Thanks to visit codestin.com
Credit goes to www.scribd.com

0% found this document useful (0 votes)
205 views92 pages

Cloud Computing Decode

Uploaded by

yq9v472dzj
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF or read online on Scribd
0% found this document useful (0 votes)
205 views92 pages

Cloud Computing Decode

Uploaded by

yq9v472dzj
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF or read online on Scribd
You are on page 1/ 92
— "UNIT - V | Aaceaumeammmsnaminnnnnned Ubiquitous Clouds ang th e Internet of Thing, ining: Don. Important Points to Remember = ~~~ © Ubiquitous cloud computing refers to the use of esources at any place and any time for any objectives, tere « Nebula is an open-source cloud computing platform, © SGI is a global leader in large-scale clustered computin, performance storage, HPC and data center enab| 8 high ¥ ment and services. » Mashup is a Web page or application that uses and combines data, presentation or functionality from two or more Sources f create new services. © A doudlet is a mobility-enhanced small-scale cloud data center. FutureGrid is more than a Cloud; it is a general distributed Sandbox; a cloud grid HPC testbed. «Every sensor node is equipped with a transducer, microcomputer, transceiver and power source. ¢ RFID is an Automatic Data Capture technology that usss radio-frequency waves to read a movable item to identify categorize and track. © Cyber-physical system(CPS) is an embedded syst integrates the computing process with the physical world 4 interactive and intelligent system. em which is all 5.1 Cloud Trends in Supporting Ubiquitous Computing id Mm chow Q1 What is Ubiquitous computing ? Explain about |B 6-) aot Ubiquitous Clouds and the “AC mnputing 5-2 Internet of Things t : + ~e Ubiquitous computing is the method of enhancing Ans: uter use by making many computers available throughout the comical environment, but making them effectively invisible to the P ser. : » ybiquitous cloud computing refers to the use of Internet . resources at any place and any time for any objectives. . [BM cloud platforms are mostly built with IBM server clusters supported by IBM WebSphere. IBM Ensembles offer a virtualized cloud system for IaaS services. This system can put together a large resource pool to simplify management complexity. » The purpose is to offer application flexibility and efficient resource deployment through dynamic server, storage, and network ensembles. e JBM also developed the Tivoli Service Automation Manager (TSAM) for rapid design, deployment, and man-agement of service processes. ¢ WebSphere CloudBurst (WCA) is another platform for managing private clouds. IBM LotusLive offers an SaaS cloud for application service development. The services include an online conference service, coordinated office management, and e-mail services. IBM Blue Cloud System * In November 2007, IBM announced the Blue Cloud Project based on open standards and open source software. The project is supported by more than 200 IBM web-scale researchers worldwide. * Blue Cloud combines several existing software and virtualization Packages on a specifically designed IBM hardware server platform. * Open source and private software is combined to form the cloud computing environment. The Blue Cloud is built with x-servers, that are very similar to x86 processors. ® ECODE @ Less than PHOTOCOPY Price . ©. 2a) aera es ests. ET ss Ubiquitous Cloy i! Linux TNS on these servers supported by ity ngs yjrtualization $0 baseg a2 Write short note i d computi , Nebula is an open-source clou puting plat - aevclopell to provide an improved alternative to re tha ‘sonal expensive data centers and to provide an easier ui NASA scientists and researchers to share, large, complex with external partners and the public. e Nebula is an excellent example of how NASA is champin ongoing partnerships with private industry and academia, iy Each component of the Nebula platform will be avaig individually, serving SaaS, PaaS, and IaaS needs across i‘ e agency. NASA will use Nebula for mission support, education, and public outreach and to encourage collaboration and public input. + Nebula will provide NASA with an easy, efficient, and secu way to interact and share data with the public. « Nebula is available to NASA's internal project groups and its research and academic partners. It is not available for use by private industry or the general public. Nebula's architecture is designed from the ground up fr interoperability with commercial Cloud service providers such a Amazon Web Services, offering NASA researchers the ability ' easily port data sets and code to run on commercial Clouds: Q.3 Explain properties of High Performance Computing (HPC) on NASA's Nebula Cloud. 