0 ratings0% found this document useful (0 votes) 205 views92 pagesCloud Computing Decode
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content,
claim it here.
Available Formats
Download as PDF or read online on Scribd
—
"UNIT - V |
Aaceaumeammmsnaminnnnnned
Ubiquitous Clouds ang th
e
Internet of Thing,
ining: Don.
Important Points to Remember = ~~~
© Ubiquitous cloud computing refers to the use of
esources at any place and any time for any objectives, tere
« Nebula is an open-source cloud computing platform,
© SGI is a global leader in large-scale clustered computin,
performance storage, HPC and data center enab| 8 high
¥ ment and
services.
» Mashup is a Web page or application that uses and combines
data, presentation or functionality from two or more Sources f
create new services.
© A doudlet is a mobility-enhanced small-scale cloud data
center.
FutureGrid is more than a Cloud; it is a general distributed
Sandbox; a cloud grid HPC testbed.
«Every sensor node is equipped with a transducer,
microcomputer, transceiver and power source.
¢ RFID is an Automatic Data Capture technology that usss
radio-frequency waves to read a movable item to identify
categorize and track.
© Cyber-physical system(CPS) is an embedded syst
integrates the computing process with the physical world 4
interactive and intelligent system.
em which
is all
5.1 Cloud Trends in Supporting
Ubiquitous Computing
id
Mm chow
Q1 What is Ubiquitous computing ? Explain about |B
6-)
aotUbiquitous Clouds and the
“AC mnputing 5-2 Internet of Things
t : +
~e Ubiquitous computing is the method of enhancing
Ans: uter use by making many computers available throughout the
comical environment, but making them effectively invisible to the
P
ser. :
» ybiquitous cloud computing refers to the use of Internet
. resources at any place and any time for any objectives.
. [BM cloud platforms are mostly built with IBM server clusters
supported by IBM WebSphere. IBM Ensembles offer a virtualized
cloud system for IaaS services. This system can put together a
large resource pool to simplify management complexity.
» The purpose is to offer application flexibility and efficient
resource deployment through dynamic server, storage, and
network ensembles.
e JBM also developed the Tivoli Service Automation Manager
(TSAM) for rapid design, deployment, and man-agement of
service processes.
¢ WebSphere CloudBurst (WCA) is another platform for managing
private clouds. IBM LotusLive offers an SaaS cloud for
application service development. The services include an online
conference service, coordinated office management, and e-mail
services.
IBM Blue Cloud System
* In November 2007, IBM announced the Blue Cloud Project based
on open standards and open source software. The project is
supported by more than 200 IBM web-scale researchers
worldwide.
* Blue Cloud combines several existing software and virtualization
Packages on a specifically designed IBM hardware server
platform.
* Open source and private software is combined to form the cloud
computing environment. The Blue Cloud is built with x-servers,
that are very similar to x86 processors.
®
ECODE @ Less than PHOTOCOPY Price
. ©. 2a) aera es ests.ET
ss Ubiquitous Cloy
i!
Linux TNS on these servers supported by ity ngs
yjrtualization $0 baseg
a2 Write short note
i d computi
, Nebula is an open-source clou puting plat
- aevclopell to provide an improved alternative to re tha
‘sonal expensive data centers and to provide an easier ui
NASA scientists and researchers to share, large, complex
with external partners and the public.
e Nebula is an excellent example of how NASA is champin
ongoing partnerships with private industry and academia, iy
Each component of the Nebula platform will be avaig
individually, serving SaaS, PaaS, and IaaS needs across i‘
e
agency.
NASA will use Nebula for mission support, education, and public
outreach and to encourage collaboration and public input.
+ Nebula will provide NASA with an easy, efficient, and secu
way to interact and share data with the public.
« Nebula is available to NASA's internal project groups and its
research and academic partners. It is not available for use by
private industry or the general public.
Nebula's architecture is designed from the ground up fr
interoperability with commercial Cloud service providers such a
Amazon Web Services, offering NASA researchers the ability '
easily port data sets and code to run on commercial Clouds:
Q.3 Explain properties of High Performance Computing (HPC)
on NASA's Nebula Cloud.
8
Way for
data Sets
Ans. :* HPC clouds are viewed as having the following properties
1. Web Service-Based : All resources from data storage '° alive
job management are done via self-describing Web services
i aii’ oy eaquire te
2. Virtualization : For flexibility, cloud computing will req
use of virtualization.
- _
(DECODE) @ Less than PHOTOCOPY Pris?a
Ubiquitous Clouds and the
mputing 5-4 Internet of Things
3, Clusters Are Provided On-Demand : Clients should be able to
5.
specify requirements and then discover an existing cluster for
immediate use
Guaranteed Performance : Typically, if cluster nodes are
allocated to clients, all nodes are expected to be within close
proximity to each other.
Use the Pay as You Go Model : All HPC clients are billed for
the resources they use and amounts thereof.
a4 Explain challenges for HPC cloud.
Ans. : ¢ Challenges are listed below :
1.
Interface Challenges : Most cloud and cluster solutions offer
command line interfaces but rarely (if at all) present graphical
interfaces. Even when provided, graphical interfaces tend to act
as command line wrappers.
Performance Challenges : At the very least, a cluster hosted in
a cloud should run applications as fast than existing physical
clusters. Currently, there is no mechanism in place to evaluate
performance factors such as current CPU utilization and
network IO.
Communication Challenges : A common issue with clouds is
their network performance, eg. EC2. Network performance
cannot be solved by using an Infiniband network alone. There is
still the issue of network topologies within clouds. Even if a
cloud is hosted within a single location, the virtualized nature of
clouds may cause a single cluster to be hosted across multiple
systems.
Intelligence Challenges : While cloud computing offers
Tesources as a utility, they are not always intelligent when
allocating resources to clients.
Configuration Challenges : As well as providing clusters in
clouds, it has to be possible to reconfigure the specifications of
existing clusters for different types of cluster applications.
ee
DECODE ) @ Less than PHOTOCOPY Pricepeer
Ubiquito
= us C
5-5 Ih lo
amici Hr
LA Chall : One of the most difficult a
6, SLA and maintaining agreements between a
nts
ee allenge wh ; ‘
low : The final ch lenge when creating Hpc
7. Workflo dient workflows. Not all HPC probs
using @ single application; some problems — a
multiple different applications. wire ,
P
chain of
Cloud for High.p, for,
ance
5 Write short note on SGI Cyclone
ader in large-scale clustered comp
Qu
Computing
se SGI is a global le
Ans. HPC and data center enablement y
and
high performance storage,
© SGI has developed a cluster named Cyclone based on the
specific super computer technology. This system is based i
ific shared memory model, which enables to reach a lange
amount of shared resources. ;
«This IT system offer a direct access to the hardware with
dedicated improvement provided by SGI compute nodes.
¢ Cydone is an on-demand cloud computing service specifically
dedicated to technical applications. It supports a number cf
leading application partners and five technical domains, includin;
computational fluid dynamics, finite element analysis
computational chemistry and materials, computational biology
and ontology.
© Cyclone is available in two service models: SaaS and IaaS
¢ With the SaaS model, Cyclone customers can significantly red
time to results by accessing leading-edge open source ae
and best-of-breed commercial software platforms fro" "
independent software vendors.
¢ The IaaS model enables customers to install and run the!
applications.
Q6 Explain difference between HPC and Cloud.
r own
foecnnae,
DECODE) @ Less than PHOTOCOPY PriceUbiquitous Clouds and the
5-6 Internet of Things
HPC uses homogeneous resources. | Cloud uses heterogeneous
resources.
Initial capital investment cost is
high.
Q.7 What is mashup ? Explain different types of mashup.
Ans.:¢ Mashup is a Web page or application that uses and
combines data, presentation or functionality from two or more
sources to create new services.
eThe term implies easy, fast integration, frequently using open
APIs and data sources to produce enriched results that were not
necessarily the original reason for producing the raw source data.
The main characteristics of the mashup are combination,
visualization, and aggregation. It is important to make existing
data more useful, moreover for personal and professional use.
¢ Mashup composition tools are usually simple enough to be used
by end-users. They generally do not require programming skills
and rather support visual wiring of GUI widgets, services and
components together.
* Mashup Architecture is 3-tier architecture.
