1. Trang chủ
  2. » Công Nghệ Thông Tin

ASM 1 IOT 1690FPT Greenwich (Merit)

46 47 1

Đang tải... (xem toàn văn)

Tài liệu hạn chế xem trước, để xem đầy đủ mời bạn chọn Tải xuống

THÔNG TIN TÀI LIỆU

Thông tin cơ bản

Tiêu đề Review And Evaluate About IoT Aspects
Trường học Greenwich
Chuyên ngành Internet of Things
Thể loại assignment
Định dạng
Số trang 46
Dung lượng 2,19 MB

Cấu trúc

  • A. REVIEW AND EVALUATE ABOUT IOT ASPECTS (5)
    • I. EXPLORE VARIOUS FORMS OF IOT FUNCTIONALITY (P1) (5)
      • 1. Definition of IoT (5)
      • 2. Features of IoT (5)
      • 3. How IoT Works (6)
      • 4. The Various Forms of IoT (7)
      • 5. Applications of IoT (10)
      • 6. Some examples of real-world applications of IoT (12)
    • II. REVIEW STANDARD ARCHITECTURE, FRAMEWORKS, TOOLS, HARDWARE AND APIS AVAILABLE FOR USE IN IOT DEVELOPMENT(P2) (13)
      • 1. IoT Architecture (13)
      • 2. IoT Frameworks (16)
      • 3. IoT Tools – Techniques (18)
      • 4. IoT Hardware (20)
      • 5. IoT APIs (22)
    • III. EVALUATE THE IMPACT OF COMMON IOT ARCHITECTURE, FRAMEWORKS, TOOLS, HARDWARE AND APIS IN (25)
    • IV. EVALUATE THE IMPACT OF COMMON IOT ARCHITECTURE, FRAMEWORKS, TOOLS, HARDWARE AND APIS IN (27)
  • B. PLAN AN APPROPRIATE IOT APPLICATION (30)
    • I. INVESTIGATE A SPECIFIC IOT PLATFORM (INCLUDING ARCHITECTURE, FRAMEWORKS, TOOLS, HARDWARE AND APIS) THAT HAS BEEN CHOSEN TO DEVELOP AN IOT SYSTEM (P3) (30)
    • II. DISCUSS AND GIVE OUT THE REASON FOR YOUR IOT PLATFORM CHOSEN(M3) (36)
    • III. EXPLAIN YOUR IOT DEMO SYSTEM, INCLUDING ARCHITECTURE AND HOW IT WORKS (P4) (38)
      • 1. IoT Demo System (38)
      • 2. IoT architecture (38)
      • 3. How It Works (42)
    • IV. APPLY YOUR SELECTED TECHNIQUES TO CREATE AN IOT APPLICATION DEVELOPMENT PLAN(M4) (42)

Nội dung

Điểm của bài asm còn tùy thuộc vào người chấm. Chỉ cần paraphase bài này là có thể pass. 1 trong nhưng tool paraphase mình recommend là quillbot.The submission is in the form of 1 document.● You must use the Times font with 12pt size, turn on page numbering; set line spacing to 1.3 andmargins to be as follows: left = 1.25cm, right = 1cm, top = 1cm, bottom = 1cm. Citation andreferences must follow the Harvard referencing style. ASSIGNMENT FRONT SHEET Qualification BTEC Level HND Diploma in Computing Unit number and title Unit 2: Networking Infrastructure Submission date Date Received 1st submission Resubmission Date Date Received 2nd submission Student Name Student ID Class Assessor name Student declaration I certify that the assignment submission is entirely my own work and I fully understand the consequences of plagiarism I understand that making a false declaration is a form of malpractice Student’s signature Grading grid P1 P2 P3 P4 M1 M2 D1 ❒ Summative Feedback: Grade: Lecturer Signature: ❒ Resubmission Feedback: Assessor Signature: Date: Table of Contents I Network Network definiton

REVIEW AND EVALUATE ABOUT IOT ASPECTS

EXPLORE VARIOUS FORMS OF IOT FUNCTIONALITY (P1)

The Internet of Things (IoT) refers to a vast network of interconnected devices, including computing machinery, digital tools, animals, and people, all equipped with unique identities (UIDs) and the ability to exchange data autonomously, eliminating the need for direct human interaction.

The Internet of Things (IoT) encompasses a wide range of objects that can connect to the internet and communicate data, including heart monitor implants, biochip-transponder-equipped farm animals, and vehicles with integrated sensors that notify drivers of low tire pressure These items, whether natural or man-made, are assigned unique Internet Protocol (IP) addresses, enabling seamless data transfer over networks.

