Summary

This document provides an overview of Arduino, an open-source platform for creating electronic devices. It explains the hardware and software components and features of Arduino boards, along with a brief overview of the Arduino libraries and their functionalities. It also touches upon the topic of Raspberry Pi.

Full Transcript

Unit-II Open – Source Prototyping Platforms Arduino Arduino is a project, open-source hardware, and software platform used to design and build electronic devices. It designs and manufactures microcontroller kits and single-board interfaces for building electronics projects. The Arduino board...

Unit-II Open – Source Prototyping Platforms Arduino Arduino is a project, open-source hardware, and software platform used to design and build electronic devices. It designs and manufactures microcontroller kits and single-board interfaces for building electronics projects. The Arduino boards were initially created to help the students with the non-technical background. The designs of Arduino boards use a variety of controllers and microprocessors. The Arduino board consists of sets of analog and digital I/O (Input / Output) pins, which are further interfaced to breadboard, expansion boards, and other circuits. Such boards feature the model, Universal Serial Bus (USB), and serial communication interfaces, which are used for loading programs from the computers. The Arduino is used for various purposes, such as:  Finger button  Button for motor activation  Light as a sensors  LED button  Designing  The Building of electronic devices What is Arduino? Arduino is a software as well as hardware platform that helps in making electronic projects. It is an open source platform and has a variety of controllers and microprocessors. There are various types of Arduino boards used for various purposes. Features  Arduino programming is a simplified version of C++, which makes the learning process easy.  The Arduino IDE is used to control the functions of boards. It further sends the set of specifications to the microcontroller.  Arduino does not need an extra board or piece to load new code.  Arduino can read analog and digital input signals.  The hardware and software platform is easy to use and implement. History The project began in the Interaction Design Institute in Ivrea, Italy. Under the supervision of Casey Reas and Massimo Banzi, the Hernando Bar in 2003 created the Wiring (a development platform). Arduino Library The Library is considered as the advanced feature, which extends the capabilities of the Arduino IDE. It means that the libraries provide extra functionality to the programming platform of Arduino. The libraries in Arduino are written in C or C++ (.cpp). These libraries allow us to manipulate data and work with the hardware. To implement any Library in the Arduino IDE, go to the Sketch -> Import Library. There are several libraries available for download. We can also create our own library. Standard Libraries  EEPROM: It stands for Electronic Erasable Programmable Read Only Memory. The EEPROM is associated with the microcontroller present on the AVR or Arduino Boards. The EEPROM library allows us to read the bytes stored in the memory when the power of the board is off.  Ethernet Library: The Ethernet library works with the Arduino Ethernet shield and other related devices. The Ethernet library allows us to connect the Arduino board to the Internet.  GSM Library: The GSM library exists on the IDE version 1.0.4 and up. The GSM library allows us to perform the operations on the Arduino board similar to the GSM phone, such as internet connection, send and receive messages, and to place voice calls.  Liquid Crystal Library: It is a library that permits Arduino to communicate with LCDs, which are based on a compatible chipset called Hitachi HD44780.  WiFi Library: The WiFi library permits Arduino to establish a connection with the internet. It can either be a server to receive the incoming connections or a client to perform outgoing connections.  Ethernet Library: The Ethernet library works with the Arduino Ethernet shield and other related devices. The Ethernet library allows us to connect the Arduino board to the Internet. What Is A Raspberry Pi? Raspberry Pi is defined as a minicomputer the size of a credit card that is interoperable with any input and output hardware device like a monitor, a television, a mouse, or a keyboard – effectively converting the set-up into a full-fledged PC at a low cost. Raspberry Pi is a programmable device. It comes with all the critical features of the motherboard in an average computer but without peripherals or internal storage. To set up the Raspberry computer, you will need an SD card inserted into the provided space. The SD card should have the operating system installed and is required for the computer to boot. Raspberry computers are compatible with Linux OS. Sensors are another type of input that can be connected to the Raspberry Pi. They may gather data about, for example, light or temperature conditions, but fundamentally they work in a similar way to the push button: they provide different input to the Pi depending on something that is happening externally. Wireless Networks 1. Cellular Cellular networks use the same mobile networks as smartphones to allow IoT devices to communicate. Because these networks were originally designed for power-hungry devices like smartphones, they weren’t always considered the best fit for IoT devices. Eventually, the cellular industry developed new technologies that were more appropriate for IoT use cases. Today, this type of wireless network is very popular, and is considered a reliable and secure method of IoT connectivity. 