Unit 1
Unit 1
Unit 1
• Gas sensors, water quality sensors, moisture sensors, and other types
of sensors are examples.
• Processors
• The IoT system's brain is its processor. Their primary duty is to process
the information obtained by the sensors and separate the useful
information from the vast amounts of raw information gathered. In a
single sentence, we may claim that it offers the data intelligence.
• Most processors operate in real-time and are simple for programs to
regulate. They are also in charge of encrypting and decrypting data in
order to secure the data.
• Because they have processors attached to them, embedded hardware
devices, microcontrollers, etc., are the ones that process the data.
• Gateways
• Gateways are in charge of sending the processed data to the
appropriate areas for proper utilization.
• In other words, we can say that a gateway facilitates the
communication of data between two points. It gives the data network
connectivity. Any IoT system must have network connectivity in order
to interact.
• Network gateways include LAN, WAN, PAN, etc.
• Applications
• IoT solutions are made up of several components, including physical devices like
sensors, actuators, and interactive devices, the network that connects them, the
data collected from these devices and analyzed to produce a meaningful
experience, and last but not least, the actual physical environment in which the
user interacts with the solution.
• You also need to conduct study to choose your feature set. You must
carefully consider which features to include and in what order.
2. Take a holistic view
• IoT solutions frequently include both physical and digital touchpoints,
as well as a variety of devices with various capabilities.
• Second, it involves making data security and privacy important design components. Users
must have the confidence that their personal information is secure, that their homes, places
of employment, and ordinary items cannot be compromised, and that their loved ones are
not in danger.
• Thirdly, quality assurance is essential, and it should concentrate on evaluating the entire
system in a real-world setting rather than just the SW
4. Consider the text
• Digital interface commands may have real-world consequences, but unlike
digital commands, real-world consequences often cannot be reversed.
Many unanticipated events can occur in the real world, but users still need
to feel secure and in control.
• IoT solutions are often multi-user systems in homes, offices, and public
spaces, making them less personal than, say, screen-based solutions used
in smartphones. This also considers the social context in which the solution
is utilized and its design needs.
5. Build a strong brand
• No matter how carefully you design things and try to establish trust,
something unexpected will happen at some point and your solution is
going to fail in some way because of the real-world environment of
IoT solutions.
• IoT solutions are also difficult to upgrade because once a connected object is
installed, it is difficult to replace it with a newer model.
• It's essential to get the solution right from the start of implementation due to
these factors and to prevent expensive hardware iterations. From a design
standpoint, this means that early project stages require quick prototyping and
iteration of both the HW and the entire solution. We need new, inventive
approaches to fake the solution and prototype it.
7. Use data responsibly
• IoT systems can potentially produce enormous amounts of data. The
goal is to discover the data points required to make the solution work
and be valuable, not to collect as much data as you can.
• The designer must comprehend the potential of data science and how
to interpret the data because the volume of data may be enormous.
• Data science offers several chances to lower user friction, i.e., to
consume less time, energy, and attention, or to experience less stress.
• Designing successful IoT services requires a thorough understanding
of the data that is available and how it can be used to benefit the
user.
An IoT architecture outline
• The complex arrangement of elements that make up IoT networking
systems, including sensors, actuators, cloud services, protocols, and
layers, is referred to as IoT architecture.
• It is typically separated into layers that let administrators assess, keep
an eye on, and uphold the integrity of the system. Data moves from
connected devices to sensors, through a network, to the cloud for
processing, analysis, and storage in a four-step process known as the
IoT architecture. The Internet of Things is poised to expand much
further with time, offering users fresh and enhanced experiences.
Different layers of IoT architecture
• Depending on the particular business job at hand, different
architectural layers and levels of complexity are used. The most
common and standard architecture is a four-layer one.
• There are four layers present i.e., the Perception Layer, Network
Layer, Processing Layer, and Application Layer.
• Perception/ Sensing layer
• The network technology you choose for your IoT product has
concerns with gateways and routers as well as distance. Ethernet/Wi
Fi is required if you need to connect to the Internet; ZigBee, Z-Wave,
and Bluetooth are available if you are self-contained in a room or
building.
• Features
• Businesses may now add features to their products that were either
impossible or unimaginable without an IoT-connected product. For
updates, maintenance, and new revenue opportunities, you can
obtain direct access to the consumer with the help of these
capabilities.
• User interface
• The choice of a power source should be among the first. All design
choices must take power conservation into account if the item will be
battery-powered. Many networking technologies won't operate well
on batteries. Power selection is also influenced by communication
frequency.
• Size
• Size does matter. Think about how the size of the device will be
affected by the network. Certain networks' requirements for
connectors and antennae will increase the size.
• Antenna
• Products have a user interface to the product and the data thanks to
cloud applications. There are public clouds and private clouds. Most
clouds have a common API that you may use to create your
application.
• Interoperability
• ✓ Platform as a Service (PaaS): Refers to cloud solutions that provide both a computing platform
and a solution stack as a service via the Internet. The customers themselves develop the necessary
software using tools provided by the provider, who also provides the networks, the storage, and the
other distribution services required. Again, the provider manages the underlying cloud
infrastructure, while the customer has control over the deployed applications and possible settings
for the application hosting environment.
