0% found this document useful (0 votes)
35 views19 pages

MODULE 4 Updated

Module 4 covers associated IoT technologies and case studies, focusing on cloud computing, virtualization, and agricultural IoT. It outlines key concepts such as cloud models, service-level agreements, and the importance of sensor-clouds, along with real-life applications in agriculture. The module also discusses cloud implementation through open-source and commercial platforms like OpenStack and AWS.

Uploaded by

uvcereports2023
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
35 views19 pages

MODULE 4 Updated

Module 4 covers associated IoT technologies and case studies, focusing on cloud computing, virtualization, and agricultural IoT. It outlines key concepts such as cloud models, service-level agreements, and the importance of sensor-clouds, along with real-life applications in agriculture. The module also discusses cloud implementation through open-source and commercial platforms like OpenStack and AWS.

Uploaded by

uvcereports2023
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd

Module 4

Associated IoT Technologies & IoT Case Studies

• LearningOutcomes
After reading this Module, the student will be able to:
o Understand the concept of cloud computing and itsfeatures.
o Understand virtualization, different cloud models, and service-level agreements(SLAs)
o Identify the salient features of various cloud computing models.
o Understand the concept of sensor-clouds.
o Relate to the applicability of IoT in realscenarios.
o List the salient features of agriculturalIoT.
o Understand the requirements, challenges, and advantages of implementing IoT inagriculture.
o Relate to the appropriate use of various IoT technologies throughreal-life use.
o Cases on IoT-based leaf area index assessment and an IoT-based irrigationsystem

Chapter 10: Cloud Computing (Textbook: Page 237-250)


• Introduction
• Virtualization: Advantages of virtualization, Types ofvirtualizations
• Cloud Models: Service-Level Agreement in Cloud Computing, importance of SLA,
Metrics forSLA
• Cloud Implementation
- Cloud simulation
— An open -source cloud: Open stack
— A commercial cloud: Amazon web services(AWS)
• Sensor-Cloud: Sensors-as-a-Service
— Importance ofsensor-cloud
- The architecture of a sensor-cloud platform
Chapter 12: Agricultural IoT (Textbook: Page 271-280)

• Introduction: Components of an agricultural Io T, Advantages of IoT inagriculture


• Case Studies: In -situ assessment of leaf area index using lo T-based agricultural
System, Smart irrigation managementsystem.

pg. 1 Dept. Of CSE, Bangalore Inistitute of Technology


Chapter1O:C1oudComputing

1. Introduction: Sensor nodes are the key components of IoT and these
nodesaregenerates an enormous amount of data during practice. Handling these
massive heterogeneous data by resource constrained IoT devices is an extremely
difficult task. Cloud computing is the better solution for these problems. Hence Cloud
computing is an essential building block of the IoTarchitecture.
• Definition of Cloud Computing: Cloud computing is the delivery of computing
services including servers, storage, databases, networking, software, analytics, and
intelligence over the Internet.
• Difference between Network computing and Cloudcomputing.

Cloud computing comprises a pool of multiple resources such as servers, storage,


and network from single/multipleorganizations.
These resources are allocated to the end users as per requirement, on a payment
basis.
o In cloud computing architecture, an end user can request customized resources from
a Cloud Service Provider (CSP) as shown in fig1.1
o Cloud computing comprises a shared pool of computing resources, which are
accessible dynamically, ubiquitously, and on-demand basis by theusers.
o These resources are accessible by multiple users through a regular command -line
terminal at the same or different timeinstants.
o Cloud services are accessible from anywhere and at any time by an authorized user
through Internetconnectivity.
o The services of cloud computing are based on the pay-per-usemodel.
o The concept is the same as paying utility bills based onconsumption.
o Gmail, Facebook, and Twitter are some examples of cloud computingapplications.
o Currently, many companies such as Amazon Web Service(AWS) and Microsoft
Azure provide cloudservices.

2. Virtualization
o The technique of sharing a single resource among multiple end users is knownas
“Virtualization”.It is the key concept of cloud computing.
o In the virtualization process, a physical resource is logically distributed among
multiple users. However, a user realizes that the resource is unlimited and is
dedicatedly provided tohim/her.

o Figure 2.2(a) represents a traditional desktop, where an application (App) is running


on top of an OS, and resources are utilized only for that particular application.
o Figure2.2(b)virtualizationsoftwareseparatestheresources logicallyso thatthere is
no conflict among the users during resourceutilization.
o Typically, there are different software such as VMware, hypervisor, and virtual
machines which enable the concept ofvirtualization.

2.1 Advantages of virtualization: There are TWO main entities in a cloud computing
architecture: 1) End users and 2) Cloud Service providers CSPs). Both are benefited in
several aspects through the process of virtualization. The

(1). Advantages of virtualization for End Users: They are asfollows.

(a)Variety (b)Availability
(c)Portability (d)Elasticity

a) Variety:
— It enables various types of applications based on therequirements.
It enables end users to access applications, hardware, or software virtually from
a variety of devices and networks, regardless of their operating system(OS).
[b) Availability:
— Virtualization creates a logical separation of the resources of multiple entities
without any intervention from endusers.
— It makes available a considerable amount of resources as per userrequirements.
— The end users feel that there are unlimited resources present dedicatedly for him/her.
(c) Portability:
— Ability to transfer applications and data between cloudcomputing environments.
It enables migration between public and private clouds.
— Portability signifies the availability of cloud computing services from anywhere in
the world, at any instant intime.
— It allows individuals to obtain and reuse their data for theirpurposes across
differentservices.
— It allows t h e m to move, copyor transfer personal data easily from one
environment to another in a safe and secure without affecting itsusability.
This has been made possible by such as Google Drive.
[d) Elasticity:
— Elasticity refers to automatically increasing or decreasing cloudresources.
— It automatically adapts to match resources with demand as closely as possible, in real-
time.
An end user can scale up or scale-down resources like processing, memory, and
storage resources to meet changingdemands.

(2) Advantages of virtualization for Cloud Service Providers (CSP)


(a) ResourceUtilization:
Here use the resources on their own or get them from third parties.
— Resources are distributed among different users dynamically as per their
requirements.
A segment of a particular resource provided to a user at a time instant can
be provided to another user at a different timeinstant.
Resources can be re-utilized for multiple users.
(b)Effective Revenue Generation:
A CSP generates revenue from the end users based on resource utilization.
— The resource dynamic reallocationandre-utilizingfeaturesofcloud computing
enable more revenuegeneration.

2.2 Types of virtualizations***: Based on the requirements of the users, virtualization


is categorized into FOUR types as shown in Figurebelow.

Figure 2.3 Types of virtualizations

(i)Hardware virtualizations: Sharing of hardware resources among multiple users. For


example, a single processor appears as many different processors as possible in a cloud
computing architecture. Different operating systems can be installed in these
processors and each of them can work as a stand-alone machine. It uses a virtual
machinemanager (VMM) called ahypervisorto provide abstracted hardware to
multiple guest operating systems, which can then share the physical hardware resources
moreefficiently.
(ii). Storage virtualizations: In this virtualization, the storage space from different
devices is accumulated virtually, and seems like a single storage location. Through
storage virtualization, a user’s documents or files exist in different locations in a
distributed fashion. However, the users are under the impression that they have a
single dedicated storage space provided tothem.

(iii). Application virtualizations: Application virtualization software allows users to


access and use an application from a separate computer from the one on which the
application is installed. For example, a single application is stored at the cloud end, but,
as per requirement, a user can use the application on his/her local computer without ever
actually installing theapplication.
(iv). Desktop virtualizations: This type of virtualization allows a user to access and
utilize the services of a desktop that resides in the cloud. The users can use the desktop
from their local desktop.

3. Cloud Models: The cloud model can be divided into twoparts:


(1) Service model: It is further categorizedas
— Software-as-a-Service(SaaS)
— Platform-as-a-Service(PaaS)
— Infrastructure-as-a-Service(IaaS)
(2) Deployment model: It is further categorizedas
- Private cloud
— Communitycloud
— Publiccloud
— Hybridcloud.

Figure 3.1 Cloud model

(1) Servicemodel:
i. Software-as-a-Service{SaaS)
— This service provides access to different software applications to an end
userthrough Internetconnectivity.

— For accessing the service, a user does not need to purchase and install the software
applications on his/her local desktop. The software is located in a cloud server,
from where the services are provided to multiple endusers.
— SaaS offers scalability, by which users have the provision to use multiple
software applications as per theirrequirements.
— User does not need to worry about the update of the software applications.
This software is accessible from anylocation.
Example of SaaS is Microsoft Office 365, Netflix, salesforce, G-suite, etc.

Figure 3.2 Service models

(ii) Platform -as-a-Service(PaaS):


— It provides a user can develop and run differentapplications.
— The cloud user need not go through the burden of installing and managing the
infrastructure such as operating systems, storage, andnetworks.
An example of PaaS is Google App Engine and Microsoft Azure.
(iii) Infrastructure -as-a-Service(IaaS):

— IaaS provides infrastructure such as storage, networks, and computing


resources.
— A user uses the infrastructure without purchasing the software and other
network components. An example of IaaS is Google ComputeEngine.

2. Deployment Model:
a) Private Cloud: This type of cloud is owned explicitly by a n end -user
organization. The internal resources of the organization maintain theprivate
cloud.
b) Community Cloud: This cloud forms with the collaboration of a set of
organizations for a specific community. For a community cloud, each
organization has some sharedinterests.
c)Public Cloud: The public cloud is owned by a third-party organization, which
provides services to the common public. The service of this cloud is available for
any user, on a payment basis.
d) Hybrid Cloud: This type of cloud comprises two or more clouds (private,
public, or community).

4. Service-Level Agreement in Cloud Computing“**


— A service-level agreement (SLA) is a contract between a service provider and its
customers that documents what services the provider will furnish and defines the
service standards the provider is obligated tomeet.
— An SLA provides a detailed description of the services that will be received by the
customer.
— Based on the SLA, a customer can be aware of every term and condition of the services
before availing ofthem.
- An SLA may include multiple organizations for making the legal contract with the
customers.
4.1 Importance of SLA: It is important in cloud computing architecture because of the
followingreasons.
o Customer Point of View: Each CSP has its SLA. The customer can compare the SLAs of
different organizations and choose a preferred CSP based on theSLAs.
o CSP Point o/ View: In many cases, certain performance issues for a particular service
CSP may not be able to provide efficiently. I n such a situation, a CSP can explicitly
mention in the SLA that they are not responsible for inefficientservice.
4.2 Metrics for SLA: Depending on the type of services, an SLA is constructed with
different metrics. Some of the common metrics used to construct SLAare
(i) Availability: This metric signifies the amount of time the service will be
accessible for thecustomer.
(ii) Response Time: It is the maximum time that will be taken for responding to a
customer request.
(iii) Portability: This metric indicates the flexibility of transferring the data to another
service.
(iv) Problem Reporting:How to report a problem, whom, and how to be
contacted,isexplained in this metric.

(v) Penalty: The penalty for not meeting the promises mentioned in theSLA.

5. Cloud Implementation: Topic will be covered in this sectionare


5.1Cloudsimulation
5.2 An open-source cloud:OpenStack
5.3 A commercial cloud: Amazon web services(AWS)

5.1 Cloud simulation: Due tothefollowing reasons cloud system simulation is


required before realimplementation.
— Real deployment of the cloud is a complex and costlyprocedure.
— It is challenging to estimate the performance of an IoT system with the cloud before
real implementation.
— Typically, a cloud simulator provides the following advantages to acustomer:
o Pre-deployment test before real implementation
o System testing at nocost.
o Repeatableevaluationofthesystem
o Pre-detection of issues that may affect the systemperformance.
o Flexibilitytocontroltheenvironment

• Some of the popular cloud simulators listedare:


a) CloudSim
b) CloudAnalyst
c) GreenCloud
(a). CloudSim:
• Description:
— It is a popular cloud simulator developed at the University ofMelbourne.
— This simulator is written in a Java-basedenvironment.
— Here a user is allowed to add or remove resources dynamically during the
simulation and evaluate the performance of thescenario.

• Features ofcloudSim:***
o lt provides various cloud computing da tacenters along with different data
centernetworktopologies inasimulationenvironment.
o Virtualization of server hosts can be done in asimulation.
o A user can allocate virtual machines (VMs) dynamically.
o Itallowsusers todefinetheirpoliciesfortheallocationofhostresourcestoVMs.
o lt provides flexibility to add or remove simulation Componentsdynamically.
o A user ca nstop and resume the simulation at any instant intime.

(b) CloudAnalyst:
• Description:
— CloudAnalyst is based onCloudSim.
This simulator provides a graphical user interface (GUI) for simulating a cloud
environment. T
— It is used for simulating large-scale cloudapplications.
• Features:
o This simulator is easy to use due to the Presence of theGUI.
o It allows a user to add components and provides a flexible and high level of
configuration.
o A user can perform repeated experiments, considering different parameter
values.
o It can provide a graphical output, including a chart andtable.
(c). GreenCloud:
• Description:
It is developed as an extension of a packet-leve1 network simulator, NS 2.
— This simulator can monitor the energy consumption of different network
components such as servers andswitches.
• Features:
o GreenCloud is an open -source simulator with a user-friendlyGUI.
o lt provides the facility for monitoring the energy consumption of the network
and its various components.
o It supports the simulations of cloud networkcomponents.
o lt allows a user to manage and configure devices, dynamically, in simulation.

5.2An open-source cloud: For the real implementation of the cloud, there are various
open-source cloud plat forms available such as OpenStack, CloudStack and Eucalyptus.
• TheOpenStack
• Description:
— It is free software, which provides a cloud IaaS tousers.
A user can easily use this cloud with the help of a GUI -based web interface.
— It supports a vastly scalable cloud system, in which different pre-
configured software suites areavailable.
— The service components of Open Stackalongwiththeirfunctionsare depicted in
Table 5.1 below

Table 5.1 Components in OpenStack

o Features of OpenStack***
OpenStack allows a user to create and deploy virtual machines.
It provides the flexibility of setting u p a cloud management environ ment.
lt supports an easyhorizontal scaling: dynamic addition or removal of instances for
providing services to multiple numbers ofusers.
— This cloud platform allows users to access the source code and share their
code to thecommunity.

5.3 A commercial cloud: Few of the popular commercial cloud infrastructuresare


Amazon Web Services LAWS), Microsoft Azure, and Google App Engine.
• Amazon web services(AWS)
o Description:
— A user can launch and manage server instances in AWS.
A web interface is used to handle theinstances.
— AWS provides different APIs (application programming interfaces),
tools, and utilities forusers.
— It follows the pay-per-usemodel.
— It provides a virtual computing environment, where different
configurations, such as CPU, memory, storage, and networking capacity
areavailable.
o Features of AWS*****
It provides flexibility to scale and manage the server capacity.
AWS Provides control of OS and Deploymentsoftware.
— It follows the pay-per-usemodel.
It allows a user to establish connectivity between the physical network
and the Private virtualnetwork.
— It helps a user with fast development and deployment of thesoftware.
— AWS provides excellent management tools, which help a user to
monitorandautomatedifferentcomponentsofthecloud.
— The cloud provides machine learning facilities, which are very useful for
data scientists anddevelopers.
AWS also provides a data analytics platform.

6. Sensor-Cloud: Sensors-as-a-Service: Topic to be covered in this section are


6.1 Importance of sensor-cloud
6.2 Architecture of a sensor-cloudplatform
6.1 Importance of sensor-cloud:
o Sensor-C1oud can play a huge role in the provision of the Sensors-as-a-
Service (S-a-aS)platform.
o In a sensor cloud, the virtualization of sensors provides services to multiple users.
o Here sensor may be used for serving multiple user applications,simultaneously.

The main aim of sensor-cl oud infrastructure is to provide an opportunity for the
common mass to use Wireless Sensor Networks (WS Ns) on a payment basis.
Sensor-cloud architecture also follows the pay-per-use model.
I n the sensor, the cloud user application is served by a set of homogeneous or
heterogeneous sensor nodes. These sensor nodes are selected from a common
pool of sensor nodes, as per the requirement of userapplications.
Using the sensor-cloud infrastructure, a user receives data for an application
from multiple sensor nodes without owningthem.

****Advantages of sensor-cloud over traditional WSN****

i. Scalability: sensor cloud supports the massive scalability of physical sensors


that can be accessed by multiple services and multiple users without any
intervention.
ii. Cost: The services can be made cheaper for individual users since no cost
incurring tasks such as sensor deployment, maintenance, and system up-gradation.
iii. Lifetime: The overall network lifetime also increases due to optimal duty
scheduling of the deployed sensornodes.
iv. Reconfigurability: Based on the available services, the user can choose to switch
applications,andvirtuallyreconfigurethesensornodesaspertheirdemand.
v. Fault-tolerance: It provides high fault-tolerance guarantees to end-users through
service-level agreements(SLA).
vi. Information Security: Virtualization techniques enable the sensor cloud to provide
access control to users with various levels of highersecurity.
vii. Dynamic management: The sensor-cloud framework facilitates dynamic resource
sharing and it is dynamically allocated to services in synchronization with the
change in therequirements

Figures 6. 1 depicts the usage of sensor nodes using traditional WSN and sensor cloud
infrastructure. We know that virtualization is the backbone of cloud computing.
Similarly in the sensor cloud by using the same concept, the service providers of t he
sensor-cloud infrastructure may serve multiple users with the same sensors and earn
profit. Through the use of sensor-cloud, users can easily switch applications without any
manualintervention.
Figure 6.1: Traditional WSN versus sensor-cloud
6.2 Architecture of a sensor-cloud platform: The THREE main components of a
sensor-cloud architecture are (i) End-user (ii) Sensor Owner (iii) Sensor-Cloud Service
Provider (SCSP). The detailed architecture of a sensor cloud is depicted in Figure6.2

i) End user:
The end user is also known as a customer of the sensor-cloud services.
— An end user registers him/herself with the infrastructure through a Webportal.
— He/she chooses the template of the services that are available in the sensor-
cloud architecture to which he/she isregistered.
Through the Web portal, the end user receives the services, as shown in Fig 6.2
Based on the type and usage duration of service, the end user pays the charges
to the SCSP.
Figure 6.2 Architecture of a sensor-cloud platform:

(ii) SensorOwner:
— A particular sensor owner can own multiple homogeneous or heterogeneous
sensornodes.
— Based on the requirements of the users, these sensor nodes are virtualized and
assigned to serve multiple applications at the sametime.
— The sensor owner receives rent depending upon the duration and usage of his/her
sensornode(s).
(iii) Sensor-Cloud Service Provider (SCSP):

— An SCSP is responsible for managing the entire sensor-cloudinfrastructure.


— The CSCP receives rent from end users with the help of a pre-defined pricing
model.
— The pricing scheme may include the infrastructure cost, sensor owners’ rent,
and the revenue of theSCSP.
- The SCSP receives the rent from the end users and shares a partial amount with
the sensor owners. The remaining amount is used for maintaining the
infrastructure.
MoDULE -4 LcoNTINU EJ

As We knoshat Cunrent Verion 4 Lnternet addhre s is


Vernr.
TPVL Cîerne Potuol
heheme, ushich is ezhausted.
Lvy is a 32-bit addresnng
techmques ke are oo posed to Mos down he
So koroe appiachang to eahaut uah as!
L addell
sate at which Tv
Dynannie ttost Cott oto Col - DHc
Tsanslah'n NAT
Nehosk Addres
Sub- Neting.
Llvs kshich is neat genesahon TP
Now we are Ahiting to
add-ye sking 246e Standay Conplete ipleme
ReC
Lrb is deined in
Dtution in bih.
addeeges broS 32 bits to (28
L a Covers 8-z4 los8
Qeneates
with (28 bits that ks es to al the derr
allocate adorse
Ltihîs Bubtient to
decades.
in the wostd fos ame
Technical funcn ality ot internet wiu sennain
lote-

Coninue to wonN kinultaneouy


Ler and
dis cus main Charactenidhe q
lkle wiu
net.

