0% found this document useful (0 votes)
58 views

Internet of Things

Uploaded by

mynavathi.m
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
58 views

Internet of Things

Uploaded by

mynavathi.m
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 8

19EE

E34 - INTERNET OF
THINGS

ASSESSMENT: Theory L T P C
3 0 0 3

COURSE OUTCOMES:
After completing the course successfully, the students will be able to,
CO1: Distinguish the Evolution of IoT
CO2: Identify the architecture, emerging industrial infrastructure and challenges involved
in deployment of IoT.
CO3: Interpret the use of devices, gateways and hardware design constraints in IoT.
CO4: Describe the design principles to realize enterprise integrated Web of Things
CO5: Demonstrate the technical design constraints involved in IoT based industrial
automation
CO6 Apply the application of IoT in Industrial and Commercial Building Automation

M2M To IoT 9
Introduction - Architecture of IoT - Challenges of IoT - M2M to IoT - IoT global context -
Differing Characteristics - Deployment and Operational - IoT reference Model and architecture,
Different communication protocol for secured Cloud services.

IoT FUNDAMENTALS 9
Devices and gateways used in networks - Local and wide area networking - Data management -
Business processes in IoT - Everything as a Service (XaaS),SaaS, PaaS - IoT Analytics –Public
Cloud, Private Cloud and Hybrid Cloud- Input, output Devices and Sensors.

DESIGN PRINCIPLES 9
An emerging industrial structure for IoT - The international driven global value chain - Global
information monopolies - Building architecture - Design principles - Needed capabilities,
Standards considerations. Middleware - Service - oriented architecture based device integration -
SOCRADES - Realizing the enterprise integrated Web of Things - IMC - AESOP.

DESIGN CONSTRAINTS 9
Technical Design constraints - Hardware Design constraints ESP8266, Aurdino, Raspberry pi -
Data base types representation and visualization in different online cloud platforms - Interaction
and remote control. Micro service and Macro service, Introduction to Python and Library files
and its applications.
INDUSTRIAL AUTOMATION AND HOME AUTOMATION 9
Case study: Cisco IoT System, Network connectivity, IOx and Fog Applications, Data analytics,
Security, VPN, Cyber and Physical Management – Skimming Attack, Brute Force attack,
spoofing attack - Automation – Applications..

TOTAL : 45

TEXT BOOKS:
1. Jan Holler, Vlasios Tsiatsis, Catherine Mulligan, Stefan Avesand, Stamatis
Karnouskos and David Boyle, "From Machine -to - Machine to the Internet of
Things: Introduction to a New Age of Intelligence", Academic Press, 1st Edition,
2014.
2. Vijay Madisetti and Arshdeep Bahga, "Internet of Things (A Hands - on -
Approach)", VPT, 1st Edition, 2014

REFERENCE BOOKS:
1. Francis daCosta, "Rethinking the Internet of Things: A Scalable Approach to
st
Connecting Everything", A - press Publications, 1 Edition, 2013.
J.P. Vasseur, A. Dunkels, "Interconnecting Smart Objects with IP: The Next
2.
Internet", Morgan Kaufmann, 2010.
Shriram K. Vasudevan, Abhiishek S Nagarajan, RMD Sundaram “internet of Things”
3.
Wiley Publications, 2nd Edition2020
Coimbatore Institute of Technology

Coimbatore-641014

Department of Electrical and Electronics Engineering

Subject code and Name: 19EEE34 - INTERNET OF THINGS Course Handout

COURSE FACULTY : Dr. M. Packia Sudha

Academic year 2023-2024 Name of the Faculty Dr.M. PACKIASUDHA

Course/Branch B.E – Electrical and Electronics Consulting Hours Wednesday 3.00 pm –


Engineering – V Semester - (July 4.00 pm
2024 to Jan -2025) III EEE ,
Section II

Subject Code/Name 19EEE34 - INTERNET OF Faculty Room L404


THINGS

Semester - V

CO1 : Distinguish the Evolution of IoT

CO2 : Identify the architecture, emerging industrial infrastructure and challenges


involved in deployment of IoT

CO3 : Interpret the use of devices, gateways and hardware design constraints in IoT.