• ✓ Infrastructure as a Service (IaaS): In this model, the provider offers virtual machines and other
resources such as hypervisors to customers. Pools of hypervisors support the virtual machines and
allow users to scale resource usage up and down in accordance with their computational
requirements. Users install an OS image and application software on the cloud infrastructure. The
provider manages the underlying cloud infrastructure, while the customer has control over OS,
storage, deployed applications, and possibly some networking components.
• Deployment Models:
• ✓ Private Cloud: The cloud infrastructure is provisioned for exclusive use by a single
organization comprising multiple consumers (e.g. business units). It may be owned,
managed, and operated by the organization, a third party, or some combination of them,
and it may exist on or off premises.
• ✓ Community Cloud: The cloud infrastructure is provisioned for exclusive use by a specific
community of consumers from organizations that have shared concerns (e.g. mission,
security requirements, policy, and compliance considerations). It may be owned, managed,
and operated by one or more of the organizations in the community, a third party, or some
combination of them, and it may exist on or off premises.
• ✓ Public Cloud: The cloud infrastructure is provisioned for open use by the general public.
It may be owned, managed, and operated by a business, academic, or government
organization, or some combination thereof. It exists on the premises of the cloud provider.
• ✓ Hybrid Cloud: The cloud infrastructure is a composition of two or more distinct cloud
infrastructures (private, community, or public) that remain unique entities, but are bound
together by standardized or proprietary technology that enables data and application
portability (e.g. cloud bursting for load balancing between clouds).
M2M and IoT Analytics
• M2M data for advanced analytics and business intelligence are very promising.
• By transforming raw data into actionable intelligence, it’s possible to improve
many areas, such as enhancement of existing products, cost-savings, service
quality, as well as operational efficiency.
• By applying technologies from the Big Data domain, it is possible to store more
data, such as contextual and situational information, and given a more open
approach to data, such as the open-data government initiatives (e.g. Data.gov
and Data.gov.uk), even more understanding can be derived, which can be used to
improve everything from Demand/Response in a power grid to wastewater
treatment in a city
• Descriptive statistics can take you a long way from raw data to actionable
intelligence. Other opportunities are provided by data mining and machine
learning.
• Big Data technologies such as MapReduce for massively parallel
analytics, as well as analytics on online streaming data where the
individual data item is not necessarily stored, will play an important
role in the management and analysis of large-scale M2M data.
• Purposes and considerations
• Regardless of whether you call it statistics, data mining, or machine
learning, there exist a multitude of methods to extract different types of
information from data.
• Some examples of methods and purposes are as follows:
• Descriptive Analytics: Use of means, variances, maxima, minima,
aggregates, and frequencies, optionally grouped by selected
characteristics.
Example: Create Key Performance Indicators (KPI’s) that enable better
understanding of the performance of complex systems such as cellular
networks or oil pipelines.
• Predictive Analytics: Use current and historical facts to predict what
will happen next.
Example: Forecast demand and supply in a power grid and train a
model to predict how price affects electric usage to optimize the
performance and minimize peaks in the electricity consumption.
• Data sources: Data sources refer to the broad variety of sources that
may now be available to build enterprise solutions.
• Data integration: The data integration layer allows data from different
formats to be put together in a manner that can be used by the
information access and knowledge discovery tools.
• Staged Data:
• Staged data is data that has been abstracted to manage the rate at which it is received by the
analysis platform. Essentially, “staged data” allows the correct flow of data to reach information
access and knowledge discovery tools to be retrieved at the correct time.
• There are two main types of data: weak data and strong data.
• Strong Type Data: Strong type data refers to data that is stored in traditional database formats,
i.e. it can be extracted into tabular format and can be subjected to traditional database analysis
techniques. Strong data types often have the analysis defined beforehand, e.g. by SQL queries
written by developers towards a database.
• Weak Type Data: Weak type data is data that is not well structured according to traditional
database techniques. Examples are streaming data or data from sensors. Often, this sort of data
has a different analysis technique compared to strong type data. In this case, it may be that the
data itself defines the nature of the query, rather than being defined by developers and created in
advance. This may allow insights to be identified earlier than in strong type data.
• Processed data
• Processed data is combined data from both strong and weak typed
data that has been combined within an IoT context to create
maximum value for the enterprise in question.
• There are various means by which to do this processing from stripping
data separately and creating relational tables from it or pooling
relevant data together in one combined database for structured
queries.
• Retrieval layer
• Once data has been collated and processed, it is time to develop insights from the
data via retrieval. This can be of two main forms: Information Access and
Knowledge Discovery.
• Information access relates to more traditional access techniques involving the
creation of standardized reports from the collation of strong and weak typed data.
Information access essentially involves displaying the data in a form that is easily
understandable and readable by end users. A variety of information access tools
exist, from SQL visualization to more advanced visualization tools. Knowledge
discovery tools
• Knowledge Discovery, meanwhile, involves the more detailed use of ICT in order
to create knowledge, rather than just information, from the data in question.
• Knowledge Discovery means that decisions may be able to be taken on such
outputs for example, in the case where actuators (rather than just sensors) are
involved, Knowledge Discovery Systems may be able to raise an alert that a bridge
or flood control system may need to be activated.