2. Local and Personal Area Networks (LAN/PAN) Networks that cover fairly short distances are called personal area networks (PAN) and local area networks (LAN). PAN and LAN networks are considered to be fairly cost-effective, but the transfer of data can sometimes be unreliable. Wireless personal and local area network technologies that are commonly incorporated into IoT connectivity solutions are WiFi and Bluetooth. WiFi can be used for applications that run in a local environment, or in a distributed setting if there are multiple access points integrated into a larger network. One downside to WiFi is that it works only if the signal is strong and you’re close to the access point. Also, WiFi is generally more power-hungry than people think, but it is possible to operate it in a way that’s a little more power-efficient 3. Low Power Wide Area Networks (LPWAN) IoT devices that run on LPWANs send small packets of information infrequently and over long distances. This type of wireless network was developed in response to the early challenges of cellular connectivity. Proponents of LPWAN position it as longer-range than WiFi and Bluetooth, but using less power than cellular. Sigfox built the first LPWAN network in France and is considered the driving force behind its growth 4. Mesh Networks Mesh networks are best described by their connectivity configuration—how the components communicate with each other. In mesh networks, all the sensor nodes cooperate to distribute data amongst each other to reach the gateway. Zigbee is one example of an IoT wireless network technology. Mesh networks are very short range and may require extra sensors throughout a building or the use of repeaters to get the coverage your application needs. Wireless Sensor Network (WSN) Wireless Sensor Networks (WSNs) have been around since the mid-1970s. They are networks of small nodes with computing power, radio communication, and sensors that can be used to monitor physical or environmental conditions. WSNs have been used in many different applications, ranging from medical monitoring, to weather forecasting, to military/aerospace applications. Composition models can help to improve the accuracy of information captured by wireless sensor networks by uncovering patterns, predicting outcomes, and providing better data analytics. Wireless Sensor Network (WSN) is an infrastructure-less wireless network that is deployed in a large number of wireless sensors in an ad-hoc manner that is used to monitor the system, physical or environmental conditions. Sensor nodes are used in WSN with the onboard processor that manages and monitors the environment in a particular area. They are connected to the Base Station which acts as a processing unit in the WSN System. Base Station in a WSN System is connected through the Internet to share data. Applications of WSN:  Internet of Things (IOT)  Surveillance and Monitoring for security, threat detection  Environmental temperature, humidity, and air pressure  Noise Level of the surrounding  Medical applications like patient monitoring  Agriculture  Landslide Detection The Node A node in a wireless sensor network is a small device that contains computing power, radios, and sensors. It is used to collect data about its physical environment, process the data, and transmit it to other nodes in the network. Composition models can help improve the accuracy of information captured by these nodes by uncovering patterns, predicting outcomes, and providing better data analytics. Additionally, nodes in a WSN can be used in combination with other digital technologies such as IoT or cloud computing to provide a more contextualized view of data and enable a wider range of applications. Connecting nodes in a wireless sensor network involves configuring the radios and sensors on each node so that they can communicate with one another. This process also includes setting up the network infrastructure (e.g. mesh, star, or cluster topology). Composition models can be used to improve the accuracy of data collected by the nodes by uncovering patterns, predicting outcomes, and providing better data analytics. Connecting multiple nodes together also enables a wider range of applications such as monitoring environmental conditions or asset tracking. Secured Communication for IoT Secure communication for IoT is the process of ensuring that data that is transmitted over networks is secure and cannot be accessed or spoofed by unauthorized users. This typically involves using encryption, authentication, and authorization protocols to authenticate devices and ensure that data is not accessible by attackers. Additionally, composition models can be used to improve the accuracy of data collected by the nodes and improve security measures by uncovering patterns, predicting outcomes, and providing better data analytics. What is RTLS? RTLS stands for Real Time Location Systems and refers to any system that accurately determines an item or person’s location. RTLS is not a specific type of system or technology, but rather is a goal that can be accomplished with a variety of systems for locating and managing assets. An important aspect of RTLS is the time at which assets are tracked, and this data can be used in different ways depending on the application. What is GPS? GPS stands for Global Positioning System. GPS is a satellite-based navigation system that allows ground users to provide their exact location, velocity, and time 24 hours a day, in all weather conditions, all over the world. GPS developed by the U.S. Department of Defense. It was basically designed to assist soldiers and military Vehicles but after some years it’s available to anyone having a GPS receiver. GPS is a common system that most of us are using to reach from one location to another location. Usage of GPS: There are five most uses of the GPS.  Location:- with the help of GPS we can find the exact position of the object.  Navigation:– we can navigate one location to another with the help of GPS.GPS technology is also useful for Transportation Management and breathing of Ship at docks.  Tracking: -with the help of GPS we can Monitor object movement like speed, distance, position.  Mapping:– GPS also helps in creating maps of the World.  