CO4 : Describe the design principles to realize enterprise integrated Web of Things

CO5 : Demonstrate the technical design constraints involved in IoT based industrial
automation

COURSE PLAN

SL.NO TOPICS HOURS


1. M2M To IoT: Introduction - Architecture of IoT - Challenges of
10
IoT - M2M to IoT - IoT global context - Differing Characteristics
- Deployment and Operational - IoT reference Model and
architecture, Different communication protocol for secured Cloud
services.
2. IoT FUNDAMENTALS: Devices and gateways used in networks -
9
Local and wide area networking - Data management - Business
processes in IoT - Everything as a Service (XaaS),SaaS, PaaS -
IoT Analytics –Public Cloud, Private Cloud and Hybrid Cloud-
Input, output Devices and Sensors.
3. Design Principle : An emerging industrial structure for IoT - The
9
international driven global value chain - Global information
monopolies - Building architecture - Design principles - Needed
capabilities, Standards considerations. Middleware - Service -
oriented architecture based device integration - SOCRADES -
Realizing the enterprise integrated Web of Things - IMC -
AESOP.
4. DESIGN CONSTRAINTS: Technical Design constraints - Hardware
Design constraints ESP8266, Aurdino, Raspberry pi - Data base 9
types representation and visualization in different online cloud
platforms - Interaction and remote control. Micro service and
Macro service, Introduction to Python and Library files and its
applications
5. INDUSTRIAL AUTOMATION AND HOME AUTOMATION
8
Case study: Cisco IoT System, Network connectivity, IOx and
Fog Applications, Data analytics, Security, VPN, Cyber and
Physical Management – Skimming Attack, Brute Force attack,
spoofing attack - Automation – Applications.

TOTAL 45

S.no Topics No of Mapping with Mapping Mapping


Hours PO with CO with PEO

UNIT I M2M To IoT


1 Introduction -
. Architecture of IoT 1 PO1 CO1 PEO1

2 - Challenges of IoT -
. M2M to IoT - 1 PO1,PO2,PO3 CO1 PEO1

3 IoT global context -


. Differing 1 PO1,PO2,PO3 CO1 PEO1

Characteristics -

4 Deployment and
. Operational 1 PO2 CO1 PEO1

5 - IoT reference Model


. 1 PO1,PO2,PO3 CO1 PEO1

6 IoT architecture
. 2 PO1,PO2 ,PO3 CO1 PEO1

7 Different
. communication 2 PO1, PO2,PO3 CO1 PEO1

protocol for secured


Cloud services.
8
. Cloud Services 3 PO2,PO3 CO1 PEO1

UNIT II IoT FUNDAMENTALS:


9
. 1 PO1,PO2 CO2 PEO1

1
0 1 PO1 CO2 PEO1
.

11
2 PO1,PO2,PO3 CO2 PEO1

12
2 PO1,PO2,PO3 CO2 PEO1

13
1 PO1 CO2 PEO1

14
1 PO1 CO2 PEO1

15
1 PO1,PO2 CO2 PEO1

16
PO2,PO3 CO2 PEO1

UNIT III Design Principle


17
1 PO1 CO3 PEO1

18 1 PO1 CO3 PEO1

19 1 PO1,PO2,PO3 CO3 PEO1,PEO2


20 1 PO1,PO2,PO3 CO3 PEO1

21 2 PO1,PO2,PO3 CO3 PEO1

22
1 PO1,PO2,PO3 CO3 PEO1

23
2 PO1,PO2,PO3 CO3 PEO1

24
3 PO2,PO3 CO3 PEO1

UNIT IV DESIGN CONSTRAINTS


25
1 PO1 CO4 PEO1

26
2 PO1,PO2 CO4 PEO1

27
1 PO1,PO2 CO4 PEO1

28
2 PO1,PO2 CO4 PEO1

29
1 PO1 CO4 PEO1

30
1 PO1 CO4 PEO1

31
1 PO1 CO4 PEO1

32
3 PO2,PO3 CO4 PEO1

UNIT V INDUSTRIAL AUTOMATION AND HOME AUTOMATION


33
1 PO1 CO5 PEO1

34
2 PO1,PO2,PO3 CO5 PEO1

35
1 PO1,PO2,PO3 CO5 PEO1

36
3 PO1,PO2,PO3 CO5 PEO1
37
1 PO1 CO5 PEO1

38
1 PO1 CO5 PEO1

40
PO2,PO3 CO5 PEO1

TOTAL : 45
HOURS

1. DELIVERY METHODOLOGY

Target Method
Knowledge Transfer
Chalk and Talk

Latest Developments Assignment

The Weak Students Test Paper Discussions

Independent Tutorials on Paper


Learning

Usage of Modern Tutorials through Hands on


Tools

Motivation Quiz / Team Discussions

Critical Thinking Objective Type Questions in Tests

2. INTERNAL MARK SPLITUP

Evaluation Criteria Marks

Mid Semester Test 1 60

Assignments 40

Mid Semester Test 2 60

Assignments 40

internal Total 200

internal 40

End Semester Exam 60


Total 100

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy