Advertisement
Guest User

Untitled

a guest
Feb 25th, 2020
250
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 5.86 KB | None | 0 0
  1.  
  2. while True:
  3. motion_Sensor = digitalRead(9)
  4. if motion_Sensor == HIGH:
  5. print("Making Coffee")
  6. customWrite(1,1)
  7. customWrite(2,2)
  8. delay (6000)
  9. print("Coffee is Ready")
  10. customWrite(1,0)
  11. customWrite(2,0)
  12. delay(500)
  13.  
  14.  
  15.  
  16. CHAPTER 1
  17. >>
  18. The Presence of IoT in Today's World
  19. The IoT is all around us.
  20. The IoT helps individuals to improve quality of life.
  21. The IoT also helps industries to become more efficient.
  22.  
  23.  
  24. Six Pillars of the Cisco IoT System are:
  25. Network Connectivity
  26. Fog Computing
  27. Cybersecurity and Physical Security
  28. Data Analytics
  29. Management and Automation
  30. Application Enablement Platform
  31.  
  32. Sensors
  33. A sensor is a device that can be used to measure a physical property by detecting some type of information from the physical world.
  34. A sensor may be connected to a controller either directly or remotely
  35.  
  36. Actuators
  37. An actuator is a basic motor that can be used to control a system Can be hydraulic, electric or pneumatic.
  38. can be responsible for transforming an electrical signal into physical output.
  39.  
  40. Controllers
  41. Responsible for collecting data from sensors and providing network connectivit
  42.  
  43. IoT Process Flow
  44. A simple IoT system include sensors connecting, through a wireless or wired connection, to actuators or controllers.
  45.  
  46. Processes
  47. A process is a series of steps or actions taken to achieve a desired result by the consumer of the process.
  48.  
  49.  
  50. Feedback
  51. Feedback is when the output of a process affects the input.
  52. Feedback is often referred to as a feedback loop.
  53. Feedback loops can be positive or negative.
  54.  
  55. Open-Loop Control Systems
  56. Open-loop control systems do not use feedback.
  57. The plant performs a predetermined action without any verification of the desired results.
  58. open-loop control systems are often used for simple processes.
  59.  
  60. Closed-Loop Control Systems
  61.  
  62. A closed-loop control system uses feedback to determine whether the collected output is the desired output.
  63. The result is then fed back into a controller to adjust the plant for the next iteration of output, and the process repeats.
  64.  
  65. Closed-Loop Controllers
  66. There are many types of closed-loop controllers:
  67. Proportional controllers (P): based on the difference between the measured output and the desired output.
  68. Integral controllers (PI): use historical data to measure how long the system has deviated from the desired output.
  69. Proportional, Integral and Derivative controllers (PID): include data about how quickly the system is approaching the desired output.
  70.  
  71.  
  72. There are many types of closed-loop controllers:
  73. Proportional controllers (P): based on the difference between the measured output and the desired output.
  74. Integral controllers (PI): use historical data to measure how long the system has deviated from the desired output.
  75. Proportional, Integral and Derivative controllers (PID): include data about how quickly the system is approaching the desired output.
  76.  
  77. >>>>>>
  78.  
  79. CHAPTR 2
  80. Models of Communication
  81. Layered networking models are used to illustrate how a network operates. Benefits include:
  82. Assists in protocol design.
  83. Fosters competition.
  84. Promotes technology or capability independence.
  85. Provides a common language to describe networking functions and capabilities.
  86.  
  87. tandardization
  88. The challenge for the IoT is to ensure these emerging IoT devices can connect securely and reliably to the Internet and to each other.
  89. Consistent, secure, and commonly recognized technologies and standards is needed.
  90.  
  91.  
  92. A simpler approach is based on connection levels. The levels are:
  93. Device-to-Device
  94. Device-to-Cloud
  95. Device-to-Gateway-to-Cloud
  96. Device-to-Gateway-to-Cloud-to-Applicatio
  97.  
  98. Connections Within Networks
  99. Connections can have different contexts.
  100. Power connections, circuit connections or network connection
  101.  
  102. Physical Connections
  103. Relate to the media and cable type.
  104. Common media types include copper, fiber optics and wireless
  105.  
  106.  
  107. What is Metadata?
  108. Metadata refers to the data about data.
  109. Metadata can be embedded within a digital object or it can be stored separately.
  110. Metadata is not usually seen by a user.
  111. >>>>>>>
  112.  
  113. 3
  114.  
  115. Electronics
  116. is the field of study focused on the control of electricity and the physical components
  117.  
  118. electronics device
  119. small
  120. require low power and low voltage
  121. degital circuit
  122.  
  123. Basic Circuit
  124. An electrical circuit is a closed conductive path that allows electrons to flow
  125.  
  126. Direct Current vs. Alternating Current
  127. In DC current, electron flow is only in one direction.
  128. Batteries, power supplies, thermocouples, solar cells, or dynamos generate DC.
  129.  
  130.  
  131. In Alternating AC current, electron flow periodically reverses direction.
  132. Hydroelectric plants generate AC.
  133.  
  134. Analog Circuits vs. Digital Circuits
  135.  
  136. Analog Circuits: Circuits in which signals vary continuously with time.
  137.  
  138. Digital circuits: Circuits in which signals that take one of two discrete values.
  139.  
  140. >>>>
  141.  
  142. What is a Program
  143. Code is a set of ordered instructions created to accomplish a specific task.
  144.  
  145. Why Learn Code?
  146. Programmers are valued in the job market.
  147. Today, programmers may work on firmware, device
  148. drivers, mobile applications, web interfaces, data
  149. analysis, and more.
  150.  
  151. REST APIs use HTTP based calls between applications to access and manipulate information stored on powerful databases
  152.  
  153.  
  154. The Raspberry Pi can be accessed locally:
  155. 1. Install an operating system image on the micro SD card.
  156. 2. Place the card in the micro SD card slot of the RaPi.
  157. 3. Connect a USB keyboard.
  158. 4. Connect a monitor or TV using the HDMI port.
  159. 5. Power the device with a power adapter.
  160.  
  161.  
  162. The Impact of IoT on Privacy
  163. Suggestions and design considerations concerning privacy include:
  164. Transparency
  165. Data Collection and Use
  166. Data Access
  167.  
  168. Challenges for Securing IoT Devices
  169. Some IoT network security impacting factors include:
  170. Increasing Number of Devices
  171. Non-Traditional Location of Devices
  172. Changing Type and Quantity of Gathered Data
  173. Lack of Upgradeability
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement