SlideShare una empresa de Scribd logo
1 de 7
Descargar para leer sin conexión
Available online at https://www.ijasrd.org/
International Journal of Advanced Scientific
Research & Development
Vol. 06, Iss. 04, Ver. I, Apr’ 2019, pp. 09 – 15
Cite this article as: Dhanasekar, S., Ilankhatir, E., Divakar, S., & Vennila, D., “A Survey on IoT Architecture”. International
Journal of Advanced Scientific Research & Development (IJASRD), 06 (04/I), 2019, pp. 09 – 15.
https://doi.org/10.26836/ijasrd/2019/v6/i4/60402.
* Corresponding Author: S. Dhanasekar
e-ISSN: 2395-6089
p-ISSN: 2394-8906
A SURVEY ON IOT ARCHITECTURE
S. Dhanasekar1*, E. Ilankhatir1, S. Divakar1 and D. Vennila2
1 UG Scholar, Department of ECE, Kings College of Engineering, Punalkulam.
2 Asst. Prof., Department of ECE, Kings College of Engineering, Punalkulam.
ARTICLE INFO
Article History:
Received: 22 Mar 2019;
Received in revised form:
09 Apr 2019;
Accepted: 09 Apr 2019;
Published online: 10 May 2019.
Key words:
IoT,
Internet of Things,
IoT Architecture,
RFID,
Radio Frequency Identification,
Machine-to-Machine.
ABSTRACT
Internet of things (IoT) has started growing due to the
developments in RFID, sensors, communication technologies
and Internet protocols. The basic aim is to connect sensors in
a straight line devoid of human association in the vicinity of
help in creation of new types applications. The revolution in
mobile, Internet in addition to machine-to-machine (M2M)
technologies preserve is seen when the primary step towards
IoT. Internet of Things (IoT) is forwarding the association
among the objects (the “things”) and the backend systems
passing through the Internet. Every object can become
connected and smart. As a result, the background is
monitored via sensing the background furthermore the data
are transferred toward cloud with internet connectivity of the
things. The monitoring environment comes closer in spite of
distance. There are several platforms that provide services
such as data analytics, business analytics, notification, etc.
Each platform provides a specific service In this expose, we
examine a delegate section of these platforms, together open-
source and proprietary, on the source of their capability to
convene the potential of dissimilar IoT users. The evaluation
focuses on how prepared and functional these platforms are
for IoT ecology players, other than on the peculiarities of the
essential scientific layers. This paper mainly aims to provide
a summary of different platforms and stages for IOT. This
paper would help the IoT users to decide their best platform
to suit their application.
Copyright © 2019 IJASRD. This is an open access article distributed under the Creative Common Attribution
License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original
work is properly cited.
INTRODUCTION
Internet of things is defined as an interconnection of things together via internet.
The object is a physical object that can be a vehicle parking field, any machines, even light
A Survey on IoT Architecture
Volume 06, Issue 04, Version I, Apr’ 2019 10
can be managed. The things are attached with the sensors (sensing environment),
electronics (different functionalities such as connectivity) and software (connection of things
with other things). The exponential growth of IoT industry requires robust IoT platforms
which indicates the renewal requirements such as in the smart cities applications, a huge
volume of information has to be managed. First time Kevin Ashton coined IOT in 1999 who
recognized a laboratory in MIT for concerning the objects throughout RFID. In 2005 the
IOT is mentioned by ITU. In 2010 Google design a car that can access the map by
connecting to the internet and accordingly get automated by self. This is an important
project in the platform of IOT. In 2010 the Bluetooth small power protocol was designed
that enables the things to be allied among small energy consumption. Different technologies
that enable the connectivity and the communique over the network of things are Bluetooth,
Zigbee, Wi-Fi, 4G LTE. All of these technologies varied in their series of transmission,
power consumption, and speed. Based on the function the technology that is worn to offer
connectivity and power constraints, the technology preferred may differ. The IoT helps
physical objects to think, see, hear and perform respected task by having them
opportunities to talk together for sharing of information and to manage over decisions. The
IoT convert these objects from being ideal to smart by exploiting its hidden technologies
such as ubiquitous and pervasive computing, embedded technology, communication
technologies, sensor networks, Internet protocols and applications. Smart objects along with
specialized tasks provide a specific domain application (vertical markets) while ubiquitous
computing and analytical services form application domain independent services (horizontal
markets).
1.1 State of Art: Xively
This platform provides service for building an IOT mobile applications (APP). The
objects are related to the xively platform by protocols such as REST, HTTP, and MQTT. It
ensures protection by having a protect server with tool and user confirmation by their API
key which is assigned to them while registering as a novel user. It provides an SDK for
Arduino, android, python, java, PHP, RUBY.
Axeda: Is a dais that provides the storage space to accumulate the data of the
objects analyses the data and get notified. The axeda supports the MQTT protocol for the
communication with the axeda cloud. It has a middleware called IOT connectivity to easy
combine and connect the things to cloud. It also has SDK to make the APP and to contact
the data throughout the web app. The axeda cloud providers have also obtained an ISO
27001:2013 certificate for ensuring security in axeda cloud. The axeda cloud also associated
with protocol such as SOAP, REST. The grovey scripting engine is there to sustain the
Dhanasekar et al., (2019)
11 Volume 06, Issue 04, Version I, Apr’ 2019
application development. The axeda offer connectivity among things and cloud by axeda
wireless protocol.
1.2 Thingworx
It is an IOT APP expansion podium that allows the user to developers to extend its
own application. The data communique and machine manage in spin is throughout REST
protocol, MQTT. There is a codeless crush up designer that allows the consumer to produce
their own APP without any necessitate to code. It also allows the social networks to work
together among users such as twitter, LinkedIn, Google +. SQUEAL is a explore engine that
is used to data investigation, look for and query the data warehouse stored in cloud. Thing
watcher is software that is used to perceive the anomalies and gives indications. The thing
interpreter is software that predicts task by taking into consideration the key factors
recommended by the thing watcher. Thing optimizer is software that is used to progress the
presentation by using the predictions in thing predictor. Thus, the thing worx analytic
server uses the thing watcher, thing predictor and thing optimizer and provides a better
data nalytics.
Thing Square: Is a platform each connected objected runs a wireless thing square
mist os. It ensures the secure connectivity by the AES protocol. Thing square IDE is a
mesh-based IDE to construct online fog APP. This thing square fog is an entryway
throughout services such as information bank as an overhaul by offering storage space to
store up information, information as a service in which we be able to make a statistics
investigation and dealing as a service on behalf of a linked production and manufactured
goods. The xively moreover provide an exclusive API designed for the information revelation
with the aim of life form stored in obscure. Xively have moreover has been won numerous
awards as an IOT expertise modernizer in 2015 and also several awards in year 2013.
Which the stuff is linked in the type of lattice. The visibility of the device is within the
mesh.
Bug Swarm: The bugs lab was started in the 2006 and introduced their original
hardware called bug in 2008. That enables the unwrap foundation IP enabled hardware.
Swarm is a relax based messaging podium for IOT launched through bug lab in 2010. By
means of swarm the relax based communications be able to throw stuff and build power
above the surroundings, build notification etc. They launched dweet and freeboard podium
on behalf of the IOT in 2014. Dweet is a chirp of equipment. It is issue promise based
reproduction where issue is the tweet of things data and the subscribers are the one who
follow the things. We can even buy a lock on thing so that the only registered user with key
can follow the thing and subscribe the data from the thing. Freeboard is a information
revelation dash and to facilitate the consumer to propose their individual information
image. The consumer can generate their personal boundary design and the method to be
exhibit the information and allows the consumer to share user’s public/private mode. This
freeboard is more compatible with the dweet.
Sensor Cloud: This product was designed earlier to sustain the micro tarnish
agitated and wireless sensor as obscure storage space other than it also supports extra
third-party sensor by unwrap foundation API. It sends notification by SMS and email. It
has a mathematic locomotive with the intention of allows the consumer to plan their
individual information image device to construct a consequential intelligence on their
A Survey on IoT Architecture
Volume 06, Issue 04, Version I, Apr’ 2019 12
information. All the deals are encrypted and then transmitted to the sensor obscure. In
addition, it allows the users to insert an entrance charge to a sensor cost and time that can