* Presentation : Mashups are almost always presented visually, in
Portals or portal-like applications.
* Mashup Infrastructure : Technology for accessing, assembling,
and processing mashups, as well as ultimately serving them to
applications,
* Information Sources : Virtually anything that is a ‘service’ can be
an information source for a mashup. This includes internalUbiquitous Clea
, 5-7 .
Cloud Computing, Interne a th
files, Java objects, Web Services ang “7
Resp sy
three salient characteristics :
e Mashups al] share
{ data directly on the web.
4, They draw on sources ©!
> They transform, combine, and re-transform this data t
innovative NeW outputs. Maps and timeline displays are q
mashup output formats.
3, They can usually be done in a few hours. That means tha
are created rapidly in a high-pro ica
Teale
Ypicay
transformations
environment.
Types of Mashup :
« Consumer mashup is an application that combines data from
multiple public sources within a browser and. organizes j
through a simple browser user interface.
« An enterprise mashup, also often called a business mashup, is an
application that combines data from multiple internal and publc
sources, and publishes the results to enterprise portals,
application development tools, or as a_ service in a
service-oriented architecture.
© A data mashup, opposite to the consumer mashups, combine
information from multiple sources
similar types of media and
into a single representation. The combination of all these
resources create a new and distinct Web service that was not
originally provided by either source.
Q8 What is cloudlet ?
Ans.: A cloudlet (also called micro data center
architectural element that arises from the convergence °
computing and cloud computing. It represents the middle
3+tier hierarchy: mobile device - cloudlet - cloud.
+A cloudlet is a mobility-enhanced small-scale cloud datacem
The main purpose of the cloudlet is supporting resource
) is a neW
inten! ve:
©
DECODE) @ Less than PHOTOCOPY Price£5 Ubiquitous Clouds and the
Thin:
cond COMPUTINE Internet of TRIN?
and interactive mobile applications by providing powerful
i mputins resources to mobile devices with lower latency.
Cc
it puilds on standard cloud technology.
a9 Explain Pros and Cons of the Mashup.
: Pros:
: Mashups allow for the reuse of existing applications.
2, They also allow for rapid application development.
3, Development of a mashup does not Necessarily involve extensive
IT skills.
4, The associated cost of application development is greatly
reduced.
5, Applications are better tailored to users’ needs.
Cons :
1. A user might have no control over the quality and features of
the content.
Even if reliability of the content source is established, a potential
problem is scalability.
The integrity of the content can not be guaranteed either.
Most data sources are not yet built on a service-oriented
architecture (SOA).
5. Only software that can be accessed with a web browser can be
included in a mashup.
Seat are the differences between local cloudlets and distant
clouds
Ans, :
Local cloudlets L Distant clouds
It support only soft state. It support soft state and hard state.
Decentralized Ownership by local | Centralized ownership by Amazon,
business | Yahoo ete
(DECODE ) @ Less than PHOTOCOPY Price
eeUbiquitous loss
Sang
Intern, et
4
in
=
Internet bandwidth sharing | ~~
petween 100 to 1000 uses ae i
at
professional administration ime
required. 5
Machine room with power
condition and cooling
cloud computing with ar
betel tages ‘and disadvantages. chitectug
ott Explain ciple,
Also 70° i “4< of cloud computing i
of the main ts of clo’ puting is reducin
ans. 20 One expenditure for servers and other compy,
uired to purchase the mining
downtime am i
. jven company is
equipment Agv ssary t0 handle the maximum points oj
stress on their system . . ;
wi e strain and traffic are highly variable
: ample, Amazon.com, a
leads to ir ex : y @ pioneer
= at times used as little as 10% of ther
ve enough capacity to deal with
high strain times.
« Mobile Cloud Computing (MCC) at its §
infrastructure where both the data storage
happen outside of the mobile device.
implest, refers to an
and data processing
es
=~— e-€ > ‘
Ly _— -_ 6
Smart mobile Wireless network Computational
device technology cloud
Fig. Q.11.1 Block diagram of mobile cloud
. 8
© Mobile cloud applications move the computing power and “
5 and into the cloud: oe ;
use!
storage away from mobile phone!
