Chapter

An Overview of IoT and Its Application With Machine Learning in Data Center

February 2022

Citations


1

Reads


24


Abstract


Internet of Things (IoT) enables the gadgets, tools, machines, computers, instruments, or any devices that are associated to the internet and controlled through the internet from anywhere. Consequently, an unimaginable amount of data is generated, and this needs to be monitored and processed, and actions are needed to be taken. In this regard, through data centers, along with IoT, AI, and machine learning techniques, and through implementing edge computing, we can achieve the required high‐speed computation. This chapter describes the IoT protocols, surveys IoT in the data center, and edge computing with machine learning techniques.

Discover the world's research

  • 25+ million members

  • 160+ million publication pages

  • 2.3+ billion citations

Ad

To read the full-text of this research, you can request a copy directly from the authors.

Request full-text PDF

Similar research


Fig. 1. Edge encryption
Device control
Alice performs share/unshare for node A0
Pin enable/disable and active/inactive encryption (Alice’s interface)
Schematic circuit design
Prototype Implementation of Edge Encryption in IoT Architecture

December 2019

·

673 Reads

·

1 Citation

In the IoT system, captured plaintext data is sent to the cloud for storing, computing and further processing. But it is a potential concern to secure sensitive information like personal, financial, business, medical, etc. A certain number of researchers established IoT architecture with distinctive layers where data security is solely dependent on cloud service providers (CSPs) which make potential security threats. In this paper, an edge encryption support in the IoT architecture is implemented where the involvement of CSPs for security purposes becomes nullified. As the data become encrypted before it gets sent to the cloud, it becomes more secure and reliable for both the owner and shared users. Additionally, only the IoT node owner and shared users can access those data which provides better security, privacy, and control of data.

View
Fig. 4. Mapping of Roles and Stakeholder 
Fig. 5. IFTTT Service Protocol (Simplified) 
On-The-Fly Computing Meets IoT Markets – Towards a Reference Architecture

March 2017

·

1,556 Reads

·

13 Citations

The Internet of Things (IoT) connects the things of our everyday life and supports us in our common activities. Several markets for IoT services have been created. These markets enable IoT users to search and compose services in order to support an IoT activity. However, existing IoT markets like IFTTT (If This Then That) are not convenient for users with respect to service discovery and composition. The objective of On-the-fly (OTF) computing is to configure and provide software markets that fulfill individual users' wishes by the automatic on-the-fly composition of single services. The architecture framework of On-the-fly computing markets helps architects to systematically develop these systems in different domains. In this paper, we use our OTF architectural framework to examine the requirements of a reference architecture for IoT markets. Furthermore, we perform a comparison between the architecture of IFTTT as an existing IoT market with this reference architecture. The results show how existing IoT markets can be improved. In return, the practical knowledge of IFTTT is taken to the reference architecture. This knowledge helps to overcome the limitations of today's IoT markets or creating new markets in the future.

View
Disk storage failure prediction in datacenter using machine learning models

September 2021

·

85 Reads

·

1 Citation

Applied Nanoscience

Data centers are located centralized to do computation and accessing huge amount of data by the network devices which are interconnected to form the network path. Servers are stacked, data storage is placed in them. Data server backup and server redundancies are the recovery mechanisms implemented. Data centers compute, store, distribute the data by processing them and the data center controls all the interconnected network equipment in the distributed network. In current, RAID system is implemented to avoid the service disruptions due to disk failures, the availability of system and services are achieved with this expensive model. But still the availability is lost, and service disruptions happen due to disk failures, the machine learnings models to be used to predict the disk failures well in advance. Data center has increased usage of system with increased data storage, the failure in disc makes the system failed and down time increases. Analysis on the methods of problems in disk and methods of disk availability and predict the disk failure is the main goal. Various machine learning models are identified and discussed along with the SMART parameters for measuring the failure of the disk. Improved method of Ensembling of trees, random forest and boosting techniques are also discussed.

View

Ad