launch the vigilant when the episode occur. Actual moment information is accessed by
forming an effective survive port among the entryway and obscure by means of live joint.
For visualization of the data, math engine provided by sensor cloud is used. In sensor cloud
python code is used for data visualization which for allows to integrate the ipython
notebook.
Thing Speak: Data can be sent from various thing or sensor or a website to the
thing speak cloud and we can visualize the data stored and it is also possible to customize
the visualization to a live data. Thing Speak enables engineers and scientists to prototype
and build IoT systems without setting up servers or developing web software.
1.3 EvryThng
Evrythng uses an OAuth protocol to connect the external application to the products.
Active Digital Identity (ADI) is used to identify each product digitally and an activity can be
performed by setting the threshold condition trigger. Decision making and customizing the
work flow is done by engine called Reactor. Everything supports various connectivity
technologies viz QR code, RFID, BLE and NFC. MQTT, COAP and web sockets are the
communication protocols supported and the connectivity between different communications
protocols are solved using Thnghub local cloud gateway software. It works in low latency in
offline and also has a local API.
Every Ware Device Cloud: Every ware device cloud is a platform according to the
eurotech structure that offers end to end solution and a variety of services as API
development, console and updates the data stored in cloud. MQTT protocol is used for
communication, it also provides much hardware to afford an end to end solution. The
notifications are received in tweet, SMS, e-mail, voice call and dashboard. It is possible to
integrate with other service providers such as sales force, Twitter, Facebook, Google Aps.
iDigi device cloud. To ensure security of consumer’s data about 175 security controls are
used. To enable information from device to cloud ethrios cloud connector in SDK package is
used. It also allows third party data exchange. It also allows bidirectional communication.
The user has to set the threshold data to send notification and to schedule a task
automatically within the specified time.
To receive better data throughput, mash up is performed in various data channels.
The user is allowed to send notification by triggering the ip connected with the
environment.
Discussion: IOT is a mishmash of sensor network technology, cloud computing and
big data concepts. The main part of the cloud computing in IOT is to provide data storage
and services for accessing the data and for setting notification/alert. Mostly the cloud
platform provides REST based web services. The protocols supported by the platforms
mostly are HTTP and then MQTT. SSL handshake protocol is used to ensure the security of
the data transmission to the cloud and Xively and sensor are some of the cloud providers
which uses TSL handshake protocol. During registration process each user is given an API
key and it is used for authentication purpose. In all cloud providers data analytics services
are provided and some providers such as Thing speak, Bug swarm multiplex various sensor
data to build and to allow the user to customize their widgets. Axeda and Every ware device
Dhanasekar et al., (2019)
13 Volume 06, Issue 04, Version I, Apr’ 2019
provide notification through voice call and notifies through SMS or mail. Cloud platforms
are used in healthcare domain and it supports MQTT protocol where the publisher are the
users who are wearing the health sensors and the subscribers are the physicians. Axeda,
Thingworx etc are used in home automation domain for resource sharing. This seems to be
more secure and even in Thing speak platform where the information can be shared
privately. Thing square, Thingworx, can also be used in traffic management since, it has
TLS/ SSL and AES security protocol. Bug swarm is used in smart irrigation which uses a
simple HTTP protocol for communication.
TECHNOLOGIES INVOLVED IN IOT
Many technologies are available to implement the concept of Internet of Things. This
paper focuses only on below technologies:
• Radio Frequency Identification (RFID)
• Near Field Communication (NFC)
• Machine-to-Machine Communication (M2M)
• Vehicle-to-Vehicle Communication (V2V)
2.1 Radio Frequency Identification (RFID)
Radio frequency identification system consists of one or more reader(s) and several
RFID tags. Tags are differentiated by a unique address allotted to the objects. Tags
A Survey on IoT Architecture
Volume 06, Issue 04, Version I, Apr’ 2019 14
communicate with radio-frequency electromagnetic fields to move information attached
with specific object. The tags consist of electronically stored information which can simply
be interpret through the RFID booklover when the object came nearer to reader. RFID
allows to manage objects over real-time, without the need of human in line-of-sight.
Physically RFID card or label is a minute microchip joined through a tentacle in a
compressed package. The tag’s aerial picks up signal commencing an RFID reader and then
proceeds the indicator, typically with several extra information. The RFID tags are
categorized into several sections, the first one is Passive Reader Active Tag (PRAT). In this
tag reader is reflexive and receives the signal from the battery-operated active tags. It can
transmit till range of 1-2000 feet depending upon the architecture. The subsequent one is
Active Reader Passive Tag (ARPT), ARPT is commonly used. No onboard power supplies are
present in ARPT, it extracts required energy from query signal sent by the RFID reader to
sent data. The third one is an Active Reader Active Tag (ARAT). Reader and the Tags are
active in ARAT, tags are triggered to active only when it comes nearer to reader.
Transmission occurs over frequency band of low frequencies (LF) next to 124-135 KHz up to
ultra-high frequencies (UHF) at 860-960 MHz. A commonly used data stored tag is known
as Electronic Product Code (EPC). EPC’s code is a type of RFID tag, we can follow and
recognize items uniquely. Tag consists a 96-bit thread of information. It consists of first
eight bits as description which identifies the description of the code of behavior. The next 28
bit gives idea of the society that manages the information for this card, EPC Global
consortium assigns organization number to each tags. Other 24 bits are an entity group,
used to recognize the variety of creation and the remaining 36 bits are an exclusive number
for an exclusive card These final two fields are left untouched by the organization for
distributed the tag. Like a URL, the complete electronic manufactured goods cipher digit is
used to identify tags in global database which exclusively recognize a particular invention.
The RFID tags are used to Monitor the product life cycle, manage warehouse inventories,
goods tracking, animal tracking, baggage tracking over airport, payment using mobile, etc.
RFID technology can be combined with other sensing technologies to release a fresh
prospect for new applications.
MARKET AVAILABILITIES
The Internet of Things offer a huge advertise for apparatus manufacturer, service
provider and appliance developers. The smart items based on IoT are estimated to cover
over 213 billion entity internationally by the end of 2020. By 2022, M2M traffic flows are
projected to attain up to 45% of the whole Internet traffic. Past these prediction, McKinsey
Global Institute reported that the number of linked equipment (units) has grown-up 300%
over the previous 5 years. US show a boost of 250% for M2M traffic volume in 2011.
Economic growth of IoT-based services is also increasing exponentially for business factors.
Healthcare and manufacturing applications are projected to enhance the economy of
system. Healthcare applications associated IoT-based services such as cellular phone
wellbeing (m-Health) and telecare that facilitate medical wellness, analysis, healing and
monitoring services on the manner to construct about $1.1-$2.5 trillion annually by the
global economy over 2025. The entire yearly financial crash caused by means of IoT is
expected to be alive in series of $2.7 trillion toward $6.2 trillion in 2025.
Dhanasekar et al., (2019)
15 Volume 06, Issue 04, Version I, Apr’ 2019
CONCLUSION
This manuscript results a list of cloud providers for IOT, their special features such
as some engines for data analytics or a middleware to connect any things to cloud
dynamically and their special services such as business analytics services and notification
call and manually setting some threshold value and when the event happens the cloud can
triggers the action in an environment. Thus, this paper mainly aims to provide a general
knowledge about IOT and use of IOT system as per designer’s requirement and budget for
development.
REFERENCES
[1] Sruthi, M., & Kavitha, B. R., (2016) “A SURVEY on IoT Platform,” International
Journal of Scientific Research and Modern Education (IJSRME), 1 (1), pp. 468–473.
[2] Guth. J., Breitenbücher, W., Falkenthal, M., Leymann, F., & Reinfurt, L., (2016)
"Comparison of IoT platform architectures: A field study based on a reference
architecture". 2016 Cloudification of the Internet of Things (CIoT), pp. 01 - 07. DOI:
https://doi.org/10.1109/CIOT.2016.7872918.
[3] V. Trifa and D. Guinard, “Towards the Web of Things,” pp. 1–4, 2009.
[4] S. Agrawal and D. Vieira, Abakós, vol. 1, no. 2, 2013.“A survey on Internet of Things” –
DOI 10.5752/P.23169451 2013 v1n2 p78.
[5] A.Al-Fuqaha, M.Guizani, M.Mohammadi, M.Aledhari, and M.Ayyash “Internet of
Things: Asurvey on enabling Technologies, protocols and applications”.

