notes coordinator also act as a Gateway that connects the WSN to the internet .
IoT enabling Technologies 37 IoT systems are described as follows Weather monitoring system using WSN in which the nodes collect temperature, humidity and other data which is aggregated and analyzed . Indoor air quality monitoring system using WSN to collect data on the indoor air quality and connections of various gases. Soil moisture monitoring system using WSN to monitor soil moisture at various location. Surveillance systems use WSN for collecting surveillance data(motion detection data) Smart grid use wireless sensor network for monitoring the grid at various point. Structural health monitoring systems use WSN to monitor the health of structure by writing vibration data from sensor nodes deployed at various points in the structure
IoT enabling Technologies 38 Cloud computing Cloud Computing is a transformative computing paradigm that involves delivering applications and services over the internet. Cloud Computing involves provisioning of computing networking and storage resources on demand and providing these resources as metered services to the users, in a “ pay as you go” model. cloud Computing resources can be provisioned on demand by the user without requiring interactions with the Cloud Service Provider Infrastructure as a service(IAAS) : IaaS provides the user the ability provision computing and storage resources. These resources are provided to the users as virtual machine instances and virtual storage. Users can start, stop configure and manage the virtual machines instance on the virtual storage using can deploy operating systems and applications on their choice on the actual resources provisions in the cloud . Cloud Service Provider manages the underlying infrastructure.
IoT enabling Technologies 39 Platform as a service( PaaS ) : Platform as a service provides the user the ability to develop and deploy application in the cloud using the deployment tool application programming interfaces API, software libraries and services provided by the Cloud Service Provider. The Cloud Service Provider manages the underlying cloud infrastructure including servers, network, operating systems and storage . Software as a service( SaaS ) : Provide the user a complete software applications of the user interface to the application itself. The Cloud Service Provider manage the underlying cloud infrastructure including server, network storage and application software, and the user is unaware of the underlying architecture of the cloud. Applications are provided to the user through a thin client interface example Browser application. SaaS applications are accessed from various client smartphones running different operating system.
IoT enabling Technologies 40 Big Data Analytics Big data is defined as collections of data set whose volume, velocity in terms of its temporal variations )or variety, is so large that it is difficult to store, manage, process and analyze the data using traditional database and data processing tools. Big Data Analytics involving several steps starting from Data cleaning data munging data processing and visualization. Some examples of big data generated by IoT systems are described as follows 1. Sensor data generated by IoT system such as weather monitoring stations 2. Machine sensor data collected from sensor embedded in Industrial and energy system for monitoring their files and protecting failure 3. Health and fitness data generated by IoT devices such as wearable fitness band. 4. Data generated by IoT system for Location tracking of vehicle. 5. Data generated by retail inventory monitoring system
IoT enabling Technologies 41 Characteristics of data include Volume: Through there is no fixed threshold for volume of data to be considered as big data, however the term big data is used for massive scale data that is difficult to store, manage and process using traditional data bases and data processing architecture. Velocity: Velocity is another important characteristics of big data and the primary reasons for exponential growth of data velocity of the data of a store how fast the data is generated and how frequently it varies. Modern IT Industrial and other systems are generating data at increasing the highest speeds. Variety: Variety refers to the forms of the data. Big data comes in for different forms such as structured or unstructured data including text data, audio, video and sensor data .
IoT enabling Technologies 42 Communications protocol Communications protocols form the backbone of IoT system and enable network connectivity and coupling to applications. Communications protocols allow device to exchange data over the network. These protocols define the data exchange formats and data encoding schemes for devices and routing of packets from source to destination. Other function of the protocol include sequence control flow control and transmissions of Lost packet
IoT enabling Technologies 43 Embedded systems An Embedded system is computer system that has computer hardware and software embedded perform specific task. In contrast to general purpose computers or personal computers which can perform various types of tasks, embedded systems are designed to perform a specific set of tasks. Embedded system include Microprocessor and Microcontroller memory Ram ROM cache networking units (Ethernet WI-FI adaptor) input/output unit display keyboard , display and storage such as Flash Memory some embedded system have specialist processes such as digital signal processor DSP graphic processor and application.
IoT enabling Technologies 44 Embedded systems An Embedded system is computer system that has computer hardware and software embedded perform specific task. In contrast to general purpose computers or personal computers which can perform various types of tasks, embedded systems are designed to perform a specific set of tasks. Embedded system include Microprocessor and Microcontroller memory Ram ROM cache networking units (Ethernet WI-FI adaptor) input/output unit display keyboard , display and storage such as Flash Memory some embedded system have specialist processes such as digital signal processor DSP graphic processor and application.
IoT enabling Technologies 45 IoT system comprises of the following components 1.Device : An IoT device allow identification, remote sensing, actuating and remote monitoring capabilities. 2. Resources : Resources are software components on the device for accessing and storing information for controlling actuator connected to the device also include software components that enable network access for the device 3.controller service: Controller Service is a native service that runs on the device and interact with the web services. Controller service sends data from the device to the web service receive command from the application from controlling the device. 4. Database: Database can be either local or in the cloud and stores the data generated by the IoT device. 5. Web service: Serve as a link between the device, application database and analysis components. Web Services can be implemented using HTTP and REST principles or using website protocol.