Sm and mobile computing to
a much broader range of mobile subscribers’
®
(DECODE) @ Less than PHOTOCOPY price
not just smart P ecloud Computing 5-10 Ubiquitous Clouds and the
Internet of Things
, Mobile cloud applications move .
storage away from the mobile levices Y Power and data
centralized computing platforms ~~
then accessed over the wirele i
i $8 connection based on a thin native
the comy
»Mobile devices face many 1,
storage, bandwidth etc), Cloud com ee — =
users by allowing them to ‘use inkastn cane nuert a ®
software by cloud providers at low cost ein ai ce -
on-demand fashion. =a
+ Mobile cloud computing provides Mobile users with data sto:
and processing services in clouds, Obviating the need to aa
powerful device configuration (eg. CPU speed, memo
capacity), as all resource-intensive computing can inpeteees
in the cloud.
« Fig. Q.11.2 shows mobile cloud computing architecture.
Nowwork spacators
Fig. Q.11.2 Mobile cloud computing architecture
a
e
DECODE ) @ Less than PHOTOCOPY Price
ee5-11
« In mobile cloud computing mobile network and clog | a
are combined, thereby providing an optimal services ¢"Puin,
che, Cd computing exist when aks and dat ge
individual devices. Applications run on a remote server ae a
sent to the client. they
the mobile devices are connected to the mobile .
the base stations; they will establish ang con
connections (air interface) and functional interfaces Béty, 01 the
mobile networks and mobile devices. PN the
Ubiquitous Clo
"4
e Here
Mobile users send service requests to the cloud throy eh
browser or desktop application. The information's are transmiy
to the central processors that are connected to the ee
mobile network services. Here, services like
(Authentication, Authorization and Accounting) can be Provides
to the users based on Home Agent (HA) and subscriber's 4,
stored in databases.
¢ Mobile devices are connected to the mobile networks via base
stations that establish and control the connections and functions)
interfaces between the networks and mobile devices.
a Web
¢ Mobile users’ requests and information are transmitted to the
central processors that are connected to servers providing mobile
network services.
¢ The subscribers’ requests are delivered to a cloud through the
Internet.
* In the cloud, cloud controllers process the requests to provide
mobile users with the corresponding cloud services.
Advantages :
1. Saves battery power
2. Makes execution faster
3. Improves data storage capacity and processing power
DECODE) @ Less than PHOTOCOPY Priceyo
5-22 Ubiquitous Clouds and the
ud Computing
Internet of Things
lo
jnproves reliability and availability Keeping data and
7 plication in the clouds reduces the chance of lost on the
mobile devices.
ic provisioning: Dynamic on-demand provisioning of
. resources of @ fine-grained, self-service basis
pisadvantages :
‘ Must send the program states (data) to the cloud server.
2, Network latency can lead to execution delay.
5.2 Performance of Distributed Systems and the Cloud
12 What is FutureGrid ? List goals of FutureGrid. Explain
essential and different features of FutureGrid.
Ans.:° FutureGrid is not a production system, but rather an
environment supporting a_ flexible development and testing
platform for middleware and application users looking at
interoperability, functionality, and performance issues.
«FutureGrid will make it possible for researchers to conduct
experiments by submitting an experiment plan that is then
executed via a sophisticated workflow engine, preserving the
provenance and state information necessary to allow
reproducibility.
*Rather than loading images onto VM's, FutureGrid supports
Cloud, Grid and Parallel computing environments by
Provisioning software as needed onto “baremetal” or
VM's/Hypervisors using (changing) open source tools.
* Essential and Different features of FutureGrid :
1 Unlike many clouds such as Amazon and Azure, FutureGrid
allows robust reproducible .
2 FutureGrid is more than a Cloud; it is a general distributed
Sandbox; a cloud grid HPC testbed.
3 Supports 3 different IaaS environments (Nimbus, Eucalyptus,
OpenStack)
o— : —
DECODE ) @ Less than PHOTOCOPY Price™~
Ubiqu;
bonis Cloy :
it
4. Supports research on cloud tools, cloud migq a Nt
doud-based systems as well as use of clouds in aPPlicg i ang
. 0
5, FutureGrid has developed middleware ang inter ns
ing TestbedaaS e.g. Phantom (cloud user ie Ces
(virtual network) RAIN (deploy systems) 7
integration.
6. FutureGrid has experience in running cloud systems,
13 What lessons learnt from FutureGrid ?
Ans.:« Unexpected major use from Computer Science
Middleware
Rapid evolution of Technology like Eucalyptus, Nimby,
OpenStack '
* Open source [aaS maturing as in "Paypal To Drop VMware From
80,000 Servers and Replace It With OpenStack" (Forbes) Bay ty
switch broadly? :
© Need interactive not batch use; nearly all jobs short
© Substantial “TestbedaaS" technology needed and FutureGnd
developed
«Lessons more positive than DoE Magellan report but goals
different
© Still serious performance problems in clouds for networking and
device (GPU) linkage; many activities outside FG addressing
* One can get good Infiniband performance (MPI) on a peculiar 0S
+ Mellanox drivers but not general yet
« We identified characteristics of "optimal hardware"
* Run system with integrated software (computer science) and
systems administration team
* Build Computer Testbed as a Service Community
Q.14 What is data-intensive scalable computing ? How !
different from conventional supercomputer ?
Clond Computing 5-13
Or
,
tis
_
(BECODE’ @ Less than PHOTOCOPY Price5-14 Ubiquitous Clouds and the
- Internet of Things
computing
cow —pata-intensive computing is a class of parallel computing
75. Lions which use a data parallel approach to process large
eos of data typically terabytes or petabytes in size and
your referred to as big data
eintensive computing platforms typically use a parallel
» Da’ ting approach combining multiple processors and disks in
commodity computing clusters connected using high-speed
ications switches and networks which allows the data to
F partitioned among the available computing resources and
rocessed independently to achieve performance and scalability
yi ased on the amount of data.
. Difference between conventional supercomputer and data
intensive scalable computing:
Conventional Supercomputers Data-Intensive Scalable
large
eee
An HPC system by which data is | An HIC data~enter cluster which
retrieved from remote sites and collects and maintains data
brought into the system for Computation collocated with
execution. Heavy data movement | storage for faster access.
overhead
Heavy data movement overhead. No data movement overhead
Machiné-dependent programs Machine-independent application |
| written at a very low level. Use programs on data. Use runtime
fewer software tools; need system controls to optimize
specialists to optimize execution through load balancing,
| etc |
Main machine for batch Processing | Interactive access with priority |
when resources are ready. Uses control and user intervention over
Offline visualization at remote site large number of users |
pm simultaneously
Brittle systems with which to Flexible error detection and
Tecover from most recent recovery |
int. |
@ Less than PHOTOCOPY Priceenter graceful degraded <®
9
in case of failure : Tation
Machine-dependent
programming mode!
Machine-dependent
programming model
|
Q.15 Explain performance metrics for HPC/HTC systems.
Ans. :¢ Performance metrics are throughput, multitaskin
scalability, availability measure, data _ security, :
cost-effectiveness.
1. System throughput measures the number of jobs that can be
done per unit of time. The throughput measure is attributed to
several key factors that affect the total execution time of all jobs
processed in a given time window.
2 Multitasking Scalability : Multitasking implies the use of a
system to handle many jobs simultaneously or concurrently,
System services should be able to scale both horizontally across
the machine or cluster size and vertically from applications to
middleware, runtime and OS support, and hardware.
3. System Availability : System availability (A) refers to the
percentage of time the system is up and running normally: This
percentage reflects the effects of downtime after unexpected
failures and scheduled maintenance for software upgrades.
4, Cloud security is attributed to user confidentiality, data
integrity, access control, firewalls, IDSes, defense capability
5. Cost Effectiveness : This refers to the estimate of a" effectivt
scale of economy achievable by a given system.
(rcovE) @ Less than PHOTOCOPY Price
and
etSS eee
5-16 Ubiquitous Clouds and the
acomputing Internet of Things
i
33 Enabling Technologies for the Internet of Things
(RFID, Sensor Networks and ZigBee Technology, GPS)
46 What 8 Internet of Things? Explain characteristics of loT.
a. f Thin; i i
.e The Internet of BS (loT) is the network of physical
aie ie. devices, vehicles, buildings and other items embedded
obit electronics, software, sensors, and network connectivity that
wie these objects to collect and exchange data.
oni 2005 Definition : By embedding short-range mobile
. transceivers into a wide array of additional gadgets and everyday
items, enabling new forms of communication between people and
things, and between things.