Connectivity in the Internet of Things (IoT) involves linking all IoT devices to a central platform, such as a server or cloud service This connection is crucial for enabling reliable, secure, and bi-directional communication between the devices and the cloud, ensuring seamless data exchange and interaction.

Once all critical components are connected, the next step is to analyze the data in real-time to generate valuable business insights A comprehensive understanding of the information gathered from various sources indicates that our system is intelligent.

 Integrating: IoT is also merging several models to improve the user experience

Artificial Intelligence enhances the Internet of Things (IoT) by utilizing data to create smarter devices that improve daily life For instance, a coffee machine equipped with AI can monitor its bean supply and automatically reorder your preferred coffee beans from a merchant when they are running low.

Sensor devices are essential in IoT technologies, as they detect and measure environmental changes while reporting their status The Internet of Things revolutionizes passive networks by converting them into active ones, highlighting the critical role of sensors in creating a functional IoT ecosystem (Gillis, 2022).

 Active Engagement: IoT allows for active interaction between linked technology, products, and services

Effective endpoint management is essential for the success of IoT systems; without it, these systems risk total failure For instance, consider a coffee machine programmed to reorder coffee beans when supplies run low If the machine places an order while the owner is away for several days, the system could malfunction Therefore, implementing robust endpoint management is crucial to ensure seamless operation of IoT devices.

IoT devices are equipped with sensors that can detect environmental conditions, allowing them to gather and store data Examples of such devices include mobile phones, coffee makers, microwaves, geysers, fire alarms, air conditioners, and automobiles.

Devices equipped with sensors consistently generate data regarding their environment and performance The Internet of Things (IoT) serves as a vital platform for aggregating this data produced by various gadgets.

Cloud servers and large databases are integral components of the IoT platform, which gathers and processes data This platform performs in-depth analysis to extract essential insights and subsequently sends back instructions based on the analyzed information.

Finally, the data aggregation is shared with other devices in order to improve future performance It's also done to make the user experience better

4 The Various Forms of IoT a Internet of Nano things

The Internet of Nano Things (IoNT) represents a network of tiny devices designed for communication within enterprises, functioning as a miniature version of the Internet of Things This framework incorporates various nanotechnologies tailored for specific applications, such as smart processing facilities that utilize IoNT devices to monitor critical parameters like temperature, humidity, smoke, and fossil fuel emissions from exhaust systems (Boyini, 2020).

Vehicles are now equipped with compact sensors that facilitate the exchange of ecological and geographical data, enhancing the security and accuracy of vehicle assistance systems The integration of nanosensors and nanodevices with the Internet enables advanced and efficient solutions across various applications, including biomedical and mechanical fields.

Figure 3: IoNT rural, and military applications inspired the development of the "Web of Nano Things," a cutting-edge IoT- based standard (IoNT)

The IoNT architecture utilizes two primary communication methods: electromagnetic wave transmission and subatomic correspondence via data encoded in smartphones While smaller sensor focuses face challenges in transmitting information over long distances and require proximity for data collection, larger components are capable of long-range data transmission Additionally, the concept of the Internet of Underwater Things (IoUT) emerges, highlighting the unique communication needs and capabilities of underwater environments.

The Internet of Underwater Things (IoUT) refers to a network of intelligent submerged devices that utilize various communication media, including sound, remote, and wired methods, to enhance underwater communications Key applications of IoUT span natural observation, underwater research, military operations, and disaster management A critical component of IoUT is the Underwater Wireless Sensor Network (UWSN), which supports these applications and differs from Wireless Terrestrial Sensor Networks (TWSN) in aspects such as latency, transmission methods, communication medium, baud rate, transmission range, and adaptability.

The Internet of Underwater Things (IoUT) is designed to establish a worldwide network of interconnected smart devices beneath the water's surface, effectively linking our oceans, rivers, and lakes This innovative technology addresses the urgent challenge of aquatic environmental degradation and aims to enhance our understanding and management of underwater ecosystems.

REVIEW STANDARD ARCHITECTURE, FRAMEWORKS, TOOLS, HARDWARE AND APIS AVAILABLE FOR USE IN IOT DEVELOPMENT(P2)

Every Internet of Things (IoT) system shares a common foundation, despite its unique design It begins with "Things," which are connected objects equipped with sensors and actuators that perceive their environment and collect data This information is transmitted to IoT gateways, where data acquisition systems gather vast amounts of raw data, converting it into digital streams The data is then filtered and pre-processed to make it ready for analysis (AVSystem, 2020).

 According to the majority of researchers, traditional IoT architecture is divided into three layers:

Researchers have explored a support layer positioned between the application and network layers in IoT architecture, which comprises both fog computing and cloud computing Currently, cloud computing is a significant focus in academic research.

