KMC102 ET Syb OBE Notes-2020-21
KMC102 ET Syb OBE Notes-2020-21
Program Statement
Outcomes
PO2 Problem analysis: Identify, formulate, review research literature, and analyse complex
computer engineering problems reaching substantiated conclusions using first principles of
mathematics, natural sciences, and engineering sciences.
PO4 Conduct investigations of complex problems: Use research-based knowledge and research
methods including design of experiments, analysis and interpretation of data, and synthesis
of the information to provide conclusions
PO5 Modern tool usage: Create, select, and apply appropriate techniques, resources, and modern
engineering and IT tools including prediction and modelling to complex engineering
activities with an understanding of the limitations
PO6 The engineer and society: Apply reasoning informed by the contextual knowledge to assess
societal, health, safety, legal and cultural issues and the consequent relevant to the
professional engineering practices
PO7 Environment and sustainability: Understand the impact of the professional engineering
solutions in societal and environmental contexts, and demonstrate the knowledge of, and
need for sustainable development
PO8 Ethics: Apply ethical principles and commit to professional ethics and responsibilities and
norm of the engineering practices
PO9 Individual and team work: Function effectively as an individual, and as a member or leader
in diverse teams, and in multidisciplinary settings
PO11 Project management and finance: Demonstrate knowledge and understanding of the
engineering and management principles and apply these to one’s own work, as a member
and leader in a team, to manage projects and in multidisciplinary environments.
PO12 Life-long learning: Recognize the need for, and have the preparation and ability to engage
in independent and life learning in the broadest context of technological change.
COURSE OUTCOMES
Course Statement
Outcomes
(On completion of this course, students will be able to,)
KMC 102.1 Understand the concepts of internet of things, smart cities, and industrial internet of things
KMC 102.3 Understand the concepts of block chain, cryptocurrencies, smart contracts
KMC 102.4 Understand design principles, tools, trends in 3 D printing and drones
Understand augmented reality (AR), virtual reality (VR), 5G technology, brain computer
KMC 102.5
interface and human brain
CO-PO MAPPING
Course Program Outcome (PO) Program
Outcome Specific
Outcome
(PSO)
PSO1
PSO2
PO10
PO11
PO12
PO1
PO2
PO3
PO4
PO5
PO6
PO7
PO8
PO9
KMC 102.1 3 2 2 1 - - - - - - 3 - 3
KMC 102.2 3 3 2 2 - - - - - - - 3 3
KMC 102.3 2 3 3 3 - - - - - - - 3 3
KMC 102.4 3 3 3 3 2 - - - - - - 2 3 2
KMC 102.5 3 3 3 3 - - - - - - - 3 3
Course Statement
Outcomes
(On completion of this course, students will be able to,)
KMC 102.1 Understand the concepts of internet of things, smart cities, and industrial internet of things
KMC 102.3 Understand the concepts of block chain, cryptocurrencies, smart contracts
KMC 102.4 Understand design principles, tools, trends in 3 D printing and drones
Understand augmented reality (AR), virtual reality (VR), 5G technology, brain computer
KMC 102.5
interface and human brain
Syllabus
Unit 1 Internet of Things: What is the Internet of Things? Sensors, their types and features, IoT
components: layers, Smart Cities, Industrial Internet of Things
Unit 2 Cloud Computing: Cloud Computing: it is nature and benefits, AWS, Google, Microsoft,
Vendor Offering – IBM
Unit 3 Block-Chain: What is Blockchain? Fundamentals, Principles and Technologies,
Cryptocurrencies, Smart Contracts, Blockchain Applications and use cases.
Unit 4 Digital Manufacturing: 3D Printing & Drones: The history and survey of 3D Printing,
Design Principles and Tools, Emerging Trends & Use Cases in 3D Printing, Introduction of Drones,
Engineering Disciplines, Multirotor Drone Assembly Course /Regulations, and procedures for
becoming a drone pilot.