8 Way for data Sets Ans. :* HPC clouds are viewed as having the following properties 1. Web Service-Based : All resources from data storage '° alive job management are done via self-describing Web services i aii’ oy eaquire te 2. Virtualization : For flexibility, cloud computing will req use of virtualization. - _ (DECODE) @ Less than PHOTOCOPY Pris? a Ubiquitous Clouds and the mputing 5-4 Internet of Things 3, Clusters Are Provided On-Demand : Clients should be able to 5. specify requirements and then discover an existing cluster for immediate use Guaranteed Performance : Typically, if cluster nodes are allocated to clients, all nodes are expected to be within close proximity to each other. Use the Pay as You Go Model : All HPC clients are billed for the resources they use and amounts thereof. a4 Explain challenges for HPC cloud. Ans. : ¢ Challenges are listed below : 1. Interface Challenges : Most cloud and cluster solutions offer command line interfaces but rarely (if at all) present graphical interfaces. Even when provided, graphical interfaces tend to act as command line wrappers. Performance Challenges : At the very least, a cluster hosted in a cloud should run applications as fast than existing physical clusters. Currently, there is no mechanism in place to evaluate performance factors such as current CPU utilization and network IO. Communication Challenges : A common issue with clouds is their network performance, eg. EC2. Network performance cannot be solved by using an Infiniband network alone. There is still the issue of network topologies within clouds. Even if a cloud is hosted within a single location, the virtualized nature of clouds may cause a single cluster to be hosted across multiple systems. Intelligence Challenges : While cloud computing offers Tesources as a utility, they are not always intelligent when allocating resources to clients. Configuration Challenges : As well as providing clusters in clouds, it has to be possible to reconfigure the specifications of existing clusters for different types of cluster applications. ee DECODE ) @ Less than PHOTOCOPY Price peer Ubiquito = us C 5-5 Ih lo amici Hr LA Chall : One of the most difficult a 6, SLA and maintaining agreements between a nts ee allenge wh ; ‘ low : The final ch lenge when creating Hpc 7. Workflo dient workflows. Not all HPC probs using @ single application; some problems — a multiple different applications. wire , P chain of Cloud for High.p, for, ance 5 Write short note on SGI Cyclone ader in large-scale clustered comp Qu Computing se SGI is a global le Ans. HPC and data center enablement y and high performance storage, © SGI has developed a cluster named Cyclone based on the specific super computer technology. This system is based i ific shared memory model, which enables to reach a lange amount of shared resources. ; «This IT system offer a direct access to the hardware with dedicated improvement provided by SGI compute nodes. ¢ Cydone is an on-demand cloud computing service specifically dedicated to technical applications. It supports a number cf leading application partners and five technical domains, includin; computational fluid dynamics, finite element analysis computational chemistry and materials, computational biology and ontology. © Cyclone is available in two service models: SaaS and IaaS ¢ With the SaaS model, Cyclone customers can significantly red time to results by accessing leading-edge open source ae and best-of-breed commercial software platforms fro" " independent software vendors. ¢ The IaaS model enables customers to install and run the! applications. Q6 Explain difference between HPC and Cloud. r own foecnnae, DECODE) @ Less than PHOTOCOPY Price Ubiquitous Clouds and the 5-6 Internet of Things HPC uses homogeneous resources. | Cloud uses heterogeneous resources. Initial capital investment cost is high. Q.7 What is mashup ? Explain different types of mashup. Ans.:¢ Mashup is a Web page or application that uses and combines data, presentation or functionality from two or more sources to create new services. eThe term implies easy, fast integration, frequently using open APIs and data sources to produce enriched results that were not necessarily the original reason for producing the raw source data. The main characteristics of the mashup are combination, visualization, and aggregation. It is important to make existing data more useful, moreover for personal and professional use. ¢ Mashup composition tools are usually simple enough to be used by end-users. They generally do not require programming skills and rather support visual wiring of GUI widgets, services and components together. * Mashup Architecture is 3-tier architecture. * Presentation : Mashups are almost always presented visually, in Portals or portal-like applications. * Mashup Infrastructure : Technology for accessing, assembling, and processing mashups, as well as ultimately serving them to applications, * Information Sources : Virtually anything that is a ‘service’ can be an information source for a mashup. This includes internal Ubiquitous Clea , 5-7 . Cloud Computing, Interne a th files, Java objects, Web Services ang “7 Resp sy three salient characteristics : e Mashups al] share { data directly on the web. 4, They draw on sources ©! > They transform, combine, and re-transform this data t innovative NeW outputs. Maps and timeline displays are q mashup output formats. 3, They can usually be done in a few hours. That means tha are created rapidly in a high-pro ica Teale Ypicay transformations environment. Types of Mashup : « Consumer mashup is an application that combines data from multiple public sources within a browser and. organizes j through a simple browser user interface. « An enterprise mashup, also often called a business mashup, is an application that combines data from multiple internal and publc sources, and publishes the results to enterprise portals, application development tools, or as a_ service in a service-oriented architecture. © A data mashup, opposite to the consumer mashups, combine information from multiple sources similar types of media and into a single representation. The combination of all these resources create a new and distinct Web service that was not originally provided by either source. Q8 What is cloudlet ? Ans.: A cloudlet (also called micro data center architectural element that arises from the convergence ° computing and cloud computing. It represents the middle 3+tier hierarchy: mobile device - cloudlet - cloud. +A cloudlet is a mobility-enhanced small-scale cloud datacem The main purpose of the cloudlet is supporting resource ) is a neW inten! ve: © DECODE) @ Less than PHOTOCOPY Price £5 Ubiquitous Clouds and the Thin: cond COMPUTINE Internet of TRIN? and interactive mobile applications by providing powerful i mputins resources to mobile devices with lower latency. Cc it puilds on standard cloud technology. a9 Explain Pros and Cons of the Mashup. : Pros: : Mashups allow for the reuse of existing applications. 2, They also allow for rapid application development. 3, Development of a mashup does not Necessarily involve extensive IT skills. 4, The associated cost of application development is greatly reduced. 5, Applications are better tailored to users’ needs. Cons : 1. A user might have no control over the quality and features of the content. Even if reliability of the content source is established, a potential problem is scalability. The integrity of the content can not be guaranteed either. Most data sources are not yet built on a service-oriented architecture (SOA). 5. Only software that can be accessed with a web browser can be included in a mashup. Seat are the differences between local cloudlets and distant clouds Ans, : Local cloudlets L Distant clouds It support only soft state. It support soft state and hard state. Decentralized Ownership by local | Centralized ownership by Amazon, business | Yahoo ete (DECODE ) @ Less than PHOTOCOPY Price ee Ubiquitous loss Sang Intern, et 4 in = Internet bandwidth sharing | ~~ petween 100 to 1000 uses ae i at professional administration ime required. 5 Machine room with power condition and cooling cloud computing with ar betel tages ‘and disadvantages. chitectug ott Explain ciple, Also 70° i “4< of cloud computing i of the main ts of clo’ puting is reducin ans. 20 One expenditure for servers and other compy, uired to purchase the mining downtime am i . jven company is equipment Agv ssary t0 handle the maximum points oj stress on their system . . ; wi e strain and traffic are highly variable : ample, Amazon.com, a leads to ir ex : y @ pioneer = at times used as little as 10% of ther ve enough capacity to deal with high strain times. « Mobile Cloud Computing (MCC) at its § infrastructure where both the data storage happen outside of the mobile device. implest, refers to an and data processing es =~— e-€ > ‘ Ly _— -_ 6 Smart mobile Wireless network Computational device technology cloud Fig. Q.11.1 Block diagram of mobile cloud . 