The perception layer serves as the foundational component of traditional IoT architecture, primarily responsible for collecting relevant data from various items and environmental factors, including sensors that monitor conditions like humidity and temperature This layer converts the gathered information into a digital format, enabling effective communication Key functions of the items include identifying unique addresses and utilizing short-range communication technologies such as RFID, Bluetooth, Near-Field Communication (NFC), and 6LoWPAN (Low Power Personal Area Network).

The core of traditional IoT architecture is the brain layer, which primarily facilitates and secures data transfer between the application and perception layers.

The network layer is a crucial component of traditional IoT architecture, responsible for collecting data and transmitting it to the perception layer, which then relays the information to various applications and services This layer effectively merges internet and communication-based networks, making it the most developed layer according to recent research on communication technologies By facilitating data forwarding for essential operations, the network layer plays a vital role in IoT administration and the necessary data processing tasks.

The network layer is essential for transferring and analyzing data collected by devices, enabling communication between smart gadgets, servers, and network devices while managing all data transfers efficiently.

The cloud serves as the central hub for the Internet of Things, enabling the storage, processing, and analysis of vast data quantities Unlike edge solutions, cloud-based systems leverage advanced data analytics and machine learning to extract deeper insights from data, capabilities that edge systems cannot achieve.

In traditional IoT design, the application layer serves as the topmost layer, providing tailored services that cater to individual user needs Its primary role is to effectively connect users with applications, addressing the significant gap that exists between them.

The IoT layer unites various industries to deliver advanced intelligent application solutions, including disaster and health monitoring, translation, fortune-telling, medical services, and environmental oversight, alongside global management for all smart applications This application layer is categorized into two segments: the general Internet of Things platform, which encompasses cloud services and concepts like IAAS, PAAS, and SAAS Leading organizations such as Root Internet, Tencent QQ IoT Intelligent Hardware Open Platform, Amazon AWS, Microsoft Azure, and Google Cloud IoT Core have introduced their own IoT platforms, while others continue to innovate in the Internet of Things space.

Figure 13: Application Layer applications that are similar to cell phone apps Because these applications are directly managing how these devices collect data and control things

In the age of massive data generation and communication across multiple devices, a centralized location for data collection and consolidation is essential This unification of data simplifies the understanding of the information produced However, the transmission and generation of data do not occur by chance; they are facilitated by the Internet of Things (IoT) framework, which plays a crucial role in managing and organizing this complex data flow.

The Internet of Things (IoT) Framework consists of a network of interconnected devices that communicate via the Internet, enabling them to send and receive data with minimal human intervention.

The Internet of Things (IoT) foundation enables seamless communication between connected devices over the Internet This framework, often referred to as the 'Internet of Things,' facilitates the interaction of various 'Things' (devices) through online connectivity.

The Internet of Things (IoT) Framework refers to a network of interconnected devices that communicate seamlessly via the Internet, enabling them to send and receive data with minimal or no human intervention.

 The Internet of Things foundation is what allows linked devices to communicate smoothly over the Internet

 It's no surprise that it's known as the 'Internet of Things' framework, or, in other words, the framework that allows 'Things' (devices) to interact through the Internet

 Main Components of the Internet of Things Framework:

 The IoT framework's device hardware component necessitates a fundamental understanding of architecture The user must also have a basic understanding of how the various microcontrollers and sensors function

 Sensors, microcontrollers, and controllers are examples of hardware components that are part of this IoT framework component

To ensure the effective operation of device software within the IoT framework, it is essential to configure controllers using bundled writing programs and to run them remotely Users must possess a basic understanding of API functionality in microcontrollers and the typical creation of programming libraries.

The cloud platform is a crucial element of IoT architecture, requiring a solid understanding of both wireless and wired communication methods Users must also possess a comprehensive knowledge of IoT integration and the functionality of cloud technology.

 To summarize, the IoT Framework's communication and Cloud Platform is where all conversations take place

EVALUATE THE IMPACT OF COMMON IOT ARCHITECTURE, FRAMEWORKS, TOOLS, HARDWARE AND APIS IN

Safety is a crucial aspect of the Software Development Lifecycle (SDLC) for IoT devices, ensuring the creation of products with secure designs Key stages in the product development lifecycle that emphasize safety include planning, design, implementation, and testing Prioritizing safety throughout these stages is essential for developing reliable IoT solutions.

 Application Layer Our products will remain safe in the face of continual attacks if we apply these four processes to them

The IoT Decision Framework assists in organizing your ideas, identifying opportunities and challenges, achieving consensus, and rapidly developing optimal IoT solutions, making it a valuable tool in navigating the complexities of various IoT applications.