Unit 5 Future Trends: Augmented Reality (AR) and Virtual Reality (VR), History, objective &
global scenario of 5G Telecom, 5G in India, Application and Use Cases, Brain Computer Interface,
Application, Modal and Global Market, Brain Computer Interface, and Human Brain
Index:
Unit 1: Internet of Things……………………………………………………………….....……4-21
1.1 What is the Internet of Things?......................................................................................................4
1.2 Sensors, their types, and features………………………………………………………….…….8
1.3 IoT components: layers…………………………………………………………………………14
1.4 Smart Cities………………………………………………………………………………..……17
1.5 Industrial Internet of Things………………………………………………………….…………19
Unit 2: Cloud Computing…………………………………………………………….…….….22-43
2.1 Cloud Computing: it’s nature and benefits……………………………………………….……22
2.2 AWS…………………………………………………………………………………………....26
2.3 Google…………………………………………………………………………………………..33
2.4 Microsoft…………………………………………………………………………………….….38
2.5 Vendor Offering – IBM…………………………………………………………………………41
Unit 3: Blockchain……………………………………………………………………………...44-54
3.1 What is Blockchain? Fundamentals……………………………………………………………44
3.2 Principles and Technologies……………………………………………………………….……44
3.3 Cryptocurrencies………………………………………………………………………………...47
3.4 Smart Contracts…………………………………………………………………………...…….49
3.5 Blockchain Applications and use cases…………………………………………………..…….52
Unit 4: Digital Manufacturing: 3D Printing & Drones………………………………….….55-74
4.1 The history and survey of 3D Printing……………………………………………………….…55
4.2 Design Principles and Tools………………………………………………………………….…58
4.3 Emerging Trends & Use Cases in 3D Printing………………………………………………….66
4.4 Introduction of Drones, Engineering Disciplines…………………………………………….…68
4.5 Multirotor Drone Assembly Course /Regulations and procedures for becoming a drone pilot...71
Unit 5: Future Trends……………………………………………………………………...…..75-85
5.1 Augmented Reality (AR) and Virtual Reality (VR)……………………………………………75
5.2 History, objective & global scenario of 5G Telecom…………………………………………...77
5.3 5G in India, Application and Use Cases………………………………………………………...79
5.4 Brain Computer Interface, Application, Modal and Global Market……………………………82
5.5 Brain Computer Interface and Human Brain…………………………………………………...84
UNIT-1
INTERNET OF THINGS
1.1 What is the Internet of Things? :
The Internet of Things (IoT) is the network of physical objects or "things" embedded with
electronics, software, sensors, and network connectivity, which enables these objects to collect and
exchange data.
IoT allows objects to be sensed and controlled remotely across existing network
infrastructure, creating opportunities for more direct integration between the physical world and
computer-based systems, and resulting in improved efficiency, accuracy, and economic benefit.
“Thing” in the Internet of Things
A thing in the internet of things can be a person with a heart monitor implant, a farm animal with
a biochip transponder, an automobile that has built-in sensors to alert the driver when tire pressure is
low or any other natural or man-made object.
These devices collect useful data with the help of various existing technologies and then
autonomously flow the data between other devices.
Examples
• Smart refrigerators
• Smart watches,
• Smart fire alarm
• Smart door lock
• Smart bicycle
• Medical sensors
• Fitness trackers
• Smart security system etc.
The most important features of IoT include artificial intelligence, connectivity, sensors, active
engagement, and small device use. A brief review of these features is given below −
• AI − IoT essentially makes virtually anything “smart”, meaning it enhances every aspect of
life with the power of data collection, artificial intelligence algorithms, and networks. This
can mean something as simple as enhancing your refrigerator and cabinets to detect when
milk and your favourite cereal run low, and to then place an order with your preferred grocer.
• Connectivity − New enabling technologies for networking, and specifically IoT networking,
mean networks are no longer exclusively tied to major providers. Networks can exist on a
much smaller and cheaper scale while still being practical. IoT creates these small networks
between its system devices.
• Sensors − IoT loses its distinction without sensors. They act as defining instruments which
transform IoT from a standard passive network of devices into an active system capable of
real-world integration.
• Small Devices − Devices, as predicted, have become smaller, cheaper, and more powerful
over time. IoT exploits purpose-built small devices to deliver its precision, scalability, and
versatility.
Let us have a look at how the evolution of IoT as a concept happened over a period of time along
with the timelines:
Year 1999: Kevin Ashton, co-founder of the Auto-ID (for Automatic Identification) Center at MIT
coined the term “Internet of things “. His definition of IoT was based on reinventing RFID as a
networking technology by linking objects to the internet using the RFID tag.
Year 1999: Device to Device (D2D) communication as a concept was coined by Bill Joy as part of
his “Six Webs” framework at the World Economic Forum.
Year 2000: LG Internet Digital DIOS, the first Internet-connected refrigerator in the world was
invented. The refrigerator used a LAN port for IP connectivity.
Year 2001: David Brock, co-director at the Auto-ID Centre, MIT, proposed a new object
identification scheme, the Electronic Product Code (EPC), instead of the conventional Universal
Product Code (UPC or ‘bar code’) for unique identification and tracking of objects throughout the
product life cycle using the infrastructure/internet.”
Year 2003: The “Project JXTA-C: Enabling a Web of Things” is published by Bernard Traversat and
team at the 36th Annual Hawaii International Conference.
According to them, the Project JXTA’s aim is to specify a standard set of protocols for ad hoc,
pervasive, peer-to-peer computing as a foundation of the upcoming Web of Things.
Year 2003: A special kind of network to connect many of the millions of tags that are already in the
world was launched at the McCormick Place conference centre.
The launch of electronic product code (EPC) network was attended by numerous delegates from
across the worlds of retail, technology and academia.
Year 2005: The faculty at the Interaction Design Institute Ivrea (IDII), Italy, invents a single-board
microcontroller to be used in interactive projects being developed their students.
Year 2008: Different industry stakeholders come together to form the IPSO Alliance to promote
connected devices. This was a big leap towards having the IoT implemented for large scale business
in real production setups.
2016 and Beyond: We have connected home, connected cars, IoT enabled manufacturing plants,
and IoT based solar trackers.
Year 2018: As of 2018, nearly half of all IoT (Internet of Things) devices were connected to WPAN
(Wireless Personal Area Networks), including Zigbee, Bluetooth, and Z-wave.
Year 2019: By 2019, the global IoT market will generate a revenue of $1.7T.
Year 2020: Of the 21.7 billion active connected devices worldwide, 11.7 billion (or 54%) will
be IoT device connections at the end of 2020.
“By 2025, it is expected that there will be more than 30 billion IoT connections, almost 4 IoT devices
per person on average.”
The advantages of IoT span across every area of lifestyle and business. Here is a list of some of the
advantages that IoT has to offer −
• Technology Optimization − The same technologies and data which improve the customer
experience also improve device use, and aid in more potent improvements to technology. IoT
unlocks a world of critical functional and field data.
• Reduced Waste − IoT makes areas of improvement clear. Current analytics give us
superficial insight, but IoT provides real-world information leading to more effective
management of resources.
• Enhanced Data Collection − Modern data collection suffers from its limitations and its
design for passive use. IoT breaks it out of those spaces, and places it exactly where humans
really want to go to analyse our world. It allows an accurate picture of everything.
• Efficient resource utilization: If we know the functionality and the way that how each device
work, we definitely increase the efficient resource utilization as well as monitor natural
resources.
• Minimize human effort: As the devices of IoT interact and communicate with each other
and do lot of task for us, then they minimize the human effort.
• Save time: As it reduces the human effort then it definitely saves out time. Time is the primary
factor which can save through IoT platform.
Though IoT delivers an impressive set of benefits, it also presents a significant set of challenges.
Here is a list of some its major issues −
• Privacy − The sophistication of IoT provides substantial personal data in extreme detail
without the user's active participation.
• Complexity − Some find IoT systems complicated in terms of design, deployment, and
maintenance given their use of multiple technologies and a large set of new enabling
technologies.
• Flexibility − Many are concerned about the flexibility of an IoT system to integrate easily
with another. They worry about finding themselves with several conflicting or locked
systems.
• Compliance − IoT, like any other technology in the realm of business, must comply with
regulations. Its complexity makes the issue of compliance seem incredibly challenging when
many consider standard software compliance a battle.
1.2 Sensors, their types and features
The most important hardware in IoT might be its sensors. These devices consist of energy modules,
power management modules, RF modules, and sensing modules. RF modules manage
communications through their signal processing, WiFi, ZigBee, Bluetooth, radio transceiver,
duplexer, and BAW.
The sensing module manages sensing through assorted active and passive measurement devices.
Here is a list of some of the measurement devices used in IoT –
Smoke sensor
A smoke sensor is a device that senses smoke (airborne particulates & gases), and it’s level.
Smoke sensors are extensively used by manufacturing industry, HVAC, buildings and
accommodation infra to detect fire and gas incidences. This serves to protect people working in
dangerous environments, as the whole system is much more effective in comparison to the older
ones.
• Optical smoke sensor (Photoelectric): Optical smoke sensor used the light scatter
principle trigger to occupants.