8 © Mobile cloud applications move the computing power and “ 5 and into the cloud: oe ; use! storage away from mobile phone! Sm and mobile computing to a much broader range of mobile subscribers’ ® (DECODE) @ Less than PHOTOCOPY price not just smart P e cloud Computing 5-10 Ubiquitous Clouds and the Internet of Things , Mobile cloud applications move . storage away from the mobile levices Y Power and data centralized computing platforms ~~ then accessed over the wirele i i $8 connection based on a thin native the comy »Mobile devices face many 1, storage, bandwidth etc), Cloud com ee — = users by allowing them to ‘use inkastn cane nuert a ® software by cloud providers at low cost ein ai ce - on-demand fashion. =a + Mobile cloud computing provides Mobile users with data sto: and processing services in clouds, Obviating the need to aa powerful device configuration (eg. CPU speed, memo capacity), as all resource-intensive computing can inpeteees in the cloud. « Fig. Q.11.2 shows mobile cloud computing architecture. Nowwork spacators Fig. Q.11.2 Mobile cloud computing architecture a e DECODE ) @ Less than PHOTOCOPY Price ee 5-11 « In mobile cloud computing mobile network and clog | a are combined, thereby providing an optimal services ¢"Puin, che, Cd computing exist when aks and dat ge individual devices. Applications run on a remote server ae a sent to the client. they the mobile devices are connected to the mobile . the base stations; they will establish ang con connections (air interface) and functional interfaces Béty, 01 the mobile networks and mobile devices. PN the Ubiquitous Clo "4 e Here Mobile users send service requests to the cloud throy eh browser or desktop application. The information's are transmiy to the central processors that are connected to the ee mobile network services. Here, services like (Authentication, Authorization and Accounting) can be Provides to the users based on Home Agent (HA) and subscriber's 4, stored in databases. ¢ Mobile devices are connected to the mobile networks via base stations that establish and control the connections and functions) interfaces between the networks and mobile devices. a Web ¢ Mobile users’ requests and information are transmitted to the central processors that are connected to servers providing mobile network services. ¢ The subscribers’ requests are delivered to a cloud through the Internet. * In the cloud, cloud controllers process the requests to provide mobile users with the corresponding cloud services. Advantages : 1. Saves battery power 2. Makes execution faster 3. Improves data storage capacity and processing power DECODE) @ Less than PHOTOCOPY Price yo 5-22 Ubiquitous Clouds and the ud Computing Internet of Things lo jnproves reliability and availability Keeping data and 7 plication in the clouds reduces the chance of lost on the mobile devices. ic provisioning: Dynamic on-demand provisioning of . resources of @ fine-grained, self-service basis pisadvantages : ‘ Must send the program states (data) to the cloud server. 2, Network latency can lead to execution delay. 5.2 Performance of Distributed Systems and the Cloud 12 What is FutureGrid ? List goals of FutureGrid. Explain essential and different features of FutureGrid. Ans.:° FutureGrid is not a production system, but rather an environment supporting a_ flexible development and testing platform for middleware and application users looking at interoperability, functionality, and performance issues. «FutureGrid will make it possible for researchers to conduct experiments by submitting an experiment plan that is then executed via a sophisticated workflow engine, preserving the provenance and state information necessary to allow reproducibility. *Rather than loading images onto VM's, FutureGrid supports Cloud, Grid and Parallel computing environments by Provisioning software as needed onto “baremetal” or VM's/Hypervisors using (changing) open source tools. * Essential and Different features of FutureGrid : 1 Unlike many clouds such as Amazon and Azure, FutureGrid allows robust reproducible . 2 FutureGrid is more than a Cloud; it is a general distributed Sandbox; a cloud grid HPC testbed. 3 Supports 3 different IaaS environments (Nimbus, Eucalyptus, OpenStack) o— : — DECODE ) @ Less than PHOTOCOPY Price ™~ Ubiqu; bonis Cloy : it 4. Supports research on cloud tools, cloud migq a Nt doud-based systems as well as use of clouds in aPPlicg i ang . 0 5, FutureGrid has developed middleware ang inter ns ing TestbedaaS e.g. Phantom (cloud user ie Ces (virtual network) RAIN (deploy systems) 7 integration. 6. FutureGrid has experience in running cloud systems, 13 What lessons learnt from FutureGrid ? Ans.:« Unexpected major use from Computer Science Middleware Rapid evolution of Technology like Eucalyptus, Nimby, OpenStack ' * Open source [aaS maturing as in "Paypal To Drop VMware From 80,000 Servers and Replace It With OpenStack" (Forbes) Bay ty switch broadly? : © Need interactive not batch use; nearly all jobs short © Substantial “TestbedaaS" technology needed and FutureGnd developed «Lessons more positive than DoE Magellan report but goals different © Still serious performance problems in clouds for networking and device (GPU) linkage; many activities outside FG addressing * One can get good Infiniband performance (MPI) on a peculiar 0S + Mellanox drivers but not general yet « We identified characteristics of "optimal hardware" * Run system with integrated software (computer science) and systems administration team * Build Computer Testbed as a Service Community Q.14 What is data-intensive scalable computing ? How ! different from conventional supercomputer ? Clond Computing 5-13 Or , tis _ (BECODE’ @ Less than PHOTOCOPY Price 5-14 Ubiquitous Clouds and the - Internet of Things computing cow —pata-intensive computing is a class of parallel computing 75. Lions which use a data parallel approach to process large eos of data typically terabytes or petabytes in size and your referred to as big data eintensive computing platforms typically use a parallel » Da’ ting approach combining multiple processors and disks in commodity computing clusters connected using high-speed ications switches and networks which allows the data to F partitioned among the available computing resources and rocessed independently to achieve performance and scalability yi ased on the amount of data. . Difference between conventional supercomputer and data intensive scalable computing: Conventional Supercomputers Data-Intensive Scalable large eee An HPC system by which data is | An HIC data~enter cluster which retrieved from remote sites and collects and maintains data brought into the system for Computation collocated with execution. Heavy data movement | storage for faster access. overhead Heavy data movement overhead. No data movement overhead Machiné-dependent programs Machine-independent application | | written at a very low level. Use programs on data. Use runtime fewer software tools; need system controls to optimize specialists to optimize execution through load balancing, | etc | Main machine for batch Processing | Interactive access with priority | when resources are ready. Uses control and user intervention over Offline visualization at remote site large number of users | pm simultaneously Brittle systems with which to Flexible error detection and Tecover from most recent recovery | int. | @ Less than PHOTOCOPY Price enter graceful degraded <® 9 in case of failure : Tation Machine-dependent programming mode! Machine-dependent programming model | Q.15 Explain performance metrics for HPC/HTC systems. Ans. :¢ Performance metrics are throughput, multitaskin scalability, availability measure, data _ security, : cost-effectiveness. 1. System throughput measures the number of jobs that can be done per unit of time. The throughput measure is attributed to several key factors that affect the total execution time of all jobs processed in a given time window. 2 Multitasking Scalability : Multitasking implies the use of a system to handle many jobs simultaneously or concurrently, System services should be able to scale both horizontally across the machine or cluster size and vertically from applications to middleware, runtime and OS support, and hardware. 3. System Availability : System availability (A) refers to the percentage of time the system is up and running normally: This percentage reflects the effects of downtime after unexpected failures and scheduled maintenance for software upgrades. 