Many IoT solutions vary in complexity, and utilizing the IoT Decision Framework can assist in organizing your ideas, identifying opportunities and challenges, achieving consensus, and rapidly developing optimal solutions.

Most IoT technologies are intricate, making support tools essential for developers as they streamline operations and programming These tools help reduce data complexity and enhance speed, ultimately leading to improved program management efficiency.

The development of IoT solutions relies heavily on the integration of hardware devices and computer systems Essential components such as sensors, portals, and software applications work together to create a cohesive IoT project However, validating the system's capabilities does not guarantee its error-free operation, as various interdependencies exist regarding the environment and data transmission Consequently, testing individual software or hardware components can become a more complex and tedious process.

APIs are essential for the functionality of Internet of Things (IoT) devices, as they provide the necessary interface for data exchange and connectivity Chris O'Connor, IBM's GM for IoT, emphasizes that APIs unlock new possibilities for these gadgets, making them valuable He predicts that APIs will play a crucial role in discussions around enabling and monetizing the IoT in the coming year.

Evaluating the applicability and specificity of the IoT Software Development Life Cycle (IOTSDLC) for IoT systems is crucial to ensure its effectiveness in IoT system development This assessment guarantees that the IOTSDLC is both relevant and efficient when applied to the development of IoT solutions.

Traditionally, projects were developed through direct programming and implementation, relying heavily on client feedback for necessary adjustments However, this conventional method often led to extensive rework and consumed significant time and resources (ALFAWAIR, 2022).

The development plan for the three systems was meticulously adhered to, following the IoT Software Development Life Cycle (IOTSDLC) at every phase A comprehensive development plan was established prior to the project, ensuring each step was executed precisely, with only minor adjustments made for evolving circumstances Additionally, the time and personnel involved in each critical procedure were carefully monitored and documented for comparative analysis.

The successful completion of three projects using the IOTSDLC highlights its effectiveness in developing IoT systems Its clearly defined phases and streamlined processes simplify IoT system development, enhancing overall project management and execution.

EVALUATE THE IMPACT OF COMMON IOT ARCHITECTURE, FRAMEWORKS, TOOLS, HARDWARE AND APIS IN

1 The Impact of IoT Architecture, Frameworks, Tools, Hardware, APIS in IoT Security a) Technical Vulnerabilities in IoT Security

The Internet of Things (IoT) relies on multiple devices connected to a network with internet access, making it essential to address potential technical issues that may arise from inadequate security measures Without proper authentication guidelines, users risk exposing their privacy, as vulnerabilities in unsecured devices can lead to hacking and unauthorized access to personal information To enhance IoT security, it is crucial to prevent technical issues by creating secure session keys, implementing multiple authentication methods, verifying the certifications of IoT devices before purchase, and ensuring customer anonymity while browsing open sources.

Despite significant efforts by major development companies to enhance security, the Internet of Things (IoT) requires regular and expensive updates If manufacturers fail to address hardware vulnerabilities, smart devices remain at risk of cyberattacks As companies strive to create secure technology while managing costs, it is essential to verify the manufacturer's claims, monitor keystrokes, and conduct thorough testing independently.

All IoT devices undergo rigorous testing prior to manufacturing and public release, addressing many security concerns However, as cyberattack techniques evolve, unresolved hardware issues can lead to significant vulnerabilities in smart devices Therefore, it is crucial to thoroughly evaluate the certifications, scalability, reconfigurability, and memory capabilities of IoT devices to ensure their safety and reliability.

Many individuals and businesses are eager to transition to renewable energy, recognizing the integral role of the Internet of Things (IoT) in this process Smart devices play a crucial role in the remote control of renewable energy collection and storage As manufacturers increasingly invest in information security to safeguard their internet databases and business data, they must prioritize protective measures such as hardware and software security, secure internet access, and remote management Companies should enhance their focus on environmental assessments and asset upgrades, implement effective access control, and utilize predictive technologies to prevent potential cyber attacks By conducting a thorough evaluation of their current cybersecurity landscape and adopting updated security systems, organizations can maintain robust security levels and protect critical systems and data Additionally, AI and machine learning-based predictive solutions can effectively counteract hacker behavior, further securing renewable energy operations.

Manufacturers often deploy IoT systems, such as home routers, with easily understandable passwords that vendors and users may not change, making these devices prime targets for hackers using automated tools for mass exploitation APIs are frequently attacked by various threats, including Man in the Middle (MITM) attacks, code injections like SQL injection (SQLI), and distributed denial of service (DDoS) attacks, as they serve as gateways to command and control centers For more information on the consequences of API-targeting attacks, click here.

Outdated software on devices poses a significant security risk due to vulnerabilities from recent leaks, often exacerbated by connectivity issues or the need for users to manually download updates from a command and control center Additionally, the complexity of systems can further hinder timely updates and maintenance.

As networks expand with more devices, programs, interactions, and users, the complexity of the system increases, necessitating more robust protection to counter the growing number of threats associated with each new connected device Consequently, the diversity and complexity of the network system are matched by the escalating cybersecurity threats that must be identified and addressed To effectively mitigate these risks, cybersecurity solutions must address additional security management points, ensuring comprehensive protection for the increasingly intricate network ecosystem.

2 Risks of IoT common Platform in IoT Security

A hacked IoT device places its users at threat in a number of different ways, including:

The increasing prevalence of IoT devices in the medical field, such as pacemakers, heart monitors, and defibrillators, offers significant benefits, including remote adjustments by healthcare professionals However, these advancements also introduce substantial security risks that must be addressed to protect patient safety and data integrity.

IoT devices store vast amounts of personal data, including web browsing history, credit card details, and health information, making them prime targets for cybercriminals if not properly secured Insecure devices can serve as entry points to access more sensitive information within a network, potentially compromising user privacy and security Although rare, the exploitation of these vulnerabilities could disrupt critical services, such as a patient's medical care, highlighting the importance of robust security strategies for IoT devices.

Insecure IoT devices are vulnerable to hijacking and can be incorporated into a botnet, a network of malware-infected internet-connected devices that can reach millions and are remotely controlled Cybercriminals can easily discover unsecured devices using freely available scripts and tools, with Shodan, a public search engine designed for locating such devices, being a significant resource in this process.

The increasing sophistication of IoT devices has led to a surge in various cyberattacks, including extensive spam and phishing campaigns, along with larger distributed denial-of-service (DDoS) attacks This rise in DDoS attacks can be attributed to the growing number of unprotected IoT devices, making them prime targets for exploitation.

PLAN AN APPROPRIATE IOT APPLICATION

INVESTIGATE A SPECIFIC IOT PLATFORM (INCLUDING ARCHITECTURE, FRAMEWORKS, TOOLS, HARDWARE AND APIS) THAT HAS BEEN CHOSEN TO DEVELOP AN IOT SYSTEM (P3)

AND APIS) THAT HAS BEEN CHOSEN TO DEVELOP AN IOT SYSTEM (P3)

1 Arduino: A microcontroller-based kit such as an Arduino board is one example In the year 2005, David

Arduino technology, initially created by Cuartielles and Massimo Banzi, aims to empower students, hobbyists, and professionals to easily and affordably manufacture gadgets Users can purchase Arduino boards from suppliers or create them at home using everyday materials Popular beginner projects include motor detectors, thermostats, and small robots In 2011, Adafruit Industries predicted the production of over 300,000 Arduino boards, while by 2013, that number had surged to 700,000 in user hands Arduino technology is widely utilized in various functioning devices, particularly for communication and control applications.

The Arduino Uno is a good example of an Arduino board It comes with an ATmega328 microprocessor and 28 pins

The Arduino Uno board features a comprehensive pin arrangement, including 14 digital I/O pins, a USB connection, a power jack, a 16MHz crystal oscillator, a reset button, and an ICSP header This versatile board supports pulse width modulation outputs and analog inputs, allowing for a variety of applications It can be powered via a USB connection from a computer or through an external source, such as a battery or adapter, with a voltage range of 7-12V provided through the IORef or Vin pins.

The device features 14 digital I/O pins, each capable of drawing and supplying 40 milliamps of current Pins 0 and 1 serve as the transmitter and receiver, while several other pins have specific functions: pins 2 and 3 are designated for external interrupts related to serial connections, pins 3, 5, 6, 9, and 11 provide PWM output, and pin 13 is intended for connecting an LED Additionally, it includes six analogue I/O pins, each offering a resolution of ten bits.

Aref: The analogue i/ps is referenced by this pin

Reset: When the pin is low, the microcontroller is reset

The Arduino board operates on a Harvard architecture, featuring distinct memory for program code and data It comprises two memory types: program memory for storing code in flash memory and data memory for holding data The Atmega328 microcontroller is equipped with 32 kilobytes of flash memory, 2 kilobytes of SRAM, and 1 kilobyte of EEPROM.

EPROM, and it runs at 16 MHz

Arduino is an open-source hardware platform that offers free and publicly accessible designs on its website, licensed under the Creative Commons Attribution-Share-Alike 2.5 license Additionally, certain hardware versions include layout and manufacturing files for users.