Más contenido relacionado

La actualidad más candente

AWS Learning Series: Harnessing the Power of Data | An Introduction to IoT
AWS Learning Series: Harnessing the Power of Data | An Introduction to IoTAWS Learning Series: Harnessing the Power of Data | An Introduction to IoT
AWS Learning Series: Harnessing the Power of Data | An Introduction to IoTAmazon Web Services
 
Internet of things (IoT)
Internet of things (IoT)Internet of things (IoT)
Internet of things (IoT)Tarika Verma
 
Internet of things (IoT)
Internet of things (IoT)Internet of things (IoT)
Internet of things (IoT)Prakash Honnur
 
Internet of Things Connectivity for Embedded Devices
Internet of Things Connectivity for Embedded DevicesInternet of Things Connectivity for Embedded Devices
Internet of Things Connectivity for Embedded Devicesmentoresd
 
Internet of things - Introduction and Variations (Architecture)
Internet of things - Introduction and Variations (Architecture)Internet of things - Introduction and Variations (Architecture)
Internet of things - Introduction and Variations (Architecture)Mayank Vijh
 
IoT and machine learning - Computational Intelligence conference
IoT and machine learning - Computational Intelligence conferenceIoT and machine learning - Computational Intelligence conference
IoT and machine learning - Computational Intelligence conferenceAjit Jaokar
 
A Survey Report on : Security & Challenges in Internet of Things
A Survey Report on : Security & Challenges in Internet of ThingsA Survey Report on : Security & Challenges in Internet of Things
A Survey Report on : Security & Challenges in Internet of Thingsijsrd.com
 
01 internet-of-things-introduction-to-internet-of-things
01 internet-of-things-introduction-to-internet-of-things01 internet-of-things-introduction-to-internet-of-things
01 internet-of-things-introduction-to-internet-of-thingsJohn Soldatos
 
20171213 Future Internet: The forgotten Enabler for SmartCities
20171213 Future Internet: The forgotten Enabler for SmartCities20171213 Future Internet: The forgotten Enabler for SmartCities
20171213 Future Internet: The forgotten Enabler for SmartCitiesstefano de panfilis
 
RT-RCT: an online tool for real-time retrieval of connected things
RT-RCT: an online tool for real-time retrieval of connected thingsRT-RCT: an online tool for real-time retrieval of connected things
RT-RCT: an online tool for real-time retrieval of connected thingsjournalBEEI
 
Security in the Internet of Things
Security in the Internet of ThingsSecurity in the Internet of Things
Security in the Internet of ThingsBHAVANA KONERU
 
Eclipse M2M Industry Working Group
Eclipse M2M Industry Working GroupEclipse M2M Industry Working Group
Eclipse M2M Industry Working GroupBenjamin Cabé
 
The internet of things (io t) : IoT academy
The internet of things (io t) : IoT academy The internet of things (io t) : IoT academy
The internet of things (io t) : IoT academy AnkitThakkar46
 
WIRELESS SENSORS INTEGRATION INTO INTERNET OF THINGS AND THE SECURITY PRIMITIVES
WIRELESS SENSORS INTEGRATION INTO INTERNET OF THINGS AND THE SECURITY PRIMITIVESWIRELESS SENSORS INTEGRATION INTO INTERNET OF THINGS AND THE SECURITY PRIMITIVES
WIRELESS SENSORS INTEGRATION INTO INTERNET OF THINGS AND THE SECURITY PRIMITIVEScsandit
 
IoT Technology: Why to Choose Internet of Things Services-Latest Technology u...
IoT Technology: Why to Choose Internet of Things Services-Latest Technology u...IoT Technology: Why to Choose Internet of Things Services-Latest Technology u...
IoT Technology: Why to Choose Internet of Things Services-Latest Technology u...Vijay Pullannagari
 

La actualidad más candente (20)

AWS Learning Series: Harnessing the Power of Data | An Introduction to IoT
AWS Learning Series: Harnessing the Power of Data | An Introduction to IoTAWS Learning Series: Harnessing the Power of Data | An Introduction to IoT
AWS Learning Series: Harnessing the Power of Data | An Introduction to IoT
 
Internet of things (IoT)
Internet of things (IoT)Internet of things (IoT)
Internet of things (IoT)
 
Iot Report
Iot ReportIot Report
Iot Report
 
Internet of things (IoT)
Internet of things (IoT)Internet of things (IoT)
Internet of things (IoT)
 
Internet of Things Connectivity for Embedded Devices
Internet of Things Connectivity for Embedded DevicesInternet of Things Connectivity for Embedded Devices
Internet of Things Connectivity for Embedded Devices
 
Internet of things - Introduction and Variations (Architecture)
Internet of things - Introduction and Variations (Architecture)Internet of things - Introduction and Variations (Architecture)
Internet of things - Introduction and Variations (Architecture)
 
Iot report
Iot reportIot report
Iot report
 
IoT and machine learning - Computational Intelligence conference
IoT and machine learning - Computational Intelligence conferenceIoT and machine learning - Computational Intelligence conference
IoT and machine learning - Computational Intelligence conference
 
A Survey Report on : Security & Challenges in Internet of Things
A Survey Report on : Security & Challenges in Internet of ThingsA Survey Report on : Security & Challenges in Internet of Things
A Survey Report on : Security & Challenges in Internet of Things
 
01 internet-of-things-introduction-to-internet-of-things
01 internet-of-things-introduction-to-internet-of-things01 internet-of-things-introduction-to-internet-of-things
01 internet-of-things-introduction-to-internet-of-things
 
20171213 Future Internet: The forgotten Enabler for SmartCities
20171213 Future Internet: The forgotten Enabler for SmartCities20171213 Future Internet: The forgotten Enabler for SmartCities
20171213 Future Internet: The forgotten Enabler for SmartCities
 