4, Cloud security is attributed to user confidentiality, data integrity, access control, firewalls, IDSes, defense capability 5. Cost Effectiveness : This refers to the estimate of a" effectivt scale of economy achievable by a given system. (rcovE) @ Less than PHOTOCOPY Price and et SS eee 5-16 Ubiquitous Clouds and the acomputing Internet of Things i 33 Enabling Technologies for the Internet of Things (RFID, Sensor Networks and ZigBee Technology, GPS) 46 What 8 Internet of Things? Explain characteristics of loT. a. f Thin; i i .e The Internet of BS (loT) is the network of physical aie ie. devices, vehicles, buildings and other items embedded obit electronics, software, sensors, and network connectivity that wie these objects to collect and exchange data. oni 2005 Definition : By embedding short-range mobile . transceivers into a wide array of additional gadgets and everyday items, enabling new forms of communication between people and things, and between things. +A phenomenon which connects a variety of things. Everything that has the ability to communicate. +The Internet of Things is the intelligent connectivity of P devices driving massive gains in efficiency, busi ero hy = quality of life. = ¢ The Internet of Things refers to the capability of everyday devices to connect to other devices and people through the existing Internet infrastructure. Devices connect and communicate in many ways. Examples of this are smart phones that interact with other smart phones, vehicle-to-vehicle communication, connected video cameras, and connected medical devices. They are able to communicate with consumers, collect and transmit data to companies, and compile large amounts of data for third parties. *loT data differs from traditional computing. The data can be small in size and frequent in transmission. The number of devices, or nodes, that are connecting to the network are also greater in IoT than in traditional PC computing. * Machine-to-Machine communications and intelligence drawn from the devices and the network will allow businesses to automate certain basic tasks without depending on central or cloud based applications and services. *The smart object is the building block of the loT vision. By Putting intelligence into everyday objects, they are tumed into SS DECODE Se@ Less than PHOTOCOPY Price Udiquitoys Clo, Cloud Computing 5-17 Inte tds Nterres hd 1 of py, the smart objects able not only to collect informati Mes environment and interact /control the physical wo on tld, m be interconnected, to each other, through Internet : but as data and information. ° chang 8 Characteristics of the Internet of Things 1. Interconnectivity : Everything can be connected to th information and communication infrastructure, © Blob 2. Heterogeneity : Devices within IoT have different hay use different networks but they can still interact devices through different networks. 3. Things-related services : Provides things-related SETViCNES yi. the constraints of things, such as privacy and ue consistency between physical and virtual thing. antic 4 Dynamic changes : The state of a device can change dynamically. Q.17 Explain architecture of the Internet of Things. ‘dware ag With othe Ans. : ¢ The IoT system is an event-driven architecture. Fig. Q.17) shows architecture of IoT. Application layer Fig. Q.17.1 loT architecture (PEcoDE)@ Less than PHOTOCOPY Price —_ 5-18 Ubiquitous Clouds and the ios Computing Internet of Things e top or first layer is the IOT application layer which contains «Thi application user interface. the application layer is at the top of the architecture and is , responsible for delivery of various applications to different users jn JoT. The applications can be from different industry segments such as: ° manufacturing, logistics, retail, environment, public safety, healthcare, food and drug etc. » With the increasing maturity of RFID technology, numerous applications are evolving which will be under the umbrella of loT. «The bottom layers represent various types of sensing devices: namely RFID tags, ZigBee or other types of sensors, and road-mapping GPS navigators. The sensing devices are locally or wide-area-connected in the form of RFID networks, sensor networks, and GPSes. Signals or information collected at these sensing devices are linked to the applications through the cloud computing platforms at the middle layer. The signal processing clouds are built over the mobile networks, the Internet backbone, and various information networks at the middle layer. * The sensors enable the interconnection of the physical and digital worlds allowing real-time information to be collected and Processed. The sensors have the capacity to take measurements such as temperature, air quality, movement and electricity. *Sensors are grouped according to their unique purpose such as environmental sensors, body sensors, home appliance sensors and Vehicle telemetric sensors, etc. *Many of these hardware elements provide identification and Ormation Storage (e.g. RFID tags), information collection (e.g. a DECODE Se Less than PHOTOCOPY Price Ubiquitous Clo; ud. Cloud Computing ont9 Internet of" . jet of Thin sensors), and information processing (e.g. embeddeg processors). 