Tntenet Raotocol Vehiss -4]


IRr4 represented
bitC4-byte addeAk and
32- Soo.
doted decimal notation
b |49. 2S2- 20
2.- 42-
Combinathon 9 netwon porshon s hast
This addrrels is a belsog to wshiel
Dosd,en that indicates shich hos adtet
netwk.
gronalast 2:)b,
oo. C1o8), Jo.*. ivate ecept Pbie addrsees
ane Most t
muthcast4 :Unicast, addels LR4 Categees
4. 2ane Thert *
ield, Vaous
its and header Llu4 Btuctne &hows Hgure
32-bit
DATA
needel) Paddesit Peesent,(optm,ir
Addes stina De
DRuy 22-bit
R
Adde s Souse TRvy 22-bit
(16) Head
exLire|psotool to
Time
Ob63ei3) Checku
Pragment Ldenibicahon
I5)
Cergvice (4)bio( Length
length Packet TOtol Header
|Bgte 1Byte
Tor4 Structunre
ob Heacer
to wse beCan NAT
ntah. address theye etend
Mes adde CRiy humber
4 Totad
46 2 arse
netk. each Cos bosts nunhex
based detined aneclanses Thele
ls Nwnuher on
254 240-
239 224-
Claks
C
1-(2 ClasA
4 TRn header length armes bom 20 to oo btes dapending

Detais Sach bield 4 2ery:


a) Versiovy - sets Verbion 9 Ie Protocst (LR,4Rs).
) Header lensthîntenet Header length H: Lndicates length Iev
header( as not al Ih heades anre eaal in lengn) and it
daferds optis
Precedence, deloy thoghput, eliabity 4Cost.
(a) Tbtal Packet lengthi Dhdicates e tatal length 9 pacet this
iocludes length 4 headex t Pangond.
Tderhicahn:- T the pocket lerngth is loge, hen packets arse
fragnented &tese foagnens have identibiahm
Vaht. This help» to neasenble the origina
Paccat rom fsagrnents at desthinatin.
) Elagsi Used to enable fragrmentaton
bit -I indicaes shethex he palet Cas be be fuaqretelnat
bit-2 indicates rmoe fogrent follo the cuent
fagmen
(8 Fgment o7ttet i Indiiate the poBism 4 tne frog nent
nsel atile to the beginning o the paytond.
(h) Tiae to lie LTTUJ:- debines a tine Couter is the
Count Goes to 2eothen acket îs
discaxded ldeleted as that pacet is
hot delivered to detinatin.
this bild iodietes the pper layer pro to st
hat wsiu receiVe te pacetCuDe T)at
destinion 0Clured in he heeJer
Ohecksun- To ensre no Uhanes
J) Header TL. This hecmis only
bield ezcept
header as paoad hay ts own checkkum.
f
This is 22-bt foc Tlry

Podding ia wsed opiun is ot 3-bit in lergth.


Lrternet Protocol Vekion6 [Te67
eres ented in
Dt wses |28 -bit (lb - byte] addhses and
heade iroal notation.
to 4-bits).
Sr: 6FF3: Foo: 0234: AB00 ( each enty Corepords
* n is 6 4-bits fos netwk nurnber and 64-bit fox host nunher.
<here host boion 9, Tvb addcels is deived Brorm MAC
adchees her iotefac îdenttier.

Thene s no NArt sugport


tute DRs
Figune Ahaws heade
16yte
Tsoti Flow label
Vexsin
4
Payload ength Headex

Heades |>8-bit PUG Source

Deshnahn addres
128 bit Dlra
ophmad Enteri
tenomwe
G)presant p venion -b.
Verion: 4bits,is vae alws ol|o Senice
hene mot gnibant 6-bits inicates tfe
Iatbit laes!- 8 bit cost geast eh
that outes oovides te [Link]
Leact in hca 2-bits ae ued for Splhat Congeshon othicatoe
Clow Labe 20bits, L4 is w ed to maintan Jeanenta slaw PaLkats.
Sourste Label he hehence that halp uter to idenby

pagad Langth b bits Tels the route that how muh data a parsts
Culax palket Cntai. Payoad ts Copo ked oy atension heados
and upper layer data
Net Hedens bitsLt in dicates the type eteMom header is esent
3 inicatee peer layex POu.
Hsy limi &bit t Uded to avold loup paucetPacce
'n theis net. Sinilato
dsCasdedl,

You might also like