Internet of Things
Internet of ThingsInternet of Things
Internet of Things
 
RT-RCT: an online tool for real-time retrieval of connected things
RT-RCT: an online tool for real-time retrieval of connected thingsRT-RCT: an online tool for real-time retrieval of connected things
RT-RCT: an online tool for real-time retrieval of connected things
 
Security in the Internet of Things
Security in the Internet of ThingsSecurity in the Internet of Things
Security in the Internet of Things
 
Internet of Things (IoT): Readme
Internet of Things (IoT): ReadmeInternet of Things (IoT): Readme
Internet of Things (IoT): Readme
 
Eclipse M2M Industry Working Group
Eclipse M2M Industry Working GroupEclipse M2M Industry Working Group
Eclipse M2M Industry Working Group
 
The internet of things (io t) : IoT academy
The internet of things (io t) : IoT academy The internet of things (io t) : IoT academy
The internet of things (io t) : IoT academy
 
WIRELESS SENSORS INTEGRATION INTO INTERNET OF THINGS AND THE SECURITY PRIMITIVES
WIRELESS SENSORS INTEGRATION INTO INTERNET OF THINGS AND THE SECURITY PRIMITIVESWIRELESS SENSORS INTEGRATION INTO INTERNET OF THINGS AND THE SECURITY PRIMITIVES
WIRELESS SENSORS INTEGRATION INTO INTERNET OF THINGS AND THE SECURITY PRIMITIVES
 
IoT Technology: Why to Choose Internet of Things Services-Latest Technology u...
IoT Technology: Why to Choose Internet of Things Services-Latest Technology u...IoT Technology: Why to Choose Internet of Things Services-Latest Technology u...
IoT Technology: Why to Choose Internet of Things Services-Latest Technology u...
 
Microsoft & IoT
Microsoft & IoTMicrosoft & IoT
Microsoft & IoT
 

Similar a A Survey on IoT Architecture

Nilesh bimani mtech-cse
Nilesh bimani mtech-cseNilesh bimani mtech-cse
Nilesh bimani mtech-csebhimaninilesh
 
Compiler design presentaion
Compiler design presentaionCompiler design presentaion
Compiler design presentaionMdShahinAlam25
 
Io t & amp; industry 4.0,internet of things
Io t & amp; industry 4.0,internet of thingsIo t & amp; industry 4.0,internet of things
Io t & amp; industry 4.0,internet of thingsSumanPramanik7
 
Iot presentation
Iot presentationIot presentation
Iot presentationhuma742446
 
Unit 3 - Internet of Things - www.rgpvnotes.in.pdf
Unit 3 - Internet of Things - www.rgpvnotes.in.pdfUnit 3 - Internet of Things - www.rgpvnotes.in.pdf
Unit 3 - Internet of Things - www.rgpvnotes.in.pdfShubhamYadav73126
 
summaryg.pdffgdfgdfgfgfgfgfgffgfdfgfgffg
summaryg.pdffgdfgdfgfgfgfgfgffgfdfgfgffgsummaryg.pdffgdfgdfgfgfgfgfgffgfdfgfgffg
summaryg.pdffgdfgdfgfgfgfgfgffgfdfgfgffgHakkemB
 
WIRELESS SENSORS INTEGRATION INTO INTERNET OF THINGS AND THE SECURITY PRIMITIVES
WIRELESS SENSORS INTEGRATION INTO INTERNET OF THINGS AND THE SECURITY PRIMITIVESWIRELESS SENSORS INTEGRATION INTO INTERNET OF THINGS AND THE SECURITY PRIMITIVES
WIRELESS SENSORS INTEGRATION INTO INTERNET OF THINGS AND THE SECURITY PRIMITIVESIJCNCJournal
 
IRJET- Review On Semantic Open IoT Service Platform
IRJET- Review On Semantic Open IoT Service PlatformIRJET- Review On Semantic Open IoT Service Platform
IRJET- Review On Semantic Open IoT Service PlatformIRJET Journal
 
Optimization of A Smart IOT Gateway
Optimization of A Smart IOT GatewayOptimization of A Smart IOT Gateway
Optimization of A Smart IOT Gatewayrahulmonikasharma
 
Optimization of A Smart IOT Gateway
Optimization of A Smart IOT GatewayOptimization of A Smart IOT Gateway
Optimization of A Smart IOT Gatewayrahulmonikasharma
 
STUDY OF VARIOUS INTERNET OF THINGS PLATFORMS
STUDY OF VARIOUS INTERNET OF THINGS PLATFORMSSTUDY OF VARIOUS INTERNET OF THINGS PLATFORMS
STUDY OF VARIOUS INTERNET OF THINGS PLATFORMSIJCSES Journal
 
The Things in the INTERNET of THINGS.
The Things in the INTERNET of THINGS.The Things in the INTERNET of THINGS.
The Things in the INTERNET of THINGS.Rohit Agrawal
 
Emerging chapter 4.pptx
Emerging chapter 4.pptxEmerging chapter 4.pptx
Emerging chapter 4.pptxAderawAlemie
 
Monitoring Section of IoTs Smart Garbage System
Monitoring Section of IoTs Smart Garbage SystemMonitoring Section of IoTs Smart Garbage System
Monitoring Section of IoTs Smart Garbage Systemijtsrd
 
The future of IoT paper
The future of IoT paperThe future of IoT paper
The future of IoT paperJayanth Vinay
 

Similar a A Survey on IoT Architecture (20)

Nilesh bimani mtech-cse
Nilesh bimani mtech-cseNilesh bimani mtech-cse
Nilesh bimani mtech-cse
 
Compiler design presentaion
Compiler design presentaionCompiler design presentaion
Compiler design presentaion
 
Io t & amp; industry 4.0,internet of things
Io t & amp; industry 4.0,internet of thingsIo t & amp; industry 4.0,internet of things
Io t & amp; industry 4.0,internet of things
 
Iot presentation
Iot presentationIot presentation
Iot presentation
 
Wireless networks
Wireless networks Wireless networks
Wireless networks
 
Unit 3 - Internet of Things - www.rgpvnotes.in.pdf
Unit 3 - Internet of Things - www.rgpvnotes.in.pdfUnit 3 - Internet of Things - www.rgpvnotes.in.pdf
Unit 3 - Internet of Things - www.rgpvnotes.in.pdf
 
summaryg.pdffgdfgdfgfgfgfgfgffgfdfgfgffg
summaryg.pdffgdfgdfgfgfgfgfgffgfdfgfgffgsummaryg.pdffgdfgdfgfgfgfgfgffgfdfgfgffg
summaryg.pdffgdfgdfgfgfgfgfgffgfdfgfgffg
 
WIRELESS SENSORS INTEGRATION INTO INTERNET OF THINGS AND THE SECURITY PRIMITIVES
WIRELESS SENSORS INTEGRATION INTO INTERNET OF THINGS AND THE SECURITY PRIMITIVESWIRELESS SENSORS INTEGRATION INTO INTERNET OF THINGS AND THE SECURITY PRIMITIVES
WIRELESS SENSORS INTEGRATION INTO INTERNET OF THINGS AND THE SECURITY PRIMITIVES
 
IRJET- Review On Semantic Open IoT Service Platform
IRJET- Review On Semantic Open IoT Service PlatformIRJET- Review On Semantic Open IoT Service Platform
IRJET- Review On Semantic Open IoT Service Platform
 
Optimization of A Smart IOT Gateway
Optimization of A Smart IOT GatewayOptimization of A Smart IOT Gateway
Optimization of A Smart IOT Gateway
 
Optimization of A Smart IOT Gateway
Optimization of A Smart IOT GatewayOptimization of A Smart IOT Gateway
Optimization of A Smart IOT Gateway
 
STUDY OF VARIOUS INTERNET OF THINGS PLATFORMS
STUDY OF VARIOUS INTERNET OF THINGS PLATFORMSSTUDY OF VARIOUS INTERNET OF THINGS PLATFORMS
STUDY OF VARIOUS INTERNET OF THINGS PLATFORMS
 
IOT_PPT1.pdf
IOT_PPT1.pdfIOT_PPT1.pdf
IOT_PPT1.pdf
 
IoT [Internet of Things]
IoT [Internet of Things]IoT [Internet of Things]
IoT [Internet of Things]
 
lee2015.pdf
lee2015.pdflee2015.pdf
lee2015.pdf
 
The Things in the INTERNET of THINGS.
The Things in the INTERNET of THINGS.The Things in the INTERNET of THINGS.
The Things in the INTERNET of THINGS.
 