+A phenomenon which connects a variety of things. Everything
that has the ability to communicate.
+The Internet of Things is the intelligent connectivity of P
devices driving massive gains in efficiency, busi ero hy =
quality of life. =
¢ The Internet of Things refers to the capability of everyday devices
to connect to other devices and people through the existing
Internet infrastructure. Devices connect and communicate in
many ways. Examples of this are smart phones that interact with
other smart phones, vehicle-to-vehicle communication, connected
video cameras, and connected medical devices. They are able to
communicate with consumers, collect and transmit data to
companies, and compile large amounts of data for third parties.
*loT data differs from traditional computing. The data can be
small in size and frequent in transmission. The number of
devices, or nodes, that are connecting to the network are also
greater in IoT than in traditional PC computing.
* Machine-to-Machine communications and intelligence drawn from
the devices and the network will allow businesses to automate
certain basic tasks without depending on central or cloud based
applications and services.
*The smart object is the building block of the loT vision. By
Putting intelligence into everyday objects, they are tumed into
SS
DECODE Se@ Less than PHOTOCOPY PriceUdiquitoys Clo,
Cloud Computing 5-17 Inte tds
Nterres hd 1
of py, the
smart objects able not only to collect informati Mes
environment and interact /control the physical wo on
tld, m
be interconnected, to each other, through Internet : but as
data and information. ° chang
8
Characteristics of the Internet of Things
1. Interconnectivity : Everything can be connected to th
information and communication infrastructure, © Blob
2. Heterogeneity : Devices within IoT have different hay
use different networks but they can still interact
devices through different networks.
3. Things-related services : Provides things-related SETViCNES yi.
the constraints of things, such as privacy and ue
consistency between physical and virtual thing. antic
4 Dynamic changes : The state of a device can change
dynamically.
Q.17 Explain architecture of the Internet of Things.
‘dware ag
With othe
Ans. : ¢ The IoT system is an event-driven architecture. Fig. Q.17)
shows architecture of IoT.
Application layer
Fig. Q.17.1 loT architecture
(PEcoDE)@ Less than PHOTOCOPY Price—_
5-18 Ubiquitous Clouds and the
ios Computing Internet of Things
e top or first layer is the IOT application layer which contains
«Thi application user interface.
the
application layer is at the top of the architecture and is
, responsible for delivery of various applications to different users
jn JoT.
The applications can be from different industry segments such as:
° manufacturing, logistics, retail, environment, public safety,
healthcare, food and drug etc.
» With the increasing maturity of RFID technology, numerous
applications are evolving which will be under the umbrella of
loT.
«The bottom layers represent various types of sensing devices:
namely RFID tags, ZigBee or other types of sensors, and
road-mapping GPS navigators.
The sensing devices are locally or wide-area-connected in the
form of RFID networks, sensor networks, and GPSes. Signals or
information collected at these sensing devices are linked to the
applications through the cloud computing platforms at the
middle layer.
The signal processing clouds are built over the mobile networks,
the Internet backbone, and various information networks at the
middle layer.
* The sensors enable the interconnection of the physical and digital
worlds allowing real-time information to be collected and
Processed. The sensors have the capacity to take measurements
such as temperature, air quality, movement and electricity.
*Sensors are grouped according to their unique purpose such as
environmental sensors, body sensors, home appliance sensors and
Vehicle telemetric sensors, etc.
*Many of these hardware elements provide identification and
Ormation Storage (e.g. RFID tags), information collection (e.g.
a
DECODE Se Less than PHOTOCOPY PriceUbiquitous Clo;
ud.
Cloud Computing ont9 Internet of" .
jet of Thin
sensors), and information processing (e.g. embeddeg
processors).
18 What is RFID and RFID tag ? Explain working of RFID,
Ans.:« Radio-Frequency Identification (RFID) is an Aut
Data Capture technology that uses radio-frequency waves - : Matic
2 movable item to identify, categorize and track. ead
e It is fast and does not require physical sight or contact between
reader/scanner and the tagged item.