18 What is RFID and RFID tag ? Explain working of RFID, Ans.:« Radio-Frequency Identification (RFID) is an Aut Data Capture technology that uses radio-frequency waves - : Matic 2 movable item to identify, categorize and track. ead e It is fast and does not require physical sight or contact between reader/scanner and the tagged item. ¢ It performs the operation using low cost components. [t atte to provide unique identification and backend integration allows for wide range of applications. Cdge Mpts that « RFID tags contain at least two major parts. One is an integrateg Greuit for storing and processing information, modulating ang demodulating a radio-frequency (RF) signal, and other special functions. The other part is an antenna for Teceiving and « Tags can be read-only or read-write. Tag memory can be factory or field programmed and optionally permanently locked (security). Data written to the tag left unlocked, can be modified over more than 100,000 times, allowing the the tag to be reused or updated. * Major components of RFID hardware : 1 RFID tag: A tiny silicon chip attached to a small antenna. 2 Reader antenna : It used to radiate the energy and then capture the retum signal sent back from the tag. 3. Reader : The device station that talks with the tags. A reader may support one or more antennae. © Fig. Q.18.1 shows working of RFID. In the active RFID system, the reader sends signal to the using an antenna. The tag receives this information and res" this information along with the information in its memory —_— ¢ DECODE) @ Less than PHOTOCOPY Price ee at < 5-20 Ubiquitous Clouds and the ariD RF Antena Network Workstation tag Fig. Q.18.1 RFID working » The reader receives this signal and transmits to the Processor for further processing. «Processor or a Controller: It can be a host computer with a Microprocessor or a microcontroller which receives the reader input and process the data. * Active and semi-passive RFID tags use internal batteries to power their circuits. An active tag can also use its own battery to broadcast radio waves to a reader, whereas a semi-passive tag telies on the reader to supply its power for broadcasting. * Active and semi-passive tags are reserved for reading over 30 to 100 meters, if repeater batteries are used to boost a tag's range. * Types of RFID Systems : 1. Active RFID system : These are systems where the tag has its Own power source like any external power supply unit or a battery. The only constraint being the life time of the power devices. These systems can be used for larger distances and to track high value goods like vehicles. Passive RFID system : These are systems where the tag gets Power through the transfer of power from a reader antenna to the tag antenna. They are used for short range transmission. — _ DECODE S@ Less than PHOTOCOPY Price ~~ Ubiquitous : : § Clo, Cloud Computing 5-21 Intemer 24 y, Ans. : Wireless Sensor Networks « A wireless sensor network (WSN) is a network formeg b number of sensor nodes where each node is equipped a latge sensor to detect physical phenomena such as light, heat My etc. ¢ WSNs nowadays usually include sensor nodes, actuator gateways and clients. A large number of sensor nodes den, , randomly inside of or near the monitoring area, form ieee | through self-organization. Orks «Sensor nodes monitor the collected data to transmit along 4 other sensor nodes by hopping. During the reg 7 transmission, monitored data may be handled by multiple nodes to get to gateway node after multi- hop routing, and finally reach the management node through the internet or satellite. a Pressure © A sensor network consists of multiple detection stations called sensor nodes, each of which is small, lightweight, and portable. « Every sensor node is equipped with a transducer, microcomputer, transceiver, and power source. The transducer generates electrical signals based on sensed data. « The microcomputer processes and stores the sensor output. The transceiver, which can be hard-wired or wireless, receives commands from a central computer and transmits data to that computer. ¢ The power for each sensor node is derived from the electric utility or from a battery. * Standards for WSN technology have been well developed, su‘h as Zigbee (IEEE802.15.4). The IEEE 802.15.4 is simple packet data protocol for lightweight wireless networks. for elt works well for long battery life, selectable latency controllers, sensors, remote monitoring and portable electron © @ Less than PHOTOCOPY Price _ v 5-22 Ubiquitous Clouds and the computing Internet of Things Ce generation of wireless sensor network. 