Timing:- GPS also provides the estimated time for reaching destination measurement its depend on speed and object movement. For Example, GPS technology is also useful for Monitoring Vehicles and Persons. Tracking is useful in the following services:  Mass Tracking  Ship Tracking  Vehicle Tracking Agent Systems Agent systems are computer systems that are designed to act on behalf of a user or another system. They are typically used to automate tasks or provide assistance to users. Agent systems can be used for a variety of tasks, such as web search, data mining, natural language processing, and automated decision making. Agent systems are often used in conjunction with artificial intelligence (AI) technologies to provide more intelligent and efficient solutions to complex problems. Multi – Agent System Multi-agent systems are systems composed of multiple autonomous agents that interact with each other in order to achieve a common goal. Agents are autonomous entities that can perceive their environment, reason about it, and take actions to achieve their goals. Multi-agent systems are used in a variety of applications, such as robotics, distributed control, and distributed problem solving. They can be used to model complex systems, such as markets, traffic systems, and social networks. Multi- agent systems can also be used to develop intelligent Web of Things (WOT) The Web of Things (WoT) is an emerging technology that connects physical objects to the Internet. It is a network of interconnected devices, sensors, and actuators that can be accessed and controlled remotely. The WoT enables the exchange of data between physical objects and the Internet, allowing for the automation of everyday tasks and the creation of new services. The WoT is expected to revolutionize the way we interact with our environment, providing us with unprecedented levels of control and convenience. Difference between IOT and WOT IOT WOT IOT is about creating a network of objects, WOT tries to integrate them to web things, system No scalability security Building WOT has various scalability security Scope of IOT is broader Scope of WOT includes web(WSN & RFID system) Composition models in web of things Composition models for the Web of Things can be used to create complex connections between physical objects and data points. These models can help to improve the discovery, search, and IoT mashup capabilities of a system by uncovering patterns, predicting outcomes, and making more informed decisions. Resources on the Web that provide information about composition models for the web of things may include tutorials, research papers, and technical documents. 1) Request and Response Model Client Request Server DB Fetch Response 2) Publisher Subscriber Model T1 P B C1 U R B L T2 O C2 I K S E H C3 R E T3 R C4 Topics Subscriber/Consumer 3) Push Pull Model Pushing Pull P C U O B Queue N L S I S U H M E E R Pushing Pull R 4) Exclusive Pair C S L E Full Duplex R I & V N E Bi-directional T Communication R IoT Mashups IoT mashups involve combining connected physical objects or data points in order to create new products, services, or solutions. Examples of IoT mashups include combining sensors to monitor air quality levels, connecting cameras to track traffic flow, and connecting smart appliances to make home automation more efficient. Composition models can be used to make IoT mashups more efficient and powerful by uncovering patterns, predicting outcomes, and making more informed decisions. Data Management Systems for the IoT Devices The Internet of Things (IoT) device management enables users to track, monitor and manage the devices to ensure these work properly and securely after deployment. Billions of sensors interact with people, homes, cities, farms, factories, workplaces, vehicles, wearables and medical devices, and beyond. The Internet of Things (IoT) is changing our lives from managing home appliances to vehicles. Devices can now advise us about what to do, when to do and where to go. Industrial applications of the IoT assist us in managing processes, and predicting faults and disasters. The IoT platforms help set and maintain parameters to refine and store data accordingly. Data management is the process of taking the overall available data and refining it down to important information. Different devices from different applications send large volumes and varieties of information. Managing all this IoT data means developing and executing architectures, policies, practices and procedures that can meet the full data lifecycle needs. Things are controlled by smart devices to automate tasks, so we can save our time. Intelligent things can collect, transmit and understand information, but a tool will be required to aggregate data and draw out inferences, trends and patterns. Developers and manufacturers of embedded systems and devices need to build systems that answer the demands of data management. They need to design a data management framework compatible with all the software and hardware that play a role in collecting, managing and distributing data. The design needs to be efficient to accelerate time-to-market of the end-product. Data from IoT devices is used for analytical purposes. Information that businesses collect and store but remains relatively stagnant, because it is not used for analytical purposes, is called dark data. It includes customer demographic information, purchase histories and satisfaction levels, or general product data. To better understand customers, dark data is invaluable to businesses, as it allows them to uncover additional insights more efficiently. Before the release of a product, IoT data management requires field tests. Data from the field tests helps improve the design and create a higher-quality product. Collecting field data post-launch helps in continuous product improvement with software updates and by identifying anomalies. This also provides important insights to support the development process of new products. How is IoT transforming businesses? In the Business Enterprise, IoT not only means to connect the devices to the Internet, however, it is more than that. Now, IoT is transforming the business enterprises by creating the opportunities to get smarter about the product, services, and the customer experience. There are several ways through IoT is transforming the business. Some of them are mentioned below: o Improving Customer Experience o Greater Efficiency o More Data - More Opportunity o Creating New Business Models o Cost Reduction and Gain Productivity o Asset Tracking and Waste Reduction 1. Improving Customer Experience Due to growth in technology, IoT is playing an opportunity to both customers as well as service provider by understanding the customer behavior and their requirement. When product and service provider understand how its customers use their product they can better fulfill their needs and improve customer experience. As IoT data offer the real-time operation, companies can respond quickly to issues and request as they arise. 2. More Data - More Opportunity IoT provides power to business enterprises to collect and analyze more data from various sources such as from their local setups and networks. This data lead more opportunity for automatic product updates or upgrades, tracing and tracking the assets. As the large volume of data flow from data centers, production systems, sensors and IoT systems to the business enterprise at real or non-real-time helps the enterprise to offer opportunities for innovation and growth. 3. Greater Efficiency Business enterprise is also looking towards more flexibility and efficiency. The higher efficiency will be achieved through IoT as it expands over various technologies and parts of the organization. The capabilities of product or services are realized as data streaming from sensors is analyzed, and changes are deployed without human intervention. 4. Creating New Business Models The IoT also allows a business enterprise to transform their conventional models into new revenue streams. This IoT data can also be shared across an enterprise's ecosystem of partners and customers which provides new paths to innovation in the form of new value-added services and continuous engagement. 5. Cost Reduction and Gain Productivity As the IoT connects devices and keeps the business key's process data over the networks, leads the smart inventory management, waste management and the cost reduction. Due to IoT, leaders can easily identify the ways to boost efficiency and productivity to enhance potential revenue stream. IOT Analytics IoT analytics involves analyzing data coming from the Internet of Things (IoT) and deriving useful insights from this data. IoT analytics is usually discussed within Industrial IoT (IIoT). Data is collected from manufacturing infrastructure, meteorological stations, smart meters, delivery vans, and various sensors on all types of machines. IoT analytics can also be applied to retail and healthcare sectors. Data can be in different formats such as video feeds, geolocation data, social media data, or log files. Given the different types of information sources, data integration can be very difficult. This is exactly where IoT analytics makes a difference. Example By adopting IoT for monitoring, control and automation, Deep Sky Vineyard improved efficiency. By optimizing farming schedules, labour efficiency increased by 30%. Crop efficiency increased by 50% by reducing loss due to rotting, etc. Water flow and soil moisture are monitored to achieve consistent yields and quality. Siemens Healthineers applied IoT to detect anomalies in x-ray tube production using multivariate time series. Specifically, they determine the quality of liquid metal bearings. They're also able to identify how much each variable contributes to the anomaly. Audi's Neckarsulm factory does 5 million welds per day. Manual inspection of weld quality is expensive. Voltage and current data from welding gun controllers are collected. These are combined with data on weld configuration, metal types, and electrode health. Audi does analytics at the edge on Intel hardware to warn of possible faulty welds. British oil and gas company BP fitted many of its wells with 20-30 GE sensors. Temperature, pressure and other parameters are measured. Each well sends 2 million data points per minute to GE's Predix cloud platform. This data helps BP predict well flows and useful life of a well, and see fleetwide performance. Creative thinking techniques Creative thinking techniques refer to methods or strategies that help individuals generate new and innovative ideas. Here are a few examples of creative thinking techniques:  Brainstorming: A group of people come together to generate as many ideas as possible without criticism or judgment.  Mind mapping: A visual technique used to organize and connect ideas in a non-linear manner.  SCAMPER: A mnemonic that stands for Substitute, Combine, Adapt, Modify, Put to another use, Eliminate, and Rearrange. This technique prompts individuals to modify existing ideas by applying one of the seven strategies. Modification refers to altering or changing an existing idea to create something new. This could involve changing one or more elements of the idea, such as the design, function, or materials used. Combination scenarios involve taking two or more existing ideas and combining them in a new way to create something innovative. This can lead to new products, services, or solutions that are not possible with the original ideas alone. Decentralized approaches involve distributing power, control, or decision-making to individuals or groups, rather than relying on a centralized authority or hierarchy. Decentralized approaches can lead to more collaborative and inclusive decision-making, and may be more resilient in the face of disruptions or crises. Interoperable approaches involve designing systems or technologies that can work together seamlessly, even if they were created by different organizations or with different technologies. Interoperability can improve efficiency, reduce duplication of efforts, and enable innovation by allowing for the combination of different tools and technologies. Object-Information Distribution Architecture (OIDA) Object-Information Distribution Architecture (OIDA) is a system architecture that is used to manage the distribution of information across different objects or entities. OIDA is used in a variety of applications, including military command and control systems, supply chain management, and network management. In OIDA, objects are defined as individual entities that contain data and can perform specific functions or tasks. These objects can be physical entities, such as sensors, vehicles, or computers, or they can be virtual entities, such as software applications or databases. The information distribution aspect of OIDA refers to the process of sharing information between objects. OIDA uses a distributed architecture, which means that information can be shared between objects located in different locations or on different networks. This enables information to be shared in real-time, which can improve decision-making and increase the efficiency of the overall system. OIDA includes several key components, including:  Object Management: This component is responsible for managing the objects within the system, including their creation, deletion, and modification.  Communication Management: This component is responsible for managing the communication between objects within the system. It ensures that information is shared securely and efficiently between objects.  Information Management: This component is responsible for managing the information that is shared between objects within the system. It ensures that the right information is shared with the right object at the right time. Overall, OIDA provides a flexible and scalable architecture for managing the distribution of information across different objects or entities. By using a distributed architecture, OIDA enables real-time information sharing, which can improve decision-making and increase the efficiency of the overall system. Object Naming Service (ONS) The Object Naming Service (ONS) is a service that is used to provide unique and consistent names to objects in a distributed system. ONS is part of the Common Object Request Broker Architecture (CORBA), which is a middleware that enables communication between different software applications. In a distributed system, objects can be located on different computers or networks. To communicate with an object, a client needs to know the object's identity or address. However, as the number of objects in the system grows, it can become difficult to keep track of the different names or addresses for each object. ONS provides a solution to this problem by providing a naming service for objects in a distributed system. When an object is created, it is assigned a unique name, which is registered with the ONS. Clients can then use the ONS to look up the name of an object, which enables them to communicate with it. ONS provides several benefits, including:  Location transparency: ONS enables clients to locate objects without needing to know their physical location or address. This means that objects can be moved or migrated without affecting clients that are using them.  Simplified object management: ONS provides a centralized repository for object names and addresses, which makes it easier to manage objects in a distributed system.  Dynamic object binding: ONS enables objects to be added or removed from the system without disrupting existing clients. This makes it easier to modify the system over time. Overall, the Object Naming Service provides an important service for managing object names and addresses in a distributed system. By providing a centralized naming service, ONS enables clients to locate objects in the system more easily, which can improve the overall efficiency and effectiveness of the system. Service Oriented Architecture (SOA) Service Oriented Architecture (SOA) is a software architecture that is used to design and build distributed systems. SOA is based on the concept of services, which are modular, reusable, and interoperable components that can be accessed over a network. In SOA, services are the building blocks of the system, and they can be used to perform a specific task or function. Services can be created independently and then combined or reused to create more complex systems. This modularity and reusability of services makes it easier to design, build, and maintain large and complex software systems. SOA also emphasizes the importance of standardization and interoperability. Services are designed to be interoperable, which means that they can be accessed and used by other services or systems regardless of the technology or programming language used. This makes it easier to integrate different systems and technologies. Some of the key components of a SOA system include:  Service Registry: This is a directory that contains information about available services, including their location, functionality, and capabilities.  Service Bus: This is a messaging system that enables services to communicate with each other over a network. The service bus is responsible for routing messages between services.  Service Broker: This is a software component that helps to manage the interactions between services. The service broker can help to enforce security policies, manage service contracts, and handle exceptions or errors. SOA provides several benefits, including:  Modularity: Services are modular and can be combined or reused to create more complex systems. This makes it easier to design and build large and complex software systems.  Flexibility: Services can be added or removed from the system as needed, which makes it easier to modify the system over time.  Interoperability: Services are designed to be interoperable, which makes it easier to integrate different systems and technologies.  Scalability: SOA systems can be scaled horizontally by adding more instances of a service or vertically by adding more resources to the system. Overall, Service Oriented Architecture provides a flexible, modular, and interoperable approach to designing and building distributed systems. By using services as the building blocks of the system, SOA makes it easier to design and build complex software systems. Network of Information A network of information is a system that is used to manage the distribution of information across a network of devices or systems. The network of information can be used in a variety of applications, including content distribution, information sharing, and collaborative work environments. In a network of information, the focus is on the efficient and effective distribution of information to the devices or systems that need it. Information can be in various forms, including text, images, audio, or video. The network of information is responsible for managing the storage, transmission, and retrieval of this information. Some key components of a network of information include:  Data storage: This component is responsible for storing the information in the network. This can be done in various ways, including cloud-based storage, distributed file systems, or traditional database systems.  