U - 4 Emerging.pptx
U - 4 Emerging.pptxU - 4 Emerging.pptx
U - 4 Emerging.pptx
 
Emerging chapter 4.pptx
Emerging chapter 4.pptxEmerging chapter 4.pptx
Emerging chapter 4.pptx
 
Monitoring Section of IoTs Smart Garbage System
Monitoring Section of IoTs Smart Garbage SystemMonitoring Section of IoTs Smart Garbage System
Monitoring Section of IoTs Smart Garbage System
 
The future of IoT paper
The future of IoT paperThe future of IoT paper
The future of IoT paper
 

Más de IJASRD Journal

Gainful Human Empowerment Reform in Managerial Engineering
Gainful Human Empowerment Reform in Managerial EngineeringGainful Human Empowerment Reform in Managerial Engineering
Gainful Human Empowerment Reform in Managerial EngineeringIJASRD Journal
 
A Study on Quality of Life and Social Support Breast Cancer Women in Greater ...
A Study on Quality of Life and Social Support Breast Cancer Women in Greater ...A Study on Quality of Life and Social Support Breast Cancer Women in Greater ...
A Study on Quality of Life and Social Support Breast Cancer Women in Greater ...IJASRD Journal
 
Road Accident Analysis and Prevention in Nigeria: Experimental and Numerical ...
Road Accident Analysis and Prevention in Nigeria: Experimental and Numerical ...Road Accident Analysis and Prevention in Nigeria: Experimental and Numerical ...
Road Accident Analysis and Prevention in Nigeria: Experimental and Numerical ...IJASRD Journal
 
Leadership by Humanistic Approach in Workplace Management
Leadership by Humanistic Approach in Workplace ManagementLeadership by Humanistic Approach in Workplace Management
Leadership by Humanistic Approach in Workplace ManagementIJASRD Journal
 
Time Evolution of Density Parameters for Matter and Dark Energy and their Int...
Time Evolution of Density Parameters for Matter and Dark Energy and their Int...Time Evolution of Density Parameters for Matter and Dark Energy and their Int...
Time Evolution of Density Parameters for Matter and Dark Energy and their Int...IJASRD Journal
 
An Experimental Investigation on Normal Concrete using Rice Husk Ash, Dolomit...
An Experimental Investigation on Normal Concrete using Rice Husk Ash, Dolomit...An Experimental Investigation on Normal Concrete using Rice Husk Ash, Dolomit...
An Experimental Investigation on Normal Concrete using Rice Husk Ash, Dolomit...IJASRD Journal
 
A Novel Implementation for Radio Resource Allocation on Mobile Access Based o...
A Novel Implementation for Radio Resource Allocation on Mobile Access Based o...A Novel Implementation for Radio Resource Allocation on Mobile Access Based o...
A Novel Implementation for Radio Resource Allocation on Mobile Access Based o...IJASRD Journal
 
IoT Based Solid Waste Management
IoT Based Solid Waste ManagementIoT Based Solid Waste Management
IoT Based Solid Waste ManagementIJASRD Journal
 
IoT Based Accident Avoidance and Detection System for Two Wheelers
IoT Based Accident Avoidance and Detection System for Two WheelersIoT Based Accident Avoidance and Detection System for Two Wheelers
IoT Based Accident Avoidance and Detection System for Two WheelersIJASRD Journal
 
Realization of Direct Digital Synthesis in Cordic Algorithm
Realization of Direct Digital Synthesis in Cordic AlgorithmRealization of Direct Digital Synthesis in Cordic Algorithm
Realization of Direct Digital Synthesis in Cordic AlgorithmIJASRD Journal
 
Virtual Reality Based Requirement Distributions for Disaster Affected Peoples
Virtual Reality Based Requirement Distributions for Disaster Affected PeoplesVirtual Reality Based Requirement Distributions for Disaster Affected Peoples
Virtual Reality Based Requirement Distributions for Disaster Affected PeoplesIJASRD Journal
 
Implementation of Low Complex Universal Filtered Multicarrier
Implementation of Low Complex Universal  Filtered MulticarrierImplementation of Low Complex Universal  Filtered Multicarrier
Implementation of Low Complex Universal Filtered MulticarrierIJASRD Journal
 
Uncompressed Video Streaming in Wireless Channel without Interpolation using ...
Uncompressed Video Streaming in Wireless Channel without Interpolation using ...Uncompressed Video Streaming in Wireless Channel without Interpolation using ...
Uncompressed Video Streaming in Wireless Channel without Interpolation using ...IJASRD Journal
 
Massive MIMO-Based 5G Networks: Energy Harvesting Base Stations with Minimum ...
Massive MIMO-Based 5G Networks: Energy Harvesting Base Stations with Minimum ...Massive MIMO-Based 5G Networks: Energy Harvesting Base Stations with Minimum ...
Massive MIMO-Based 5G Networks: Energy Harvesting Base Stations with Minimum ...IJASRD Journal
 
Voice Based Search Engine for Visually Impairment Peoples
Voice Based Search Engine for Visually Impairment PeoplesVoice Based Search Engine for Visually Impairment Peoples
Voice Based Search Engine for Visually Impairment PeoplesIJASRD Journal
 
Enhanced Automated Toll Collection
Enhanced Automated Toll CollectionEnhanced Automated Toll Collection
Enhanced Automated Toll CollectionIJASRD Journal
 
Secure Medical Data Computation using Virtual_ID Authentication and File Swap...
Secure Medical Data Computation using Virtual_ID Authentication and File Swap...Secure Medical Data Computation using Virtual_ID Authentication and File Swap...
Secure Medical Data Computation using Virtual_ID Authentication and File Swap...IJASRD Journal
 
Secure Video Processing using ROI Extraction and ECC Encryption
Secure Video Processing using ROI Extraction and ECC EncryptionSecure Video Processing using ROI Extraction and ECC Encryption
Secure Video Processing using ROI Extraction and ECC EncryptionIJASRD Journal
 
An Approach to Detect and Avoid Social Engineering and Phasing Attack in Soci...
An Approach to Detect and Avoid Social Engineering and Phasing Attack in Soci...An Approach to Detect and Avoid Social Engineering and Phasing Attack in Soci...
An Approach to Detect and Avoid Social Engineering and Phasing Attack in Soci...IJASRD Journal
 
Effect of HHO Gas as Fuel Additive on the Exhaust Emissions of Internal Combu...
Effect of HHO Gas as Fuel Additive on the Exhaust Emissions of Internal Combu...Effect of HHO Gas as Fuel Additive on the Exhaust Emissions of Internal Combu...
Effect of HHO Gas as Fuel Additive on the Exhaust Emissions of Internal Combu...IJASRD Journal
 

Más de IJASRD Journal (20)

Gainful Human Empowerment Reform in Managerial Engineering
Gainful Human Empowerment Reform in Managerial EngineeringGainful Human Empowerment Reform in Managerial Engineering
Gainful Human Empowerment Reform in Managerial Engineering
 
A Study on Quality of Life and Social Support Breast Cancer Women in Greater ...
A Study on Quality of Life and Social Support Breast Cancer Women in Greater ...A Study on Quality of Life and Social Support Breast Cancer Women in Greater ...
A Study on Quality of Life and Social Support Breast Cancer Women in Greater ...
 
Road Accident Analysis and Prevention in Nigeria: Experimental and Numerical ...
Road Accident Analysis and Prevention in Nigeria: Experimental and Numerical ...Road Accident Analysis and Prevention in Nigeria: Experimental and Numerical ...
Road Accident Analysis and Prevention in Nigeria: Experimental and Numerical ...
 
Leadership by Humanistic Approach in Workplace Management
Leadership by Humanistic Approach in Workplace ManagementLeadership by Humanistic Approach in Workplace Management
Leadership by Humanistic Approach in Workplace Management
 
Time Evolution of Density Parameters for Matter and Dark Energy and their Int...
Time Evolution of Density Parameters for Matter and Dark Energy and their Int...Time Evolution of Density Parameters for Matter and Dark Energy and their Int...
Time Evolution of Density Parameters for Matter and Dark Energy and their Int...
 
An Experimental Investigation on Normal Concrete using Rice Husk Ash, Dolomit...
An Experimental Investigation on Normal Concrete using Rice Husk Ash, Dolomit...An Experimental Investigation on Normal Concrete using Rice Husk Ash, Dolomit...
An Experimental Investigation on Normal Concrete using Rice Husk Ash, Dolomit...
 
A Novel Implementation for Radio Resource Allocation on Mobile Access Based o...
A Novel Implementation for Radio Resource Allocation on Mobile Access Based o...A Novel Implementation for Radio Resource Allocation on Mobile Access Based o...
A Novel Implementation for Radio Resource Allocation on Mobile Access Based o...
 
IoT Based Solid Waste Management
IoT Based Solid Waste ManagementIoT Based Solid Waste Management
IoT Based Solid Waste Management
 
IoT Based Accident Avoidance and Detection System for Two Wheelers
IoT Based Accident Avoidance and Detection System for Two WheelersIoT Based Accident Avoidance and Detection System for Two Wheelers
IoT Based Accident Avoidance and Detection System for Two Wheelers
 
Realization of Direct Digital Synthesis in Cordic Algorithm
Realization of Direct Digital Synthesis in Cordic AlgorithmRealization of Direct Digital Synthesis in Cordic Algorithm
Realization of Direct Digital Synthesis in Cordic Algorithm
 
Virtual Reality Based Requirement Distributions for Disaster Affected Peoples
Virtual Reality Based Requirement Distributions for Disaster Affected PeoplesVirtual Reality Based Requirement Distributions for Disaster Affected Peoples
Virtual Reality Based Requirement Distributions for Disaster Affected Peoples
 
Implementation of Low Complex Universal Filtered Multicarrier
Implementation of Low Complex Universal  Filtered MulticarrierImplementation of Low Complex Universal  Filtered Multicarrier
Implementation of Low Complex Universal Filtered Multicarrier
 
Uncompressed Video Streaming in Wireless Channel without Interpolation using ...
Uncompressed Video Streaming in Wireless Channel without Interpolation using ...Uncompressed Video Streaming in Wireless Channel without Interpolation using ...
Uncompressed Video Streaming in Wireless Channel without Interpolation using ...
 
Massive MIMO-Based 5G Networks: Energy Harvesting Base Stations with Minimum ...
Massive MIMO-Based 5G Networks: Energy Harvesting Base Stations with Minimum ...Massive MIMO-Based 5G Networks: Energy Harvesting Base Stations with Minimum ...
Massive MIMO-Based 5G Networks: Energy Harvesting Base Stations with Minimum ...
 
Voice Based Search Engine for Visually Impairment Peoples
Voice Based Search Engine for Visually Impairment PeoplesVoice Based Search Engine for Visually Impairment Peoples
Voice Based Search Engine for Visually Impairment Peoples
 
Enhanced Automated Toll Collection
Enhanced Automated Toll CollectionEnhanced Automated Toll Collection
Enhanced Automated Toll Collection
 
Secure Medical Data Computation using Virtual_ID Authentication and File Swap...
Secure Medical Data Computation using Virtual_ID Authentication and File Swap...Secure Medical Data Computation using Virtual_ID Authentication and File Swap...
Secure Medical Data Computation using Virtual_ID Authentication and File Swap...
 
Secure Video Processing using ROI Extraction and ECC Encryption
Secure Video Processing using ROI Extraction and ECC EncryptionSecure Video Processing using ROI Extraction and ECC Encryption
Secure Video Processing using ROI Extraction and ECC Encryption
 
An Approach to Detect and Avoid Social Engineering and Phasing Attack in Soci...
An Approach to Detect and Avoid Social Engineering and Phasing Attack in Soci...An Approach to Detect and Avoid Social Engineering and Phasing Attack in Soci...
An Approach to Detect and Avoid Social Engineering and Phasing Attack in Soci...
 
Effect of HHO Gas as Fuel Additive on the Exhaust Emissions of Internal Combu...
Effect of HHO Gas as Fuel Additive on the Exhaust Emissions of Internal Combu...Effect of HHO Gas as Fuel Additive on the Exhaust Emissions of Internal Combu...
Effect of HHO Gas as Fuel Additive on the Exhaust Emissions of Internal Combu...
 

Último

Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104misteraugie
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Krashi Coaching
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdfQucHHunhnh
 
Disha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfDisha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfchloefrazer622
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingTechSoup
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdfQucHHunhnh
 
JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...
JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...
JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...anjaliyadav012327
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityGeoBlogs
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfciinovamais
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Sapana Sha
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxGaneshChakor2
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxSayali Powar
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Celine George
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introductionMaksud Ahmed
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfsanyamsingh5019
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDThiyagu K
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
 

Último (20)

Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
Disha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfDisha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdf
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...
JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...
JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptx
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SD
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 