IoT and M2M 46 M2M Machine to machine (M2M) refers to networking of Machines for the purpose of remote monitoring and control and data exchange. The end-to-end architecture for M2M systems comprising of M2M area networks, Communications Network and application domain. An M2M area network comprises of machines which have embedded hardware module for sensing actuation and communication. Various Communication protocols can be used for M2M local area network such as Zigbee , Bluetooth , Modbus M –bus, wireless, power LINE Communication ,6LoWPAN
IoT and M2M 47 These Communications protocols provide connectivity between M2M nodes within and M2M area network. The Communications Network provides connectivity to remote m2m area network. communication network can use wired or wireless network. The M2M area network use either proprietary or non IP based protocol. The communication between the M2M nodes and the M2M Gateway is based on the communication protocol. M2M Gateway protocol translation to enable IP connectivity for M2M . M2M Gateway act as a proxy performing translation from / to native protocol to M2M area network. M2M data is gathered into point solution such as enterprise applications, service management application for remote monitoring applications. M2M has various application domain such as smart metering, Home Automation , industrial Automation, smart grid.
DIFFERENCE BETWEEN IOT AND M2M 48 Basis of IoT M2M Abbreviation Internet of Things Machine to Machine Intelligence Devices have objects that are responsible for decision making Some degree of intelligence is observed in this. Connection type used The connection is via Network and using various communication types. The connection is a point to point Communication protocol used Internet protocols are used such as HTTP , FTP , and Telnet . Traditional protocols and communication technology techniques are used Data Sharing Data is shared between other applications that are used to improve the end-user experience. Data is shared with only the communicating parties.
Internet Internet connection is required for communication Devices are not dependent on the Internet. Type of Communication It supports cloud communication It supports point-to-point communication. Computer System Involves the usage of both Hardware and Software. Mostly hardware-based technology Scope A large number of devices yet scope is large. Limited Scope for devices. Examples Smart wearables , Big Data and Cloud, etc. Sensors, Data and Information, etc. Business Type used Business 2 Business(B2B) and Business 2 Consumer(B2C) Business 2 Business (B2B) Open API support Supports Open API integrations. There is no support for Open APIs
Cloud computing
Cloud computing - Introduction Cloud computing takes the technology, services and applications that are similar to those on the internet and turn them into a self-service utility. Generally speaking, cloud computing can be thought of as anything that involves delivering hosted services over the Internet. According to NIST Cloud computing is a model for enabling ubiquitous, convenient, on-demand network access to a shared pool of configurable computing resources (e.g., networks, servers, storage, applications, and services) that can be rapidly provisioned and released with minimal management effort or service provider interaction. 51 07-10-2024 20AD205 CCE- S.BHAGGIARAJ
What it provides? Cloud computing provides shared services as opposed to local servers or storage resources Enables access to information from most web-enabled hardware Allows for cost savings – reduced facility, hardware/software investments, support 52 07-10-2024 20AD205 CCE- S.BHAGGIARAJ
Cloud Computing Architecture
Cloud computing architecture refers to the components and sub components required for cloud computing. These component typically refer to: Front end(fat client, thin client) Back end platforms( servers,storage ) Cloud based delivery and a network(Internet, Intranet, Inter cloud). 07-10-2024 20AD205 CCE- S.BHAGGIARAJ
Hosting a cloud: There are three layers in cloud computing.Companies use these layers based on the service they provide. Infrastructure Platform Application 07-10-2024 20AD205 CCE- S.BHAGGIARAJ At the bottom is the foundation, the Infrastructure where the people start and begin to build. This is the layer where the cloud hosting lives.
Benefits of Cloud Hosting : Scalability: With Cloud hosting, it is easy to grow and shrink the number and size of servers based on the need. This is done by either increasing or decreasing the resources in the cloud. This ability to alter plans due to fluctuation in business size and needs is a superb benefit of cloud computing especially when experiencing a sudden growth in demand. Instant: Whatever you want is instantly available in the cloud. Reliability: Rather than being hosted on one single instances of a physical server, hosting is delivered on a virtual partition which draws its resource, such as disk space, from an extensive network of underlying physical servers. If one server goes offline it will have no effect on availability, as the virtual servers will continue to pull resource from the remaining network of servers. 07-10-2024 20AD205 CCE- S.BHAGGIARAJ
Save Money: An advantage of cloud computing is the reduction in hardware cost. Instead of purchasing in-house equipment, hardware needs are left to the vendor. For companies that are growing rapidly, new hardware can be a large, expensive, and inconvenience. Cloud computing alleviates these issues because resources can be acquired quickly and easily. Even better, the cost of repairing or replacing equipment is passed to the vendors. Along with purchase cost, off-site hardware cuts internal power costs and saves space. Large data centers can take up precious office space and produce a large amount of heat. Moving to cloud applications or storage can help maximize space and significantly cut energy expenditures. 07-10-2024 20AD205 CCE- S.BHAGGIARAJ
Physical Security: The underlying physical servers are still housed within data centres and so benefit from the security measures that those facilities implement to prevent people accessing or disrupting them on-site 07-10-2024 20AD205 CCE- S.BHAGGIARAJ