Data transmission: This component is responsible for transmitting the information between devices or systems. This can be done using various communication protocols, including TCP/IP, HTTP, or FTP.  Data retrieval: This component is responsible for retrieving the information from the network when it is needed. This can be done using search engines, content delivery networks, or distributed file systems.  Security: This component is responsible for ensuring the security of the information in the network. This can be achieved through encryption, access controls, and other security measures. A network of information can provide several benefits, including:  Improved collaboration: A network of information can enable individuals or teams to collaborate more effectively by sharing information and working on projects together.  Access to information: A network of information can provide access to information from anywhere, at any time, which can be especially important for remote work environments.  Increased efficiency: A network of information can help to improve the efficiency of work processes by enabling faster access to information and reducing the need for manual data entry or duplication.  Scalability: A network of information can be scaled up or down as needed to accommodate changes in the volume of information or the number of users. Overall, a network of information provides a flexible and scalable way to manage the distribution of information across a network of devices or systems. By using a network of information, organizations can improve collaboration, increase efficiency, and enhance access to information. Application and Use Cases Web-enabled things, also known as the Internet of Things (IoT), refers to a network of physical devices, vehicles, home appliances, and other items that are embedded with sensors, software, and network connectivity. The devices communicate with each other and with other systems to share data and perform various tasks. Here are some concrete applications and use cases of web-enabled things: Concrete Applications and Use Cases  Energy Management 1) Smart Grids Target Users  Grid operators on all voltage levels line Distribution System Operators (DSO), Transmission System Operators (TSO)  Plant operators (centralized as well as de-centralized producers)  Virtual Power Plant (VPP) operators  Energy grid markets  Cloud providers where grid backend services are hosted and where Operation Technology bridges to Information Technology  Device manufacturers, owners, and users; devices include communication gateways, monitoring and control units Expected Devices A smart grid integrates all players in the electricity market into one overall system through the interaction of generation, storage, grid management and consumption. Power and storage plants are already controlled today in such a way that only as much electricity is produced as is needed. Smart grids include consumers as well as small, decentralized energy suppliers and storage locations in this control system, so that on the one hand, consumption is more homogeneous in terms of time and space (see also intelligent electricity consumption) and on the other hand, in principle inhomogeneous producers (e.g. wind power) and consumers (e.g. lighting) can be better integrated. Expected Data  Weather and climate data  Metering data (both production as well as consumption as well as storage, e.g. 15 min. intervals)  Real time data from PMUs (Phasor Measurement Units)  Machine and equipment monitoring data (enabling health checks) ... Affected WoT deliverables and/or work items WoT Architecture, WoT Binding Templates (covering protocol specifica) Description The term Smart Grid refers to the communicative networking and control of power generators, storage facilities, electrical consumers, and grid equipment in power transmission and distribution networks for electricity supply. This enables the optimization and monitoring of the interconnected components. The aim is to secure the energy supply on the basis of efficient and reliable system operation. Variants Decentralized Power Generation While electricity grids with centralized power generation have dominated up to now, the trend is moving towards decentralized generation plants, both for generation from fossil primary energy through small CHP plants and for generation from renewable sources such as photovoltaic systems, solar thermal power plants, wind turbines and biogas plants. This leads to a much more complex structure, primarily in the area of load control, voltage maintenance in the distribution grid and maintenance of grid stability. In contrast to medium to large power plants, smaller, decentralized generation plants also feed directly into the lower voltage levels such as the low-voltage grid or the medium-voltage grid. This use case variants also includes operation and control of energy storages like batteries. Virtual Power Plants A Virtual Power Plant (VPP) is an aggregation of Distributed Energy Resources (DERs) that can act as an entity on energy markets or as an ancillary service to grid operation. The individual DERs often have a primary use on their own, with electric generation/consumption being a side-effect resp. secondary use. This results in negotiations/collaborations between many different parties e.g. such as the DER owner, the VPP operator, the grid operator and others. Smart Metering For consumers, a major change is the installation of smart meters. Their core tasks are remote reading and the possibility to realize fluctuating prices within a day at short notice. All electricity meters must therefore be replaced by those with remote data transmission. Other variants Emergency response, grid synchronization, grid black start  Smart Homes Home WoT devices synchronize to TV programs Target Users Person watching TV, Broadcasters Motivation A lot of home devices, such as TV, cleaner, and home lighting, connect to an IP network. When you watch a content program, these devices should cooperate for enhancing your experience. If the