20 Explain ' First Second parameters Generation Genetica ‘team le , 4 Now tecture sensing, sensing, sensing, Ar processing and Processing and | processing and communication | communication | communication Point to point, | Client-server Fully to lo} peer TopoloBy Star and and peer to peer| peer multi-hop Pi | ap Power Supply Large batteries | AA batteries Solar Life span Hours, days and) Days to weeks Months to years longer } { ————— em | Deployment Physically Hand placed | Embedded or | mode installed nanotechnology based | -— TT Manufacturers Custom Crossbow Dust, Inc, and | constructors Technology, Inc.,| others | Sensoria Corp., | Ember Corp | Q.21 Write short note on ZigBee Network Ans.: In 2002, seeing that neither Wi-Fi nor Bluetooth could not fit some of their needs for embedded systems, a number of industrial companies formed the consortium called ZigBee Alliance, aimed at providing standards for low cost / low consumption wireless communications. Then, with the birth of IEEE 802.154 group. * ZigBee communications can reach up to 500m, with a data rate of Up to 250kbs, for a typical power consumption of 125 to 400 uW. pe \DECO! E@ Less than PHOTOCOPY Price 4 Ubiquit Cloud Computing 5-23 ‘fatous Cloy « As ZigBee is based on IEEE 802.15.4, there is no Wake ngs but slots for sleep or activity, or in asynchronous ~ “5 Signal sleeping anytime they have nothing to say, with an e Fevicg, coordinator. er “igilany ¢To use a ZigBee module with a microcontroller, connect it to a UART. There are other, optional including a number of analog inputs / digital IOs ‘it, to Use output indicating the strength of the signal which 2 Pn directly connect to a LED pin for observation purposes YOU can You Need ty « There are two modes of data transfer namely Beacon in Non Beacon mode. de ¢ In Beacon mode, when the devices are not sending the q may enter a2 low power state and reduces consumption. ata they the POWer « In Non-beacon mode, the end devices need to be wake y while sending the data while the routers and coordinator. to be active most of the time. P only 'S Need « Fig. Q21.1 shows star topology and peer-to-peer topology. i \i \UZ / e-° Lao NX PAN e F \ a coordinator PAN @ Full function device coordinator © © Reduced function device <—> Communication flow a) Stratopology _b) Peer to Peer technology Fig. Q.21.1 * There are three different types of ZigBee devices : ZigBee coordinator (ZC) : This is the most capable ZigBee 4°" serving as the coordinator or the root of a ZigBee network ThE DECODE@ Less than PHOTOCOPY Price 5-24 Ubiquitous Clouds and the puting Internet of Things opposes _—___—_tema Tp exactly one coordinator in each network since it is the device is & sarted the network, It is able to store information about the t st ‘ : reewor including acting as the trust center and repository of security keys. LigBee Router (ZR) : This can act as an intermediate router, De g on data from end device to end device. ee End Device (ZED) : This contains just enough functionality to talk to the parent node. The end device cannot relay data from other devices. This relationship allows the node to be asleep a significant amount of the time, thereby ensuring a Jong battery life. A ZED requires the least amount of memory, and therefore can be less expensive to manufacture than a ZR or ZC. Q.22 How wireless sensor network help health monitoring system ? Ans.:° Wireless sensors support offer many possibilities for measuring different parameters of the human body and most of them are imperceptible and comfortable to use. «oT devices can be used to enable remote health monitoring and emergency notification systems. These health monitoring devices can range from blood pressure and heart rate monitors to advanced devices capable of monitoring specialized implants. ¢ Smart health systems provide health related services using 2 network, some kind of connection between intelligent agents. These intelligent agents could be computing devices, mobile phones, sensors, Fitbit smart bands, surgical devices, devices that measure your blood chemistry, or devices that measure your brainwaves. Any of these things could be intelligent agents. * Fig. Q.22,1 shows smart health monitoring system using wireless sensor. * The human actors, patients or healthcare providers for example could be intelligent agents in this system. The sensors, devices, computers, applications, and human actors are all intelligent agents that might be connected in the smart health system. (BECODE’@ Less than PHOTOCOPY Price

You might also like