¢ It performs the operation using low cost components. [t atte
to provide unique identification and backend integration
allows for wide range of applications.
Cdge
Mpts
that
« RFID tags contain at least two major parts. One is an integrateg
Greuit for storing and processing information, modulating ang
demodulating a radio-frequency (RF) signal, and other special
functions. The other part is an antenna for Teceiving and
« Tags can be read-only or read-write. Tag memory can be factory
or field programmed and optionally permanently locked
(security). Data written to the tag left unlocked, can be modified
over more than 100,000 times, allowing the the tag to be reused
or updated.
* Major components of RFID hardware :
1 RFID tag: A tiny silicon chip attached to a small antenna.
2 Reader antenna : It used to radiate the energy and then capture
the retum signal sent back from the tag.
3. Reader : The device station that talks with the tags. A reader
may support one or more antennae.
© Fig. Q.18.1 shows working of RFID.
In the active RFID system, the reader sends signal to the
using an antenna. The tag receives this information and res"
this information along with the information in its memory
—_—
¢
DECODE) @ Less than PHOTOCOPY Price
ee at
<5-20 Ubiquitous Clouds and the
ariD RF Antena Network Workstation
tag
Fig. Q.18.1 RFID working
» The reader receives this signal and transmits to the Processor for
further processing.
«Processor or a Controller: It can be a host computer with a
Microprocessor or a microcontroller which receives the reader
input and process the data.
* Active and semi-passive RFID tags use internal batteries to power
their circuits. An active tag can also use its own battery to
broadcast radio waves to a reader, whereas a semi-passive tag
telies on the reader to supply its power for broadcasting.
* Active and semi-passive tags are reserved for reading over 30 to
100 meters, if repeater batteries are used to boost a tag's range.
* Types of RFID Systems :
1. Active RFID system : These are systems where the tag has its
Own power source like any external power supply unit or a
battery. The only constraint being the life time of the power
devices. These systems can be used for larger distances and to
track high value goods like vehicles.
Passive RFID system : These are systems where the tag gets
Power through the transfer of power from a reader antenna to
the tag antenna. They are used for short range transmission.
— _
DECODE S@ Less than PHOTOCOPY Price~~
Ubiquitous
: : § Clo,
Cloud Computing 5-21 Intemer 24 y,
Ans. : Wireless Sensor Networks
« A wireless sensor network (WSN) is a network formeg b
number of sensor nodes where each node is equipped a latge
sensor to detect physical phenomena such as light, heat My
etc.
¢ WSNs nowadays usually include sensor nodes, actuator
gateways and clients. A large number of sensor nodes den, ,
randomly inside of or near the monitoring area, form ieee |
through self-organization. Orks
«Sensor nodes monitor the collected data to transmit along 4
other sensor nodes by hopping. During the reg 7
transmission, monitored data may be handled by multiple nodes
to get to gateway node after multi- hop routing, and finally reach
the management node through the internet or satellite.
a
Pressure
© A sensor network consists of multiple detection stations called
sensor nodes, each of which is small, lightweight, and portable.
« Every sensor node is equipped with a transducer, microcomputer,
transceiver, and power source. The transducer generates electrical
signals based on sensed data.
« The microcomputer processes and stores the sensor output. The
transceiver, which can be hard-wired or wireless, receives
commands from a central computer and transmits data to that
computer.
¢ The power for each sensor node is derived from the electric
utility or from a battery.
* Standards for WSN technology have been well developed, su‘h
as Zigbee (IEEE802.15.4). The IEEE 802.15.4 is simple packet data
protocol for lightweight wireless networks.
for
elt works well for long battery life, selectable latency
controllers, sensors, remote monitoring and portable electron
©
@ Less than PHOTOCOPY Price_
v 5-22 Ubiquitous Clouds and the
computing Internet of Things
Ce
generation of wireless sensor network.