Essential Characteristics On-demand self-service A consumer can unilaterally provision computing capabilities, such as server time and network storage, as needed automatically without requiring human interaction with each service provider. Broad network access Capabilities are available over the network and accessed through standard mechanisms that promote use by heterogeneous thin or thick client platforms (e.g., mobile phones, tablets, laptops, and workstations). Resource pooling The provider’s computing resources are pooled to serve multiple consumers Resources can be dynamically assigned and reassigned according to customer demand Customer generally may not care where the resources are physically located but should be aware of risks if they are located offshore 61 07-10-2024 20AD205 CCE- S.BHAGGIARAJ
Essential Characteristics Rapid elasticity Capabilities can be expanded or released automatically ( i.e.,more cpu power, or ability to handle additional users) To the customer this appears seamless, limitless, and responsive to their changing requirements Measured service Customers are charged for the services they use and the amounts There is a metering concept where customer resource usage can be monitored, controlled, and reported, providing transparency for both the provider and consumer of the utilized service 62 07-10-2024 20AD205 CCE- S.BHAGGIARAJ
Essential Characteristics Abstraction Cloud computing abstracts the details of system implementation from users and developers. Application run on physical systems that are not specified, data is stored in locations that are unknown. Virtualization Cloud computing virtualizes systems by pooling and sharing resources. Systems and storage can be provisioned as needed from a centralized server, costs are assessed on a metered basis. 63 07-10-2024 20AD205 CCE- S.BHAGGIARAJ
Different Cloud Computing Layers Application Service (SaaS) Application Platform(PaaS) Server Platform(IaaS) Storage Platform(IaaS) Amazon S3, Dell, Apple, ... 3Tera, EC2, SliceHost, GoGrid, RightScale, Linode Google App Engine, Mosso, Force.com, Engine Yard, Facebook, Heroku, AWS MS Live/ExchangeLabs, IBM, Google Apps; Salesforce.com Quicken Online, Zoho, Cisco 65 07-10-2024 16IT212 – CLOUD COMPUTING AND VIRTUALIZATION
Merits of Cloud Computing Cost: Well with all the required software and even hard drives accessible from the cloud, the budget of the business is greatly reduced. There are no infrastructure costs or other Capex (capital expenses). End to expensive servers, routers, etc. When the business is having less or very optimum investment then cloud is the right option. However the expense in cloud scenario is “all or nothing” policy. Easy to learn and use: If you have used Gmail, Google Docs, then cloud is nothing new to you. Since the staff would be a well expertise in Gmail and other basic cloud concepts, no special training is required; thereby satisfying the time and the cost constraint. Obviously, now there would no need to hire experienced expensive IT professionals, since this application is a trouble-free one. 66 07-10-2024 16IT212 – CLOUD COMPUTING AND VIRTUALIZATION
Merits of Cloud Computing Flexibility: Documents, software, hard drive, storage equipment, etc anything can be accessed from anywhere through cloud; hence no need for the staffs to be office to do the work. Moreover this allows staff to work at anytime thus increasing staff morale. Maintenance: No more software updates, reinstalling of applications or even sorting out of software problems since these problems would be sorted out remotely, thus the employee can concentrate more on his/her own work. 07-10-2024 16IT212 – CLOUD COMPUTING AND VIRTUALIZATION 67
Demerits of Cloud computing Security: Security is the X-Factor for any business. Just imagine your data being visible to all, or maybe your business strategies visible to all? Negative point, right? That’s what the scenario in cloud computing is; your data will be shared with other companies on the same platform. Of course your cloud vendor will have a higher level of security than the one you have in-house. Still regarding security cloud can’t be rated excellent. Intellectual property (IP) issues: There can be a bit chaos as most cloud providers will have different requisites and conditions regarding tenure of the data. To overcome this demerit, you must have read the fine print and understand things like when can you access your data, what happens to your data is your vendor ebbs, distribution rights, etc initially. Also keep an eye on the rules to know whether breach of any kind may occur for your IP. 68 07-10-2024 16IT212 – CLOUD COMPUTING AND VIRTUALIZATION
Demerits of Cloud computing Wireless connections: Connecting to wireless devices is not the easiest task to do. This problem is for small scale industries rather than larger business since larger companies have well structured network thus making wireless connections easy. Sometimes certain softwares are designed to relate to certain PCs alone in that case even usage of software maybe a problem. Performance and Reliability: Since everything you access is online, there might be a risk in CIA parameters (Confidentiality, Integrity, and Availability). Moreover the speed of your process depends on the speed of the network (when there is network traffic, the speed of our process may collapse). Additionally there can be noise in the media if any major application is down. In order to overcome this you must review the SLA (Service Level Agreement 07-10-2024 16IT212 – CLOUD COMPUTING AND VIRTUALIZATION 69
Who Benefits from Cloud Computing Collaborators Road Warriors Cost-Conscious Users Cost-Conscious IT Departments Users with Increasing Needs 07-10-2024 16IT212 – CLOUD COMPUTING AND VIRTUALIZATION 70
Top Cloud Service Providers Amazon Web Services (AWS), Elastic Compute Cloud (EC2), Simple Storage Service (S3), andVirtual Private Cloud (VPC) Microsoft Azure Google Apps ( AppEngine ) VMWare – vSphere (Virtualization) IBM Smart Business, Cloudburst Rackspace Red Hat 71 07-10-2024 16IT212 – CLOUD COMPUTING AND VIRTUALIZATION
Some Commercial Cloud Offerings 72 07-10-2024 16IT212 – CLOUD COMPUTING AND VIRTUALIZATION
Services Application Development Platform Storage Hosting Computing Service Layers 73 Description Services – Complete business services such as PayPal, OpenID, OAuth, Google Maps, Alexa Services Application Focused Infrastructure Focused Application – Cloud based software that eliminates the need for local installation such as Google Apps, Microsoft Online Storage – Data storage or cloud based NAS such as CTERA, iDisk, CloudNAS Development – Software development platforms used to build custom cloud based applications (PAAS & SAAS) such as SalesForce Platform – Cloud based platforms, typically provided using virtualization, such as Amazon ECC, Sun Grid Hosting – Physical data centers such as those run by IBM, HP, NaviSite, etc. 07-10-2024 16IT212 – CLOUD COMPUTING AND VIRTUALIZATION