A Survey on IoT Architecture

  • 1. Available online at https://www.ijasrd.org/ International Journal of Advanced Scientific Research & Development Vol. 06, Iss. 04, Ver. I, Apr’ 2019, pp. 09 – 15 Cite this article as: Dhanasekar, S., Ilankhatir, E., Divakar, S., & Vennila, D., “A Survey on IoT Architecture”. International Journal of Advanced Scientific Research & Development (IJASRD), 06 (04/I), 2019, pp. 09 – 15. https://doi.org/10.26836/ijasrd/2019/v6/i4/60402. * Corresponding Author: S. Dhanasekar e-ISSN: 2395-6089 p-ISSN: 2394-8906 A SURVEY ON IOT ARCHITECTURE S. Dhanasekar1*, E. Ilankhatir1, S. Divakar1 and D. Vennila2 1 UG Scholar, Department of ECE, Kings College of Engineering, Punalkulam. 2 Asst. Prof., Department of ECE, Kings College of Engineering, Punalkulam. ARTICLE INFO Article History: Received: 22 Mar 2019; Received in revised form: 09 Apr 2019; Accepted: 09 Apr 2019; Published online: 10 May 2019. Key words: IoT, Internet of Things, IoT Architecture, RFID, Radio Frequency Identification, Machine-to-Machine. ABSTRACT Internet of things (IoT) has started growing due to the developments in RFID, sensors, communication technologies and Internet protocols. The basic aim is to connect sensors in a straight line devoid of human association in the vicinity of help in creation of new types applications. The revolution in mobile, Internet in addition to machine-to-machine (M2M) technologies preserve is seen when the primary step towards IoT. Internet of Things (IoT) is forwarding the association among the objects (the “things”) and the backend systems passing through the Internet. Every object can become connected and smart. As a result, the background is monitored via sensing the background furthermore the data are transferred toward cloud with internet connectivity of the things. The monitoring environment comes closer in spite of distance. There are several platforms that provide services such as data analytics, business analytics, notification, etc. Each platform provides a specific service In this expose, we examine a delegate section of these platforms, together open- source and proprietary, on the source of their capability to convene the potential of dissimilar IoT users. The evaluation focuses on how prepared and functional these platforms are for IoT ecology players, other than on the peculiarities of the essential scientific layers. This paper mainly aims to provide a summary of different platforms and stages for IOT. This paper would help the IoT users to decide their best platform to suit their application. Copyright © 2019 IJASRD. This is an open access article distributed under the Creative Common Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited. INTRODUCTION Internet of things is defined as an interconnection of things together via internet. The object is a physical object that can be a vehicle parking field, any machines, even light
  • 2. A Survey on IoT Architecture Volume 06, Issue 04, Version I, Apr’ 2019 10 can be managed. The things are attached with the sensors (sensing environment), electronics (different functionalities such as connectivity) and software (connection of things with other things). The exponential growth of IoT industry requires robust IoT platforms which indicates the renewal requirements such as in the smart cities applications, a huge volume of information has to be managed. First time Kevin Ashton coined IOT in 1999 who recognized a laboratory in MIT for concerning the objects throughout RFID. In 2005 the IOT is mentioned by ITU. In 2010 Google design a car that can access the map by connecting to the internet and accordingly get automated by self. This is an important project in the platform of IOT. In 2010 the Bluetooth small power protocol was designed that enables the things to be allied among small energy consumption. Different technologies that enable the connectivity and the communique over the network of things are Bluetooth, Zigbee, Wi-Fi, 4G LTE. All of these technologies varied in their series of transmission, power consumption, and speed. Based on the function the technology that is worn to offer connectivity and power constraints, the technology preferred may differ. The IoT helps physical objects to think, see, hear and perform respected task by having them opportunities to talk together for sharing of information and to manage over decisions. The IoT convert these objects from being ideal to smart by exploiting its hidden technologies such as ubiquitous and pervasive computing, embedded technology, communication technologies, sensor networks, Internet protocols and applications. Smart objects along with specialized tasks provide a specific domain application (vertical markets) while ubiquitous computing and analytical services form application domain independent services (horizontal markets). 1.1 State of Art: Xively This platform provides service for building an IOT mobile applications (APP). The objects are related to the xively platform by protocols such as REST, HTTP, and MQTT. It ensures protection by having a protect server with tool and user confirmation by their API key which is assigned to them while registering as a novel user. It provides an SDK for Arduino, android, python, java, PHP, RUBY. Axeda: Is a dais that provides the storage space to accumulate the data of the objects analyses the data and get notified. The axeda supports the MQTT protocol for the communication with the axeda cloud. It has a middleware called IOT connectivity to easy combine and connect the things to cloud. It also has SDK to make the APP and to contact the data throughout the web app. The axeda cloud providers have also obtained an ISO 27001:2013 certificate for ensuring security in axeda cloud. The axeda cloud also associated with protocol such as SOAP, REST. The grovey scripting engine is there to sustain the
  • 3. Dhanasekar et al., (2019) 11 Volume 06, Issue 04, Version I, Apr’ 2019 application development. The axeda offer connectivity among things and cloud by axeda wireless protocol. 1.2 Thingworx It is an IOT APP expansion podium that allows the user to developers to extend its own application. The data communique and machine manage in spin is throughout REST protocol, MQTT. There is a codeless crush up designer that allows the consumer to produce their own APP without any necessitate to code. It also allows the social networks to work together among users such as twitter, LinkedIn, Google +. SQUEAL is a explore engine that is used to data investigation, look for and query the data warehouse stored in cloud. Thing watcher is software that is used to perceive the anomalies and gives indications. The thing interpreter is software that predicts task by taking into consideration the key factors recommended by the thing watcher. Thing optimizer is software that is used to progress the presentation by using the predictions in thing predictor. Thus, the thing worx analytic server uses the thing watcher, thing predictor and thing optimizer and provides a better data nalytics. Thing Square: Is a platform each connected objected runs a wireless thing square mist os. It ensures the secure connectivity by the AES protocol. Thing square IDE is a mesh-based IDE to construct online fog APP. This thing square fog is an entryway throughout services such as information bank as an overhaul by offering storage space to store up information, information as a service in which we be able to make a statistics investigation and dealing as a service on behalf of a linked production and manufactured goods. The xively moreover provide an exclusive API designed for the information revelation with the aim of life form stored in obscure. Xively have moreover has been won numerous awards as an IOT expertise modernizer in 2015 and also several awards in year 2013. Which the stuff is linked in the type of lattice. The visibility of the device is within the mesh. Bug Swarm: The bugs lab was started in the 2006 and introduced their original hardware called bug in 2008. That enables the unwrap foundation IP enabled hardware. Swarm is a relax based messaging podium for IOT launched through bug lab in 2010. By means of swarm the relax based communications be able to throw stuff and build power above the surroundings, build notification etc. They launched dweet and freeboard podium on behalf of the IOT in 2014. Dweet is a chirp of equipment. It is issue promise based reproduction where issue is the tweet of things data and the subscribers are the one who follow the things. We can even buy a lock on thing so that the only registered user with key can follow the thing and subscribe the data from the thing. Freeboard is a information revelation dash and to facilitate the consumer to propose their individual information image. The consumer can generate their personal boundary design and the method to be exhibit the information and allows the consumer to share user’s public/private mode. This freeboard is more compatible with the dweet. Sensor Cloud: This product was designed earlier to sustain the micro tarnish agitated and wireless sensor as obscure storage space other than it also supports extra third-party sensor by unwrap foundation API. It sends notification by SMS and email. It has a mathematic locomotive with the intention of allows the consumer to plan their individual information image device to construct a consequential intelligence on their