Although the hardware and software designs of Arduino are available under copyleft licenses, developers insist that the name "Arduino" be exclusively reserved for the original product, requiring permission for its use in derivative works The official policy of the Arduino project emphasizes openness to incorporating external contributions into the official product Consequently, many commercially available Arduino-compatible devices have adopted names that include "arduino" at the end to circumvent using the project's name.

Most Arduino boards utilize an Atmel 8-bit AVR microcontroller, such as the ATmega8, ATmega168, ATmega328, ATmega1280, or ATmega2560, each offering different flash memory capacities, pin counts, and features In 2012, Atmel launched the 32-bit Arduino Due, which is based on the SAM3X8E microcontroller The boards are equipped with single or dual pins and female connectors to facilitate programming and circuit integration, while shields serve as add-on modules that can connect to these boards.

An I2C serial connection may have been used to address many, probably stacked shields concurrently A 5

Most circuit boards typically incorporate a V linear regulator and a 16 MHz crystal oscillator or ceramic resonator However, due to form-factor constraints, some devices, such as the LilyPad, function at 8 MHz and lack an integrated voltage regulator.

The bootloader on Arduino microcontrollers simplifies the process of uploading programs to the on-chip flash memory, with the Optiboot bootloader being the default for Arduino Uno Software code is loaded onto the boards via a serial connection to a computer, and certain serial Arduino boards include a level shifter circuit to convert between RS-232 and TTL logic levels Currently, Arduino boards utilize USB-to-serial adaptor chips, such as the FTDI FT232, while later-model Uno boards often replace the FTDI chip with a separate AVR chip that features reprogrammable USB-to-serial code accessible through its ICSP connector.

The Arduino board features exposed I/O pins that can be utilized by various devices, including 14 digital I/O pins on models like the Diecimila, Duemilanove, and Uno, with six capable of generating pulse-width modulated signals Additionally, there are six analog inputs that can function as digital I/O pins These pins are connected to the top of the board via female 0.1-inch (2.54 mm) headers, and several commercial plugin application shields are available for enhanced functionality Moreover, male header pins located on the underside of the Arduino Nano, as well as on compatible Bare Bones Board and Boarduino boards, allow for easy connections to solderless breadboards.

5 Arduino Tool, Framework and Application programming interface or APIs

Any programming language that compiles to binary machine code can be utilized to develop scripts for Arduino hardware For programming Atmel's 8-bit AVR and 32-bit ARM Cortex-M microcontrollers, developers can use AVR Studio, the older development environment, or the newer Atmel Studio IDE.

The Arduino IDE is a versatile, Java-based application compatible with Windows, Mac OS X, and Linux, originally designed for the Processing and Wiring programming languages It features a user-friendly code editor equipped with tools for text editing, automated indenting, brace matching, and syntax highlighting Users can easily compile and upload programs to their Arduino boards with a single click The IDE also includes a message area, a text terminal, a toolbar for common tasks, and a structured menu system, all while being governed by the GNU General Public License, version 2.

The Arduino IDE employs unique conventions to support C and C++ programming languages, featuring a software library from the Wiring project that provides essential input and output functions To initiate a sketch and execute the main program loop, user-written code requires only three simple functions, which are integrated with a program stub main() within the IDE, utilizing the GNU toolchain included in the release Additionally, the program avrdude is utilized by the Arduino IDE to convert and load hexadecimal encoded files into the firmware of the Arduino board through a loader program.

The Arduino IDE enables users to create sketches, previously saved with the pde extension as text files on their development computers A basic Arduino C/C++ program consists of two essential functions: setup() and loop() The setup() function is executed once when a sketch starts after a power-up or reset, allowing for the initialization of variables, input and output pin modes, and necessary libraries for the sketch This function serves a role similar to that of the main function in other programming languages.

The loop() method is executed repeatedly in the main program after the setup() function completes, maintaining control of the board until it is turned off or reset This method functions similarly to a while(1) loop, as demonstrated in the Blink example.

DISCUSS AND GIVE OUT THE REASON FOR YOUR IOT PLATFORM CHOSEN(M3)

Blynk is the pioneering mobile app builder and IoT platform that caters to both beginners and experts, offering comprehensive Internet of Things (IoT) services across various industries With the launch of its new platform, Blynk aims to empower users to create DIY projects or establish IoT businesses, addressing 90-100% of potential use cases for early-stage IoT operations As the IoT landscape continues to expand, with more devices connecting to the internet daily, security concerns have escalated significantly Key challenges in IoT include the necessity for secure and encrypted data communication, which requires a dedicated and closed server—an undertaking that can be complex to manage.