20 Explain
' First Second
parameters Generation Genetica ‘team
le , 4
Now tecture sensing, sensing, sensing,
Ar processing and Processing and | processing and
communication | communication | communication
Point to point, | Client-server Fully to
lo} peer
TopoloBy Star and and peer to peer| peer
multi-hop
Pi | ap
Power Supply Large batteries | AA batteries Solar
Life span Hours, days and) Days to weeks Months to years
longer }
{ ————— em |
Deployment Physically Hand placed | Embedded or |
mode installed nanotechnology
based |
-— TT
Manufacturers Custom Crossbow Dust, Inc, and |
constructors Technology, Inc.,| others |
Sensoria Corp.,
| Ember Corp |
Q.21 Write short note on ZigBee Network
Ans.: In 2002, seeing that neither Wi-Fi nor Bluetooth could not
fit some of their needs for embedded systems, a number of
industrial companies formed the consortium called ZigBee Alliance,
aimed at providing standards for low cost / low consumption
wireless communications. Then, with the birth of IEEE 802.154
group.
* ZigBee communications can reach up to 500m, with a data rate of
Up to 250kbs, for a typical power consumption of 125 to 400 uW.
pe
\DECO! E@ Less than PHOTOCOPY Price4
Ubiquit
Cloud Computing 5-23 ‘fatous Cloy
« As ZigBee is based on IEEE 802.15.4, there is no Wake ngs
but slots for sleep or activity, or in asynchronous ~ “5 Signal
sleeping anytime they have nothing to say, with an e Fevicg,
coordinator. er “igilany
¢To use a ZigBee module with a microcontroller,
connect it to a UART. There are other, optional
including a number of analog inputs / digital IOs ‘it, to Use
output indicating the strength of the signal which 2 Pn
directly connect to a LED pin for observation purposes YOU can
You Need ty
« There are two modes of data transfer namely Beacon in
Non Beacon mode. de
¢ In Beacon mode, when the devices are not sending the q
may enter a2 low power state and reduces
consumption.
ata they
the POWer
« In Non-beacon mode, the end devices need to be wake y
while sending the data while the routers and coordinator.
to be active most of the time.
P only
'S Need
« Fig. Q21.1 shows star topology and peer-to-peer topology.
i
\i \UZ / e-°
Lao NX PAN
e F \ a coordinator
PAN @ Full function device
coordinator © © Reduced function device
<—> Communication flow
a) Stratopology _b) Peer to Peer technology
Fig. Q.21.1
* There are three different types of ZigBee devices :
ZigBee coordinator (ZC) : This is the most capable ZigBee 4°"
serving as the coordinator or the root of a ZigBee network ThE
DECODE@ Less than PHOTOCOPY Price5-24 Ubiquitous Clouds and the
puting Internet of Things
opposes _—___—_tema Tp
exactly one coordinator in each network since it is the device
is & sarted the network, It is able to store information about the
t st ‘ :
reewor including acting as the trust center and repository of
security keys.
LigBee Router (ZR) : This can act as an intermediate router,
De g on data from end device to end device.
ee End Device (ZED) : This contains just enough
functionality to talk to the parent node. The end device cannot
relay data from other devices. This relationship allows the node
to be asleep a significant amount of the time, thereby ensuring a
Jong battery life. A ZED requires the least amount of memory,
and therefore can be less expensive to manufacture than a ZR or
ZC.
Q.22 How wireless sensor network help health monitoring system ?
Ans.:° Wireless sensors support offer many possibilities for
measuring different parameters of the human body and most of
them are imperceptible and comfortable to use.
«oT devices can be used to enable remote health monitoring and
emergency notification systems. These health monitoring devices
can range from blood pressure and heart rate monitors to
advanced devices capable of monitoring specialized implants.
¢ Smart health systems provide health related services using 2
network, some kind of connection between intelligent agents.
These intelligent agents could be computing devices, mobile
phones, sensors, Fitbit smart bands, surgical devices, devices that
measure your blood chemistry, or devices that measure your
brainwaves. Any of these things could be intelligent agents.
* Fig. Q.22,1 shows smart health monitoring system using wireless
sensor.
* The human actors, patients or healthcare providers for example
could be intelligent agents in this system. The sensors, devices,
computers, applications, and human actors are all intelligent
agents that might be connected in the smart health system.
(BECODE’@ Less than PHOTOCOPY Price