  • 4. A Survey on IoT Architecture Volume 06, Issue 04, Version I, Apr’ 2019 12 information. All the deals are encrypted and then transmitted to the sensor obscure. In addition, it allows the users to insert an entrance charge to a sensor cost and time that can launch the vigilant when the episode occur. Actual moment information is accessed by forming an effective survive port among the entryway and obscure by means of live joint. For visualization of the data, math engine provided by sensor cloud is used. In sensor cloud python code is used for data visualization which for allows to integrate the ipython notebook. Thing Speak: Data can be sent from various thing or sensor or a website to the thing speak cloud and we can visualize the data stored and it is also possible to customize the visualization to a live data. Thing Speak enables engineers and scientists to prototype and build IoT systems without setting up servers or developing web software. 1.3 EvryThng Evrythng uses an OAuth protocol to connect the external application to the products. Active Digital Identity (ADI) is used to identify each product digitally and an activity can be performed by setting the threshold condition trigger. Decision making and customizing the work flow is done by engine called Reactor. Everything supports various connectivity technologies viz QR code, RFID, BLE and NFC. MQTT, COAP and web sockets are the communication protocols supported and the connectivity between different communications protocols are solved using Thnghub local cloud gateway software. It works in low latency in offline and also has a local API. Every Ware Device Cloud: Every ware device cloud is a platform according to the eurotech structure that offers end to end solution and a variety of services as API development, console and updates the data stored in cloud. MQTT protocol is used for communication, it also provides much hardware to afford an end to end solution. The notifications are received in tweet, SMS, e-mail, voice call and dashboard. It is possible to integrate with other service providers such as sales force, Twitter, Facebook, Google Aps. iDigi device cloud. To ensure security of consumer’s data about 175 security controls are used. To enable information from device to cloud ethrios cloud connector in SDK package is used. It also allows third party data exchange. It also allows bidirectional communication. The user has to set the threshold data to send notification and to schedule a task automatically within the specified time. To receive better data throughput, mash up is performed in various data channels. The user is allowed to send notification by triggering the ip connected with the environment. Discussion: IOT is a mishmash of sensor network technology, cloud computing and big data concepts. The main part of the cloud computing in IOT is to provide data storage and services for accessing the data and for setting notification/alert. Mostly the cloud platform provides REST based web services. The protocols supported by the platforms mostly are HTTP and then MQTT. SSL handshake protocol is used to ensure the security of the data transmission to the cloud and Xively and sensor are some of the cloud providers which uses TSL handshake protocol. During registration process each user is given an API key and it is used for authentication purpose. In all cloud providers data analytics services are provided and some providers such as Thing speak, Bug swarm multiplex various sensor data to build and to allow the user to customize their widgets. Axeda and Every ware device
  • 5. Dhanasekar et al., (2019) 13 Volume 06, Issue 04, Version I, Apr’ 2019 provide notification through voice call and notifies through SMS or mail. Cloud platforms are used in healthcare domain and it supports MQTT protocol where the publisher are the users who are wearing the health sensors and the subscribers are the physicians. Axeda, Thingworx etc are used in home automation domain for resource sharing. This seems to be more secure and even in Thing speak platform where the information can be shared privately. Thing square, Thingworx, can also be used in traffic management since, it has TLS/ SSL and AES security protocol. Bug swarm is used in smart irrigation which uses a simple HTTP protocol for communication. TECHNOLOGIES INVOLVED IN IOT Many technologies are available to implement the concept of Internet of Things. This paper focuses only on below technologies: • Radio Frequency Identification (RFID) • Near Field Communication (NFC) • Machine-to-Machine Communication (M2M) • Vehicle-to-Vehicle Communication (V2V) 2.1 Radio Frequency Identification (RFID) Radio frequency identification system consists of one or more reader(s) and several RFID tags. Tags are differentiated by a unique address allotted to the objects. Tags
  • 6. A Survey on IoT Architecture Volume 06, Issue 04, Version I, Apr’ 2019 14 communicate with radio-frequency electromagnetic fields to move information attached with specific object. The tags consist of electronically stored information which can simply be interpret through the RFID booklover when the object came nearer to reader. RFID allows to manage objects over real-time, without the need of human in line-of-sight. Physically RFID card or label is a minute microchip joined through a tentacle in a compressed package. The tag’s aerial picks up signal commencing an RFID reader and then proceeds the indicator, typically with several extra information. The RFID tags are categorized into several sections, the first one is Passive Reader Active Tag (PRAT). In this tag reader is reflexive and receives the signal from the battery-operated active tags. It can transmit till range of 1-2000 feet depending upon the architecture. The subsequent one is Active Reader Passive Tag (ARPT), ARPT is commonly used. No onboard power supplies are present in ARPT, it extracts required energy from query signal sent by the RFID reader to sent data. The third one is an Active Reader Active Tag (ARAT). Reader and the Tags are active in ARAT, tags are triggered to active only when it comes nearer to reader. Transmission occurs over frequency band of low frequencies (LF) next to 124-135 KHz up to ultra-high frequencies (UHF) at 860-960 MHz. A commonly used data stored tag is known as Electronic Product Code (EPC). EPC’s code is a type of RFID tag, we can follow and recognize items uniquely. Tag consists a 96-bit thread of information. It consists of first eight bits as description which identifies the description of the code of behavior. The next 28 bit gives idea of the society that manages the information for this card, EPC Global consortium assigns organization number to each tags. Other 24 bits are an entity group, used to recognize the variety of creation and the remaining 36 bits are an exclusive number for an exclusive card These final two fields are left untouched by the organization for distributed the tag. Like a URL, the complete electronic manufactured goods cipher digit is used to identify tags in global database which exclusively recognize a particular invention. The RFID tags are used to Monitor the product life cycle, manage warehouse inventories, goods tracking, animal tracking, baggage tracking over airport, payment using mobile, etc. RFID technology can be combined with other sensing technologies to release a fresh prospect for new applications. MARKET AVAILABILITIES The Internet of Things offer a huge advertise for apparatus manufacturer, service provider and appliance developers. The smart items based on IoT are estimated to cover over 213 billion entity internationally by the end of 2020. By 2022, M2M traffic flows are projected to attain up to 45% of the whole Internet traffic. Past these prediction, McKinsey Global Institute reported that the number of linked equipment (units) has grown-up 300% over the previous 5 years. US show a boost of 250% for M2M traffic volume in 2011. Economic growth of IoT-based services is also increasing exponentially for business factors. Healthcare and manufacturing applications are projected to enhance the economy of system. Healthcare applications associated IoT-based services such as cellular phone wellbeing (m-Health) and telecare that facilitate medical wellness, analysis, healing and monitoring services on the manner to construct about $1.1-$2.5 trillion annually by the global economy over 2025. The entire yearly financial crash caused by means of IoT is expected to be alive in series of $2.7 trillion toward $6.2 trillion in 2025.
  • 7. Dhanasekar et al., (2019) 15 Volume 06, Issue 04, Version I, Apr’ 2019 CONCLUSION This manuscript results a list of cloud providers for IOT, their special features such as some engines for data analytics or a middleware to connect any things to cloud dynamically and their special services such as business analytics services and notification call and manually setting some threshold value and when the event happens the cloud can triggers the action in an environment. Thus, this paper mainly aims to provide a general knowledge about IOT and use of IOT system as per designer’s requirement and budget for development. REFERENCES [1] Sruthi, M., & Kavitha, B. R., (2016) “A SURVEY on IoT Platform,” International Journal of Scientific Research and Modern Education (IJSRME), 1 (1), pp. 468–473. [2] Guth. J., Breitenbücher, W., Falkenthal, M., Leymann, F., & Reinfurt, L., (2016) "Comparison of IoT platform architectures: A field study based on a reference architecture". 2016 Cloudification of the Internet of Things (CIoT), pp. 01 - 07. DOI: https://doi.org/10.1109/CIOT.2016.7872918. [3] V. Trifa and D. Guinard, “Towards the Web of Things,” pp. 1–4, 2009. [4] S. Agrawal and D. Vieira, Abakós, vol. 1, no. 2, 2013.“A survey on Internet of Things” – DOI 10.5752/P.23169451 2013 v1n2 p78. [5] A.Al-Fuqaha, M.Guizani, M.Mohammadi, M.Aledhari, and M.Ayyash “Internet of Things: Asurvey on enabling Technologies, protocols and applications”.