Advantages of Cloud Development Lower-Cost Computers for Users Improved Performance Lower IT Infrastructure Costs Fewer Maintenance Issues Lower Software Costs Instant Software Updates Increased Computing Power Unlimited Storage Capacity 74 07-10-2024 16IT212 – CLOUD COMPUTING AND VIRTUALIZATION
Disadvantages of Cloud Development Is it secure? if the cloud computing host goes offline. (Amazon’s EC2 service suffered a massive outage on February 15, 2008 ) Platform go down and your data disappear third-party cloud platform no other physical backup, that data can be at risk 07-10-2024 16IT212 – CLOUD COMPUTING AND VIRTUALIZATION 75
Pros and Cons 07-10-2024 16IT212 – CLOUD COMPUTING AND VIRTUALIZATION 76
Service Models 77 07-10-2024 20AD205 CCE- S.BHAGGIARAJ
Basic Important Service Models 78 78 07-10-2024 16IT212 – CLOUD COMPUTING AND VIRTUALIZATION
Cloud Computing can be defined as the practice of using a network of remote servers hosted on the Internet to store, manage, and process data, rather than a local server or a personal computer. Companies offering such kinds of cloud computing services are called cloud providers and typically charge for cloud computing services based on usage. Grids and clusters are the foundations for cloud computing. Types of Cloud Computing Most cloud computing services fall into five broad categories: Software as a service ( SaaS ) Platform as a service ( PaaS ) Infrastructure as a service ( IaaS ) Anything/Everything as a service ( XaaS ) Function as a Service ( FaaS ) 79
Software as a Service( SaaS ) Software-as-a-Service ( SaaS ) is a way of delivering services and applications over the Internet. Instead of installing and maintaining software, we simply access it via the Internet, freeing ourselves from the complex software and hardware management. It removes the need to install and run applications on our own computers or in the data centers eliminating the expenses of hardware as well as software maintenance. SaaS provides a complete software solution that you purchase on a pay-as-you-go basis from a cloud service provider. Most SaaS applications can be run directly from a web browser without any downloads or installations required. The SaaS applications are sometimes called Web-based software, on-demand software, or hosted software. 80
Advantages of SaaS Cost-Effective: Pay only for what you use. Reduced time: Users can run most SaaS apps directly from their web browser without needing to download and install any software. This reduces the time spent in installation and configuration and can reduce the issues that can get in the way of the software deployment. Accessibility: We can Access app data from anywhere. Automatic updates: Rather than purchasing new software, customers rely on a SaaS provider to automatically perform the updates. Scalability: It allows the users to access the services and features on-demand. 81
Disadvantages of Saas : Limited customization : SaaS solutions are typically not as customizable as on-premises software, meaning that users may have to work within the constraints of the SaaS provider’s platform and may not be able to tailor the software to their specific needs. Dependence on internet connectivity : SaaS solutions are typically cloud-based, which means that they require a stable internet connection to function properly. This can be problematic for users in areas with poor connectivity or for those who need to access the software in offline environments. Security concerns: SaaS providers are responsible for maintaining the security of the data stored on their servers, but there is still a risk of data breaches or other security incidents. Limited control over data: SaaS providers may have access to a user’s data, which can be a concern for organizations that need to maintain strict control over their data for regulatory or other reasons. 82
Platform as a Service PaaS is a category of cloud computing that provides a platform and environment to allow developers to build applications and services over the internet. PaaS services are hosted in the cloud and accessed by users simply via their web browser. A PaaS provider hosts the hardware and software on its own infrastructure. As a result, PaaS frees users from having to install in-house hardware and software to develop or run a new application. Thus, the development and deployment of the application take place independent of the hardware. The consumer does not manage or control the underlying cloud infrastructure including network, servers, operating systems, or storage, but has control over the deployed applications and possibly configuration settings for the application-hosting environment. To make it simple, take the example of an annual day function, you will have two options either to create a venue or to rent a venue but the function is the same. 83
Advantages of PaaS : Simple and convenient for users: It provides much of the infrastructure and other IT services, which users can access anywhere via a web browser. Cost-Effective: It charges for the services provided on a per-use basis thus eliminating the expenses one may have for on-premises hardware and software. Efficiently managing the lifecycle: It is designed to support the complete web application lifecycle: building, testing, deploying, managing, and updating. Efficiency: It allows for higher-level programming with reduced complexity thus, the overall development of the application can be more effective. 84
Disadvantages of Paas : Limited control over infrastructure: PaaS providers typically manage the underlying infrastructure and take care of maintenance and updates, but this can also mean that users have less control over the environment and may not be able to make certain customizations. Dependence on the provider : Users are dependent on the PaaS provider for the availability, scalability, and reliability of the platform, which can be a risk if the provider experiences outages or other issues. Limited flexibility: PaaS solutions may not be able to accommodate certain types of workloads or applications, which can limit the value of the solution for certain organizations. 85