cleaning robot makes a loud noise while watching the TV program, it will hinder viewing. Also, even if you set up the theater environment with smart lights, it is troublesome to operate it yourself each time the TV program switches. Therefore, by WoT device to operate in accordance with the TV program being viewed, thereby improving the user experience. WoT devices work according to TV programs:  Cleaning robot stops at an important situation,  Color of smart lights are changed according to TV programs,  Smart Mirror is notified that favorite TV show will start. Expected Devices  Hybridcast TV  Hybridcast Connect application (in a smartdevice such as smartphone)  Cleaning Robot  Smart Light (such as Philips Hue)  Smart Mirror Expected Data The trigger value of the scene of the TV program. Hybridcast connect application know the Thing Description of the devices in home. (Discovery?) Description Home smart devices behave according to TV programs. Hybridcast applications in TV emit information about TV programs for smart home devices. (Hybridcast is a Japanese Integrated Broadcast-Broadband system. Hybridcast applications are HTML5 applications that work on Hybridcast TV.) Hybridcast Contact application receives the information and controls smart home devices. Leaving and Coming Home Target Users  device user  service provider (Home Management Service Provider)  device manufacturer Motivation The purpose of this use case is to improve the usability of home appliances for device users by allowing device users to configure the operation modes of all devices at home without configuring those devices one by one when they leave and come home. Expected Devices Lighting, Air Conditioner, Security Sensor, Smartphone Expected Data The operation modes of lighting, air conditioner and security sensor. Reading and updating those operation modes on demand. Description  Configuration by a device user before starting to use a service o A device user logs in the server of a "home management service provider" with which the user has a contract. o The user specifies the operation modes of lighting, air conditioner and security sensor for the time when the user is out of home, the time when the user comes home and the time when the specified amount of time has passed after the user comes home.  When the device user leaves home o The device user accesses the server of a "home management service provider" with a smartphone and notifies the server that the user is going to leave home. o The server updates the operation modes of lighting, air conditioner and security sensor according to the configuration specified by the user for the time when the user is out of home. o The server reads the operation modes of lighting, air conditioner and security sensor and informs the user's smartphone of those operation modes.  When the device user comes home o The device user accesses the server of a "home management service provider" with a smartphone and notifies the server that the user will return home soon. o The server updates the operation modes of lighting, air conditioner and security sensor according to the configuration specified by the user for the time when the user comes home. o The server reads the operation modes of lighting, air conditioner and security sensor and informs the user's smartphone of those operation modes. o When the specified amount of time has passed after the user returns home, the server updates the operation modes of lighting, air conditioner and security sensor according to the configuration specified by the user for the time when the specified amount of time has passed after the user comes home. o The server reads the operation modes of lighting, air conditioner and security sensor and informs the user's smartphone of those operation modes. Security Considerations  It is necessary to prevent unauthorized users other than the device user from using the service provided by the home management service provider.  It is necessary to disallow home management service providers other than the home management service providers permitted by the device user in advance to control devices at the device user's home. Privacy Considerations It is necessary to protect the information on what operations are done on the devices that are controlled or monitored at the device user's home. It is also necessary to protect the information obtained from the devices that are controlled or monitored at the device user's home. Accessibility Considerations User interface provided by a smartphone had better consider accessibility.  Transportation Sub-categories Transportation - Infrastructure Transportation - Cargo Transportation - People Target Users Smart Cities: managing roads, public transport and commuting, autonomous and human driven vehicles, transportation tracking and control systems, route information systems, commuting and public transport, vehicles, on-demand transportation, self driving fleets, vehicle information and control systems, infrastructure sharing and payment system, smart parking, smart vehicle servicing, emergency monitoring, etc. Transport companies: managing shipping, air cargo, train cargo and last mile delivery transportation systems including automated systems. Commuters: Mobility as a service, booking systems, route planning, ride sharing, self- driving, self-servicing infrastructure, etc. Motivation Provide common vocabulary for describing transport related services and solutions that can be reused across sub-categories, for easier interoperability between various systems owned by different stakeholders. Thing models could be defined in many subdomains to help integration or interworking between multiple systems. Transportation of goods can be optimized at global level by enhancing interoperability between vertical systems. Expected Devices Road information system (routes, conditions, navigation). Road control system (e.g. virtual rails). Traffic management services, e.g. intelligent traffic light system with localization and identification (by satellite, radio frequency identification, cameras etc.). Emergency monitoring and data/location sharing. Airport management. Shipping docks and ports management. Train networks management. Public transport