IoT devices must also be responsive, which is impossible to do without a server with low latency and great responsiveness

In the realm of the Internet of Things, it is crucial for platforms to support diverse hardware architectures and devices, avoiding restrictions to a single type of hardware Blynk emerges as the perfect solution to address these challenges effectively.

Blynk is a powerful and user-friendly platform for IoT device management, making device setup effortless Its extensive features maximize the potential of IoT devices, and the wide range of supported endpoints enhances its usability The popularity of Blynk's components further contributes to its appeal, ensuring a seamless experience for users.

 The Blynk app is an app editor in disguise

Each project can feature graphical widgets like virtual LEDs, buttons, and value displays, along with a text terminal, enabling communication with multiple devices With the Blynk library, you can effortlessly control Arduino or ESP32 pins directly from your phone, eliminating the need for coding.

You can easily share a project with friends or clients, allowing them to view the connections without the ability to make changes Imagine developing a smartphone app that enables you to control your room's lighting, window blinds, and temperature directly from your device.

 A Blynk library is used to implement the support, which is tailored to a certain device and connectivity type

Both designs leverage the Blynk infrastructure, utilizing both the physical pins integrated into the Arduino hardware and the virtual pins generated by the Blynk Platform in software.

With careful planning, you can create drawings that are easily shareable across various devices Additionally, you can develop a program for the Arduino Uno and run it on an Arduino MKR1010 with minimal modifications.

 Clients that aren't microcontrollers are likewise supported by Blynk Thanks to the Blynk libraries for these languages, you may create client code in Javascript, Python, or Lua

 You can run a private instance of the whole Blynk server and link your smartphone Blynk app to it, unlike IoT platforms like IFTTT, Twillio, and even Adafruit IO

The Blynk Cloud server is an excellent choice for most applications due to its constant availability and ease of use In the initial experiments of this course, we will utilize the Cloud server to facilitate a quick and efficient start.

Blynk has introduced a new pricing structure for its widgets on the Cloud server, which operates on a system of "energy" units Users can initiate a new project with a total of 1000 energy units, but it's important to note that there are limitations on the number of widgets that can be utilized on the Cloud server.

Eventually, the other significant reason why blynk is chosen is that it has a lot of additional benefits:

 Energy units are virtually limitless, allowing you to create any Blynk application you can imagine

 Minimal latency, which is beneficial when your program is utilized in a small geographic region and responsiveness is crucial

You have full control over your data, allowing you to create backups of your private server, migrate it to a different host, implement desired security features, and customize user management to suit your needs.

EXPLAIN YOUR IOT DEMO SYSTEM, INCLUDING ARCHITECTURE AND HOW IT WORKS (P4)

The "CBD OD Alarm" is a Wi-Fi-enabled alarm clock that utilizes the ESP8266 module for seamless communication with your smartphone When connected to the same Wi-Fi network as your device, you can easily manage alarms—adding, modifying, deleting, activating, or deactivating them—through a dedicated Android application.

I often rely on my phone to set multiple alarms for waking up, but I find that by the time I finally get out of bed, my phone's battery is usually drained from the constant snoozing.

To develop my initial IoT demo system, I created the "CBD OD Alarm," a Wi-Fi-enabled alarm clock that allows users to set alarms via their smartphones This innovative gadget combines convenience and technology, showcasing the potential of Internet-of-Things devices in everyday life.

3) ESP8266 Wi-Fi module, ESP-01 model

The AT command enables the connection of the ESP8266 to an Arduino UNO via a UART connection using ASCII commands Once the device is powered on and connected to the same Wi-Fi network as your smartphone, you can easily add, modify, delete, activate, or deactivate alarms through the Android app.

I displayed essential information, including the time, date, IP address, port number, and alarm title, on a 1.4-inch TFT screen Since both the TFT screen and the Wi-Fi module function at a 3.3V logic level, a level converter is required for compatibility with the Arduino, which operates at a 5V logic level.

The DS1307 RTC chip accurately tracks time and date and interfaces with Arduino via I2C To maintain accurate time even when powered off, I utilized a Li-ion backup battery, which is charged using a TP4056 charger IC.

 EEPROM (to store alarms in the internal EEPROM)

 Connect to the server using:

 Simple and straightforward to use Almost every hardware is supported

 The ease of use was the most important factor for me, and I was up and running in no time

 It will be highly handy and straightforward to use even for non-experienced developers Disadvantages of Blynk IoT:

 There is no online interface on the lone smartphone app

 The iOS app isn't particularly attractive or well-designed

 The free trial is a bit too restrictive

 In your browser, we won't be able to track us (only if we have your own blynk server)

 IoT framework: Adruino Benefits of Adruino framework:

 Open source and extensible software - hardware

The ESP8266 module connects the "CBD OD Alarm" to an Android application via Wi-Fi, allowing users to manage alarms seamlessly When the Android app is open and connected to the same Wi-Fi network as the user's phone, it enables the addition, modification, deletion, activation, and deactivation of alarms.