Infrastructure as a Service Infrastructure as a service ( IaaS ) is a service model that delivers computer infrastructure on an outsourced basis to support various operations. Typically IaaS is a service where infrastructure is provided as outsourcing to enterprises such as networking equipment, devices, database, and web servers. It is also known as Hardware as a Service ( HaaS ). IaaS customers pay on a per-user basis, typically by the hour, week, or month. Some providers also charge customers based on the amount of virtual machine space they use. It simply provides the underlying operating systems, security, networking, and servers for developing such applications, and services, and deploying development tools, databases, etc. 86
Advantages of IaaS : Cost-Effective: Eliminates capital expense and reduces ongoing cost and IaaS customers pay on a per-user basis, typically by the hour, week, or month. Website hosting: Running websites using IaaS can be less expensive than traditional web hosting. Security: The IaaS Cloud Provider may provide better security than your existing software. Maintenance: There is no need to manage the underlying data center or the introduction of new releases of the development or underlying software. This is all handled by the IaaS Cloud Provider. 87
Disadvantages of laaS : Limited control over infrastructure: IaaS providers typically manage the underlying infrastructure and take care of maintenance and updates, but this can also mean that users have less control over the environment and may not be able to make certain customizations. Security concerns : Users are responsible for securing their own data and applications, which can be a significant undertaking. Limited access: Cloud computing may not be accessible in certain regions and countries due to legal policies. 88
Anything as a Service It is also known as Everything as a Service. Most of the cloud service providers nowadays offer anything as a service that is a compilation of all of the above services including some additional services. Advantages of XaaS : Scalability: XaaS solutions can be easily scaled up or down to meet the changing needs of an organization. Flexibility: XaaS solutions can be used to provide a wide range of services, such as storage, databases, networking, and software, which can be customized to meet the specific needs of an organization. Cost-effectiveness : XaaS solutions can be more cost-effective than traditional on-premises solutions, as organizations only pay for the services. 89
Disadvantages of XaaS : Dependence on the provider: Users are dependent on the XaaS provider for the availability, scalability, and reliability of the service, which can be a risk if the provider experiences outages or other issues. Limited flexibility : XaaS solutions may not be able to accommodate certain types of workloads or applications, which can limit the value of the solution for certain organizations. Limited integration: XaaS solutions may not be able to integrate with existing systems and data sources, which can limit the value of the solution for certain organizations. 90
Function as a Service : FaaS is a type of cloud computing service. It provides a platform for its users or customers to develop, compute, run and deploy the code or entire application as functions. It allows the user to entirely develop the code and update it at any time without worrying about the maintenance of the underlying infrastructure. The developed code can be executed with response to the specific event. It is also as same as PaaS . FaaS is an event-driven execution model. It is implemented in the serverless container. When the application is developed completely, the user will now trigger the event to execute the code. Now, the triggered event makes response and activates the servers to execute it. The servers are nothing but the Linux servers or any other servers which is managed by the vendor completely. 91
Customer does not have clue about any servers which is why they do not need to maintain the server hence it is serverless architecture. Both PaaS and FaaS are providing the same functionality but there is still some differentiation in terms of Scalability and Cost. FaaS , provides auto-scaling up and scaling down depending upon the demand. PaaS also provides scalability but here users have to configure the scaling parameter depending upon the demand. In FaaS , users only have to pay for the number of execution time happened. In PaaS , users have to pay for the amount based on pay-as-you-go price regardless of how much or less they use. 92
Advantages of FaaS : Highly Scalable: Auto scaling is done by the provider depending upon the demand. Cost-Effective: Pay only for the number of events executed. Code Simplification: FaaS allows the users to upload the entire application all at once. It allows you to write code for independent functions or similar to those functions. Maintenance of code is enough and no need to worry about the servers. Functions can be written in any programming language. Less control over the system. 93
Disadvantages of FaaS : Cold start latency : Since FaaS functions are event-triggered, the first request to a new function may experience increased latency as the function container is created and initialized. Limited control over infrastructure: FaaS providers typically manage the underlying infrastructure and take care of maintenance and updates, but this can also mean that users have less control over the environment and may not be able to make certain customizations. Security concerns: Users are responsible for securing their own data and applications, which can be a significant undertaking. Limited scalability : FaaS functions may not be able to handle high traffic or large number of requests. 94
Deployment Models 96 96 07-10-2024 16IT212 – CLOUD COMPUTING AND VIRTUALIZATION In cloud computing, we have access to a shared pool of computer resources (servers, storage, programs, and so on) in the cloud. You simply need to request additional resources when you require them. Getting resources up and running quickly is a breeze thanks to the clouds. It is possible to release resources that are no longer necessary. This method allows you to just pay for what you use. Your cloud provider is in charge of all upkeep.