vehicles (train, metro, tram, bus, minibus), mobility as a service (ride sharing, bicycle sharing, scooters etc.). Transportation network planning and management (hubs, backbones, sub- networks, last mile network). Electronic timetable management system. Vehicles (human driven, self-driving, isolated or part of fleet). Connected vehicles (cars, ships, airplanes, trains, buses etc). Devices needed for cargo. Expected Data Vehicle data (identification, location, speed, route, selected vehicle data). Weather and climate data. Contextual data (representing various risk factors, delays, etc.). Dependencies Localization technologies. Automotive data. Contextual data. Cloud integration. Description Transportation system implementers will be able to use a unified data description model across various systems. Variants There will be different verticals, such as:  Smart City public transport  Smart City traffic management  Smart city vehicle management  Cargo traffic management  Cargo vehicle management Machine to Machine (M2M) M2M stands for "Machine-to-Machine" and refers to the direct communication between two or more machines or devices without human intervention. M2M communication is an essential component of the Internet of Things (IoT), where various devices are connected to each other and to the internet, enabling them to exchange data and perform tasks automatically. M2M communication can take place using various technologies, such as cellular networks, Wi- Fi, Bluetooth, ZigBee, and more. M2M communication can be used in various industries, including transportation, healthcare, manufacturing, and agriculture, among others. Some common examples of M2M communication include smart home systems, asset tracking devices, and remote monitoring systems. M2M is also named as Machine Type Communication (MTC) in 3GPP (3rd Generation Partnership Project). M2M is communication could carried over mobile networks, for ex- GSM-GPRS, CDMA EVDO Networks. Key features of M2M technology include:  Low power consumption, in an effort to improve the system's ability to effectively service M2M applications.  A Network operator that provides packet-switched service  Monitoring abilities that provide functionality to detect events.  Time tolerance, meaning data transfers can be delayed.  Time control, meaning data can only be sent or received at specific predetermined periods.  Location specific triggers that alert or wake up devices when they enter particular areas.  The ability to continually send and receive small amounts of data. Difference between IoT and M2M: Basis of IoT M2M Abbreviation Internet of Things Machine to Machine Intelligence Devices have objects that are responsible Some degree of intelligence is for decision making observed in this. Connection type used The connection is via Network and using The connection is a point to point various communication types. Communication protocol Internet protocols are used such as Traditional protocols and used HTTP, FTP, and Telnet. communication technology techniques are used Data Sharing Data is shared between other applications Data is shared with only the that are used to improve the end-user communicating parties. experience. Internet Internet connection is required for Devices are not dependent on the communication Internet. Type of Communication It supports cloud communication It supports point-to-point communication. Computer System Involves the usage of both Hardware and Mostly hardware-based technology Software. Scope A large number of devices yet scope is Limited Scope for devices. large. Business Type used Business 2 Business(B2B) and Business Business 2 Business (B2B) 2 Consumer(B2C) Open API support Supports Open API integrations. There is no support for Open APIs It requires Generic commodity devices. Specialized device solutions. Centric Information and service centric Communication and device centric. Approach used Horizontal enabler approach Vertical system solution approach. Components Devices/sensors, connectivity, data Device, area networks, gateway, processing, user interface Application server. Industrial Internet of Things (IIoT) Industrial Internet of Things (IIoT) applications involve the use of connected devices and sensors to improve and optimize industrial processes. Here are some examples of IIoT applications: I. Predictive maintenance: Connected sensors can be used to monitor the performance of industrial machinery in real-time, detecting early signs of wear and tear or malfunctions. This enables maintenance personnel to take corrective action before a breakdown occurs, thereby minimizing downtime and increasing productivity. II. Asset tracking: Connected devices can be used to track the location and movement of industrial assets, such as vehicles, equipment, and inventory. This helps in optimizing inventory management, improving supply chain visibility, and reducing loss due to theft or misplacement. III. Remote monitoring and control: Connected sensors can enable remote monitoring and control of industrial processes, allowing operators to make real-time adjustments to optimize production, improve efficiency, and reduce waste. IV. Quality control: Connected sensors can be used to monitor the quality of products as they move through the production process, allowing for early detection of defects or anomalies. This helps in improving product quality, reducing waste, and enhancing customer satisfaction. V. Energy management: Connected devices can be used to monitor and control energy usage in industrial facilities, helping in reducing energy waste, lowering costs, and improving sustainability. VI. Worker safety: Connected sensors can be used to monitor the work environment, alerting workers to potential hazards, and helping in preventing accidents and injuries. These are just a few examples of the many industrial IoT applications that are being developed and deployed today. The potential benefits of IIoT are vast, including increased efficiency, improved safety, and reduced costs. Visit website to more-: https://data-flair.training/blogs/industrial-iot-applications/ Visit website to more use case-:https://www.w3.org/TR/wot-usecases/#transportation

Use Quizgecko on...
Browser
Browser