The "CBD OD Alarm" features a 1.4-inch TFT screen and two buttons for easy operation, allowing users to turn off the alarm with one button and snooze it with the other The accompanying app offers customization options, enabling users to personalize the welcome message displayed when the alarm activates and adjust the snooze duration Additionally, the TFT screen shows the current time and date, which are synchronized with the user's phone for accuracy.

The handshake method is essential for modifying or adding new alarms, ensuring that the app only executes actions when it receives a response from the device This safeguard is designed to prevent synchronization issues between the smartphone and the "CBD OD Alarm."

Alarms can be set as one-time or recurring based on specific days, and when they deactivate, the TFT screen shows a distinct title for each alarm, helping to remind users of important appointments and meetings.

APPLY YOUR SELECTED TECHNIQUES TO CREATE AN IOT APPLICATION DEVELOPMENT PLAN(M4)

To use this TFT module with Arduino, first install the TFT ILI9163C library (developed by Sumotoy) and then connect the TFT pins to Arduino as follows

Understanding color formatting is essential for this TFT, which supports 18-bit, 16-bit, and 6-bit RGB interfaces The Sumotoy library utilizes a 16-bit RGB format, known as RGB565, comprising 5 bits for red, 6 bits for green, and 5 bits for blue.

In this format, there are certain online applications that can provide color of choosing

The ESP8266 is an affordable System on Chip (SoC) that features a built-in microprocessor and a comprehensive TCP/IP protocol stack, enabling direct connectivity to Wi-Fi networks.

The ESP8266 chip comes in several module variants, with the ESP-01 model being the focus of this discussion To ensure compatibility, we must convert the 3.3V level of the ESP-01 module to the 5V level utilized by the Arduino.

In the worst-case scenario, the connection might be unreliable

While there is a power source or a backup battery, the RTC chip DS1307 is utilized to obtain time from its internal non-volatile registers

The table outlines the communication commands sent from the mobile application and the anticipated responses from the Arduino Additionally, it includes the installation of two jumpers for the Wi-Fi module, one designated for powering it on and off.

The Android app offers full control over personal alarms, enabling users to easily add, modify, and delete them Additionally, it facilitates synchronization of date and time between the ESP Alarm and the smartphone.

USB TTL converter cable 1 33000VND

ALFAWAIR, M., 2022 INTERNET-OF-THINGS: A SYSTEM DEVELOPMENT LIFE, s.l.: s.n

Available at: https://www.avsystem.com/blog/what-is-iot-architecture/

Bilal, M., 2016 A Review of Internet of Things Architecture,, Hangzhou: Department of Computer Science

Boyini, K., 2020 The Internet of Nano Things [Online]

Available at: https://www.tutorialspoint.com/the-internet-of-nano-things

Culbertson, J., 2020 10 Top APIs for the Internet of Things [Online]

Available at: https://www.programmableweb.com/news/10-top-apis-internet-things/brief/2020/03/29

Elizalde, D., 2017 IoT Hardware & Devices - Introduction and Explanation [Online]

Available at: https://www.iotforall.com/iot-hardware-introduction-explanation

Gillis, A S., 2022 What is the internet of things (IoT)? [Online]

Available at: https://www.techtarget.com/iotagenda/definition/Internet-of-Things-IoT

IoTDunia, 2022 What is IoT framework? List top 10 Open source IoT frameworks [Online]

Available at: https://iotdunia.com/what-is-iot-framework-list-top-10-open-source-iot-frameworks/

Panchal, R., 2021 Popular APIs for the Internet of Things (IoT) Systems [Online]

Available at: https://dzone.com/articles/popular-apis-for-the-internet-of-things-iot-system

Available at: https://www.educba.com/iot-tools/

Rajiv, 2021 Applications of Internet of Things (IoT) [Online]

Available at: https://www.rfpage.com/applications-of-internet-of-things-iot/

Stefanuk, A., 2019 Biggest Security Issues IoT Devices Face [Online]

Available at: https://internetofthingswiki.com/biggest-security-issues-iot-devices-face/1344/

TechVidvan, n.d How IoT Works? [Online]

Available at: https://techvidvan.com/tutorials/how-iot-works/

Ngày đăng: 13/07/2022, 15:45

TỪ KHÓA LIÊN QUAN

w