Public Cloud The public cloud makes it possible for anybody to access systems and services. The public cloud may be less secure as it is open to everyone. The public cloud is one in which cloud infrastructure services are provided over the internet to the general people or major industry groups. The infrastructure in this cloud model is owned by the entity that delivers the cloud services, not by the consumer. It is a type of cloud hosting that allows customers and users to easily access systems and services. This form of cloud computing is an excellent example of cloud hosting, in which service providers supply services to a variety of customers. In this arrangement, storage backup and retrieval services are given for free, as a subscription, or on a per-user basis. For example, Google App Engine etc. 97
98
Advantages of the Public Cloud Model Minimal Investment: Because it is a pay-per-use service, there is no substantial upfront fee, making it excellent for enterprises that require immediate access to resources. No setup cost: The entire infrastructure is fully subsidized by the cloud service providers, thus there is no need to set up any hardware. Infrastructure Management is not required: Using the public cloud does not necessitate infrastructure management. No maintenance: The maintenance work is done by the service provider (not users). Dynamic Scalability: To fulfill your company’s needs, on-demand resources are accessible. Disadvantages of the Public Cloud Model Less secure: Public cloud is less secure as resources are public so there is no guarantee of high-level security. Low customization: It is accessed by many public so it can’t be customized according to personal requirements. 99
Private Cloud The private cloud deployment model is the exact opposite of the public cloud deployment model. It’s a one-on-one environment for a single user (customer). There is no need to share your hardware with anyone else. The distinction between private and public clouds is in how you handle all of the hardware. It is also called the “internal cloud” & it refers to the ability to access systems and services within a given border or organization. The cloud platform is implemented in a cloud-based secure environment that is protected by powerful firewalls and under the supervision of an organization’s IT department. The private cloud gives greater flexibility of control over cloud resources. 100
101
Advantages of the Private Cloud Model Better Control: You are the sole owner of the property. You gain complete command over service integration, IT operations, policies, and user behavior. Data Security and Privacy: It’s suitable for storing corporate information to which only authorized staff have access. By segmenting resources within the same infrastructure, improved access and security can be achieved. Supports Legacy Systems: This approach is designed to work with legacy systems that are unable to access the public cloud. Customization: Unlike a public cloud deployment, a private cloud allows a company to tailor its solution to meet its specific needs. Disadvantages of the Private Cloud Model Less scalable: Private clouds are scaled within a certain range as there is less number of clients. Costly: Private clouds are more costly as they provide personalized facilities. 102
Hybrid Cloud By bridging the public and private worlds with a layer of proprietary software, hybrid cloud computing gives the best of both worlds. With a hybrid solution, you may host the app in a safe environment while taking advantage of the public cloud’s cost savings. Organizations can move data and applications between different clouds using a combination of two or more cloud deployment methods, depending on their needs. 103
104
Advantages of the Hybrid Cloud Model Flexibility and control: Businesses with more flexibility can design personalized solutions that meet their particular needs. Cost: Because public clouds provide scalability, you’ll only be responsible for paying for the extra capacity if you require it. Security: Because data is properly separated, the chances of data theft by attackers are considerably reduced. Disadvantages of the Hybrid Cloud Model Difficult to manage: Hybrid clouds are difficult to manage as it is a combination of both public and private cloud. So, it is complex. Slow data transmission: Data transmission in the hybrid cloud takes place through the public cloud so latency occurs. 105
Community Cloud It allows systems and services to be accessible by a group of organizations. It is a distributed system that is created by integrating the services of different clouds to address the specific needs of a community, industry, or business. The infrastructure of the community could be shared between the organization which has shared concerns or tasks. It is generally managed by a third party or by the combination of one or more organizations in the community. 106
107
Advantages of the Community Cloud Model Cost Effective: It is cost-effective because the cloud is shared by multiple organizations or communities. Security: Community cloud provides better security. Shared resources: It allows you to share resources, infrastructure, etc. with multiple organizations. Collaboration and data sharing: It is suitable for both collaboration and data sharing. Disadvantages of the Community Cloud Model Limited Scalability: Community cloud is relatively less scalable as many organizations share the same resources according to their collaborative interests. Rigid in customization: As the data and resources are shared among different organizations according to their mutual interests if an organization wants some changes according to their needs they cannot do so because it will have an impact on other organizations. 108
Multi-Cloud We’re talking about employing multiple cloud providers at the same time under this paradigm, as the name implies. It’s similar to the hybrid cloud deployment approach, which combines public and private cloud resources. Instead of merging private and public clouds, multi-cloud uses many public clouds. Although public cloud providers provide numerous tools to improve the reliability of their services, mishaps still occur. It’s quite rare that two distinct clouds would have an incident at the same moment. As a result, multi-cloud deployment improves the high availability of your services even more. 109
110
Advantages of the Multi-Cloud Model You can mix and match the best features of each cloud provider’s services to suit the demands of your apps, workloads, and business by choosing different cloud providers. Reduced Latency: To reduce latency and improve user experience, you can choose cloud regions and zones that are close to your clients. High availability of service: It’s quite rare that two distinct clouds would have an incident at the same moment. So, the multi-cloud deployment improves the high availability of your services. Disadvantages of the Multi-Cloud Model Complex: The combination of many clouds makes the system complex and bottlenecks may occur. Security issue: Due to the complex structure, there may be loopholes to which a hacker can take advantage hence, makes the data insecure. 111
Case Study 112 07-10-2024 20AD205 CCE- S.BHAGGIARAJ
Case Study: Air Quality Monitoring System and Data Logger IoT (Internet of Things) has become an integral part of our lives and it has already made an impact in various sectors, including the environment. Air pollution is a severe problem that has been affecting our planet for years. Therefore, there is a need for a reliable and efficient air pollution monitoring system to protect ourselves from its hazardous effects. An IoT -based air pollution monitoring system is an ideal solution that can provide real-time data and insights about the air quality in a particular area. An IoT based air pollution monitoring system consists of several hardware and software components that work together to collect and process data. The hardware components include sensors, microcontrollers, and communication modules. The software components consist of a cloud platform, a mobile application, and a web-based dashboard. 113
The IoT -based air pollution monitoring system provides several benefits over traditional air pollution monitoring systems. It can collect real-time data from multiple locations, which then analyzed to identify the sources of pollution. It helps to take necessary measures to reduce it. The system can also alert the users if the air quality reaches a dangerous level, allowing them to take precautions to protect themselves. 114
IoT -based air pollution monitoring systems comprise several components that work together to collect and analyze air quality data. The components include: Sensors : Sensors are the primary components of IoT -based air pollution monitoring systems. They measure various air quality parameters such as particulate matter, carbon monoxide, sulfur dioxide, and nitrogen oxides. The sensors can be classified into two categories: physical and chemical sensors. Physical sensors measure parameters such as temperature, humidity, and pressure, while chemical sensors measure air pollutants. Microcontroller : The microcontroller is the brain of IoT -based air pollution monitoring systems. It receives data from the sensors, processes it, and sends it to the cloud server. The microcontroller is usually a microprocessor such as Arduino , Raspberry Pi, or similar devices. 115
Communication Module : The communication module is responsible for transmitting data from the microcontroller to the cloud server. Communication modules can use various wireless technologies such as Wi-Fi, Bluetooth, or cellular networks. Cloud Server : The cloud server is a centralized platform for storing, analyzing, and sharing air quality data. It collects data from the communication module and stores it in a database. The cloud server also provides web and mobile applications for users to access the data. Power Supply : IoT -based air pollution monitoring systems require a power supply to operate. In case of permanent installations external power supply is provided and batteries are provided for portable devices. Enclosure : The enclosure is the outer covering that protects the components from environmental factors such as dust, water, and temperature. 116
How does IoT reduce air pollution? IoT (Internet of Things) plays a crucial role in reducing air pollution through its ability to collect real-time data and enable smart decision-making. IoT devices, such as air quality sensors, can monitor pollutant levels in various environments, including cities, industries, and homes. This data can be analyzed to identify pollution sources, implement targeted mitigation strategies, and track the effectiveness of pollution control measures. IoT -enabled smart city solutions optimize transportation, waste management, and energy consumption, reducing emissions and improving air quality. Furthermore, IoT -based personal air quality monitors empower individuals to make informed choices and avoid high-pollution areas. By leveraging IoT technology, we can proactively address air pollution, create sustainable solutions, and promote healthier environments for present and future generations. 117
How IoT Based Air and Sound Pollution Monitoring System is Implemented? An IoT -based air and sound pollution monitoring system is implemented using a network of sensors, connectivity technologies, and data analytics platforms. Air quality sensors are deployed in strategic locations to measure pollutant levels such as particulate matter, gases, and volatile organic compounds (VOCs). Sound sensors capture noise levels and patterns in the environment. These sensors are connected to a central data management system through wireless or wired communication protocols. The collected data is then processed and analyzed in real-time, leveraging cloud-based analytics platforms. Users can access the monitoring system through web or mobile applications, which provide visualizations, alerts, and historical data. This allows authorities, environmental agencies, and individuals to monitor pollution levels, identify hotspots, and take necessary actions for pollution control and mitigation. The system can also integrate with existing infrastructure such as smart city platforms or industrial monitoring systems to provide a comprehensive view of environmental conditions and enable effective decision-making. 118
Case Study: Landslide Detection and Disaster Management Landslides are one of the most dangerous and destructive natural hazards that cause significant damage to economic objects and human lives. The movement rate of landslides varies from the slow movement of material in millimetres or centimetres range per year to a sudden avalanche of a large quantity of debris (Pradhan, S. P. et. al., 2019). Landslides are nothing but a mass movement of rock, soil, or debris, down a slope. According to The Hindu, Landslides are the third biggest natural disaster worldwide. About 15% of India’s land is prone to landslides. And India has the highest number of landslide deaths in the world. So, there is a necessity to have an IoT based early landslide detection and warning system. 119
HOW DOES IOT BASED EARLY LANDSLIDE DETECTION SYSTEM WORK? IoT based Landslide detection system uses Sensors, Gateway, Cloud, and Mobile or Web application. Landslides are dynamic phenomena; they depend on various environmental variables. Landslides depend on Rainfall, Soil moisture, Pore pressure, movement, and Vibration IoT hardware uses sensors like soil moisture sensor, rain gauge, Pore pressure sensor and vibration sensors. Sensors detect the environmental variables of the landslide prone area. All Sensors are installed in specific patterns at different soil layers collectively called Deep Earth Probe (DEP) . This works as a Sensor Node. Every Wireless Sensor Node (WSN) transfers data to the gateway. DEP is either powered by solar energy or battery. Landslides occur on slopes and triggering parameters vary at different regions of the mountains. So, DEP is placed in different mountain regions like crown, middle and toe. Also, DEPs are installed at different depths. All DEPs are programmed separately, according to the terrain and region. Data is characterized and analyzed in the Cloud, based on Machine learning algorithms. The possible landslide alert and real time monitoring data of environmental variables can be seen in mobile applications. The IoT based Landslide detection system is able to predict possible landslides. 120
DIFFERENT LANDSLIDE ZONES IN INDIA Landslides can occur in a wide range of geographical areas. In mountainous and hilly areas, it is in the form of rockfall and mudflows. In Slopes and Riverbeds areas, it is in the form of debris flow. Landslides are prone in coastal areas and underwater structures due to continuous tides. List of Landslide Hazard zones in India as classified by National Disaster Management Authority (NDMA) : Very high Hazards: These areas are prone to earthquakes and receive heavy rainfall. These areas in India include the Greater himalayan range. In states of J&K, Himachal Pradesh, Uttarakhand , and parts of north eastern states. High hazard: These areas include Himalayan region between Greater Himalaya and Shivalik range. Himalayan states mostly come under high hazard zones. Moderate hazard: Trans himalayan areas of ladakh and Spiti valley of himachal pradesh . Mountains in Meghalaya, Aravali mountains, Rain shadow areas of western and eastern ghats . Mines, due to blasts, come under moderate hazard zones. Low Hazard: It includes the remaining parts of the country. Which are safe from landslides. 121
SENSORS USED FOR EARLY LANDSLIDE DETECTION Soil moisture sensor : It measures the moisture content of soil. Rain gauges : It measures the amount of rainfall an area receives in a particular time. Pore pressure sensor : It is a type of piezometer. It measures pressure of groundwater held within a Soil / Rock. Vibration sensor : It is a type of accelerometer that senses vibrations. It measures the Earth shaking effect. 122
REAL-TIME MONITORING AND EARLY WARNING SYSTEM FOR LANDSLIDES DETECTION Landslides can be detected using Remote sensing techniques. Landslide detection based on Internet of Things ( IoT ) and Wireless Sensor Networks (WSN) offers real time detection, with accuracy and without any human error. Also, WSN captures significant IoT data of the geomorphology of landslide prone areas. Thi data can be monitored remotely. WSN is an emerging, reliable, and inexpensive technology, which offers real-time monitoring over long distances and inhospitable terrains. IoT and WSN use sophisticated communication protocols and analyze complex sensor data. It can not only detect landslides but can also predict them. All this information is accessible to the authorities concerned through the Mobile / Web Application. Concerned authorities like Government agencies, Rescue and rehabilitation teams and Disaster management teams can access all the earth’s environmental variables on a real time basis. Even local people can also get landslide alerts on their mobile through this system. Government agencies can also share Rescue plans with landslide affected peoples. IoT based early landslide detection and monitoring systems provide a complete communication channel. That is to say, from detection to rescuing people, the IoT communication protocol can integrate all these services. 123
CONVENTIONAL LANDSLIDE MONITORING TECHNIQUES Physical inspection requires large teams of Geologists. To visit the area and carry out topographic surveys. Using Strain gauge, Rain gauge, Inclinometer, Pore pressure piezometer etc. Remote sensing concerns satellite-based observation. Both the techniques are inefficient as they are not able to detect and predict landslides. Physical inspection only tells us about possible regions of landslides. Traditional methods are also unable to detect and monitor landslides on a real time basis. Even if we install some sensors to detect landslides. And since a landslide does not only depend on any one variable. So, these methods are prone to trigger false alarms. 124
BENEFITS OF USING IOT BASED LANDSLIDE DETECTION AND WARNING SYSTEM IoT architecture uses various advanced technologies. Like LoRa based wireless sensor network and M2M communication protocol. IoT coupled with Artificial intelligence and Machine learning algorithms. Allows us to build smart solutions for landslide management. 125
Case Study: Smart Motion Detector Smart motion detectors, sometimes referred to as motion sensors or motion-activated sensors, are gadgets that can spot movement in a given space and send out alerts or actions as a result. These gadgets have numerous uses in home automation, security, and energy conservation. With the use of infrared and temperature sensors, it can identify persons based on their body heat and size. Additionally, the Detector's sophisticated motion sensors filter out unimportant movements brought on by reflections or wind in trees and drapes, preventing needless false alerts. The kind and configuration of the sensor determine the motion detector's detection range. They typically have a detection range of a few feet to a few meters. Motion sensors can be used to detect intruders in homes and businesses. When motion is detected, the sensor can trigger an alarm, send a notification to the homeowner, or turn on the lights . 126
Components of Smart Motion Detectors Sensor: Motion is detected by a sensor utilizing a variety of techniques, such as PIR, microwave, or ultrasonic. Processor/Microcontroller: Examines sensor data, eliminates false alarms, and initiates actions. Communication: Data transfer and integration with other systems or networks are made possible by the communication module. Power source: This source, which can be batteries or mains energy, supplies the required power. Housing/Enclosure: Ensures durability and protects interior components. 127
Importance of Components Sensor: Establishes the range and accuracy of detection. Microcontroller/Processor: Affects the sophistication and performance of the detector. Communication Module: Enables integration into IoT systems and remote monitoring. Power source: Has an impact on maintenance requirements and operational longevity. Housing/Enclosure: Physical protection and environmental appropriateness are ensured through housing and enclosure. 128
Working of PIR-Based Smart Motion Detectors ABOUT PIR SENSOR Passive infrared, also known as PIR, is a crucial motion detection technology. These detectors are frequently employed in home automation, lighting control, and security systems. Within their area of vision, PIR sensors may detect changes in heat (infrared radiation). MOTION DETECTION PROCESS Components: PIR sensor, lenses, and electronic circuitry. Resting State: Sensor segments have roughly equal voltage output. Motion Detection: Moving warm objects cause a voltage difference in sensor segments. Signal Processing: Circuitry converts this voltage difference into a motion signal. Output Activation: Triggers actions such as alarms, lighting control, or automation. 129
COMMUNICATION AND CONNECTIVITY Wireless Connectivity : Utilize Wi-Fi, Zigbee , Z-Wave, or Bluetooth for seamless communication. IoT Integration : Connect to IoT platforms for automation and interaction with various devices. Mesh Networking : Zigbee and Z-Wave use mesh networks to extend range. Cloud Connectivity : Access data and control remotely via cloud services and mobile apps. Voice Control : Enable voice commands through voice assistants like Alexa and Google. Security Protocols : Implement encryption and authentication for data protection. Conclusion : Communication and connectivity are vital for smart motion detectors, enabling them to function within smart ecosystems, providing convenience, security, and automation. 130
CHALLENGES AND CONSIDERATION Environmental Factors : Account for lighting, temperature, and humidity variations. Privacy Concerns : Safeguard user privacy and data compliance. False Alarms : Minimize triggers from pets, insects, and objects. Power Management : Optimize energy use, especially in battery-powered devices. Interference : Mitigate issues caused by wireless device interference. Security : Implement strong security measures against hacking. Customization : Offer user-adjustable settings for flexibility. Compatibility : Ensure integration with diverse platforms. Maintenance : Plan for easy upkeep and updates. 131
51 * 16EC213 EMBEDDED SYSTEMS AND IOT - S.BHAGGIARAJ 132