• Ionization smoke sensor: Ionization smoke sensor works on the principle of ionization,
kind of chemistry to detect molecules causing a trigger alarm.
IR sensors
An infrared sensor is a sensor which is used to sense certain characteristics of its surroundings by
either emitting or detecting infrared radiation. It is also capable of measuring the heat being
emitted by the objects.
Other common use includes home appliances & remote control, breath analysis, Infrared vision
(i.e. visualize heat leaks in electronics, monitor blood flow, art historians to see under layers of
paint), wearable electronics, optical communication, non-contact based temperature
measurements, automotive blind-angle detection.
Their usage does not end there, they are also a great tool for ensuring high-level security in your
home. Also, their application includes environment checks, as they can detect a variety of
chemicals and heat leaks. They are going to play an important role in the smart home industry, as
they have a wide-range of applications.
Level sensors
A sensor which is used to determine the level or amount of fluids, liquids or other substances that
flow in an open or closed system is called Level sensor.
Best use cases of level sensor is, fuel gauging & liquid levels in open or closed containers, sea
level monitoring & Tsunami warning, water reservoirs, medical equipment, compressors,
hydraulic reservoirs, machine tools, beverage and pharmaceutical processing, high or low -level
detection etc.
This helps better streamline their businesses, as sensors collect all the important data at all times.
With the use of these sensors, any product manager can precisely see how much liquid is ready
to be distributed and whether the manufacturing should be stepped up.
Image sensors
Image sensors are instruments which are used to convert optical images into electronic signals
for displaying or storing files electronically.
The major use of image sensor is found in digital camera & modules, medical imaging and night
vision equipment,thermal imaging devices, radar, sonar, media house, Biometric & IRIS devices.
Motion detection sensors
A motion detector is an electronic device which is used to detect the physical movement (motion)
in a given area and it transforms motion into an electric signal; motion of any object or motion of
human beings
Motion detection plays an important role in the security industry. Businesses utilize these sensors
in areas where no movement should be always detected, and it is easy to notice anybody’s
presence with these sensors installed.
These are primarily used for intrusion detection systems, automatics door control, boom barrier,
smart camera (i.e motion based capture/video recording), toll plaza, automatic parking systems,
automated sinks/toilet flusher, hand dryers, energy management systems(i.e. Automated
Lighting, AC, Fan, Appliances Control) etc.
Accelerometer sensors
Accelerometer is a transducer that is used to measure the physical or measurable acceleration
experienced by an object due to inertial forces and converts the mechanical motion into an
electrical output. It is defined as rate of change of velocity with respect to time
These sensors are now present in millions of devices, such as smartphones. Their uses involve
detection of vibrations, tilting and acceleration in general. This is great for monitoring your
driving fleet, or using a smart pedometer.
Gyroscope sensors
A sensor or device which is used to measure the angular rate or angular velocity is known as Gyro
sensors, Angular velocity is simply defined as a measurement of speed of rotation around an axis.
It is a device used primarily for navigation and measurement of angular and rotational velocity
in 3-axis directions. The most important application is monitoring the orientation of an object.
Their main applications are in car navigation systems, game controllers, cellular & camera
devices, consumer electronics, robotics control, drone & RC control helicopter or UAV control,
vehicle control/ADAS and many more.
There are several different kinds of gyro sensors which are selected by their working mechanism,
output type, power, sensing range and environmental conditions.
By making regular backups of files, by running anti-virus software and using a system with strong
passwords so that data access is restricted are the ways by which we can protect data from the
attacker.
Exploit Attack:
An exploit is any unethical or illegal attack in a form of software, blocks of data or a sequence of
commands. It takes benefit of security infirmities in an application, system or hardware. It usually
occurs with the goal of getting control of the system and steals information stored on the network.
By installing all software patches, security releases and all updates for your software are few
preventive measures against attack.
Although the internet of things and the industrial internet of things have many technologies in
common, including cloud platforms, sensors, connectivity, machine-to-machine communications and
data analytics, they are used for different purposes.
IoT applications connect devices across multiple verticals, including agriculture, healthcare,
enterprise, consumer and utilities, as well as government and cities. IoT devices include smart
appliances, fitness bands and other applications that generally don't create emergency situations if
something goes amiss.
IIoT applications, on the other hand, connect machines and devices in such industries as oil and gas,
utilities and manufacturing. System failures and downtime in IIoT deployments can result in high-
risk situations or even life-threatening situations. IIoT applications are also more concerned with
improving efficiency and improving health or safety, versus the user-centric nature of IoT
applications.
1.5.2 IIoT applications and examples
In a real-world IIoT deployment of smart robotics, ABB, a power and robotics firm, is using
connected sensors to monitor the maintenance needs of its robots to prompt repairs before parts break.
Likewise, commercial jetliner maker Airbus has launched what it calls the "factory of the
future," a digital manufacturing initiative to streamline operations and boost production. Airbus has
integrated sensors into machines and tools on the shop floor and outfitted employees with wearable
tech, e.g., industrial smart glasses, aimed at cutting down on errors and enhancing workplace safety.
Cloud computing offers platform independency, as the software is not required to be installed locally
on the PC. Hence, the Cloud Computing is making our business
Applications mobile and collaborative.
2.1.1 Deployment Models of Cloud-Computing
Deployment models define the type of access to the cloud, i.e., how the cloud is located? Cloud can
have any of the four types of access: Public, Private, Hybrid, and Community.
Public Cloud
The public cloud allows systems and services to be easily accessible to the general public. Public
cloud may be less secure because of its openness.
Platform as a Service or PaaS is essentially a cloud base where you can develop, test, and organize
the different applications for your business. Implementing PaaS simplifies the process of enterprise
software development. The virtual runtime environment provided by PaaS gives a favourable space
for developing and testing applications.
The entire resources offered in the form of servers, storage, and networking are manageable either by
the company or a platform provider. Google App Engine and AWS Elastic Beanstalk are two typical
examples of PaaS. PaaS is also subscription-based and gives you flexible pricing options depending
on your business requirements.
Some of the main characteristics of PAAS are:
• Scalability and auto-provisioning of the underlying infrastructure.
• Security and redundancy.
• Build and deployment tools for rapid application management and deployment.
• Integration with other infrastructure components such as web services, databases, and
LDAP.
• Multi-tenancy, platform service that can be used by many concurrent users.
• Logging, reporting, and code instrumentation.
• Management interfaces and/or API.
IaaS or Infrastructure as a Service is basically a virtual provision of computing resources over the
cloud. An IaaS cloud provider can give you the entire range of computing infrastructures such as
storage, servers, networking hardware alongside maintenance and support.
Businesses can opt for computing resources of their requirement without the need to install hardware
on their premises. Amazon Web Services, Microsoft Azure, and Google Compute Engine are some
of the leading IaaS cloud service providers.
iv. Storage as a Service (SAAS)
Storage as a Service is a business model in which a large company rents space in their storage
infrastructure to a smaller company or individual. The economy of scale in the service provider's
infrastructure theoretically allows them to provide storage much more cost-effectively than most
individuals or corporations can provide their own storage when the total cost of ownership is
considered. Storage as a Service is generally seen as a good alternative for a small or mid-sized
business that lacks the capital budget and/or technical personnel to implement and maintain their own
storage infrastructure.
v. Communications as a Service (CAAS)
Communications as a Service (CAAS) is an outsourced enterprise communications solution that can
be leased from a single vendor. Such communications can include voice over IP (VoIP or Internet
telephony), instant messaging (IM), collaboration and video conference applications using fixed and
mobile devices. The CAAS vendor is responsible for all hardware and software management and
offers guaranteed Quality of Service (QoS). CAAS allows businesses to selectively deploy
communications devices and modes on a pay-as-you-go, as-needed basis.
vi. Network as a Service (NAAS)
Network as a Service (NAAS), a framework that integrates current cloud computing offerings with
direct, yet secure, client access to the network infrastructure. NAAS is a new cloud computing model
in which the clients have access to additional computing resources collocated with switches and
routers. NAAS can include flexible and extended Virtual Private Network (VPN), bandwidth on
demand, custom routing, multicast protocols, security firewall, intrusion detection and prevention,
Wide Area Network (WAN), content monitoring and filtering, and antivirus.
vii. Monitoring as a Service (MAAS)
Monitoring-as-a-service (MAAS) is a framework that facilitates the deployment of monitoring
functionalities for various other services and applications within the cloud. The most common
application for MAAS is online state monitoring, which continuously tracks certain states of
applications, networks, systems, instances or any element that may be deployable within the cloud.
MAAS makes it easier for users to deploy state monitoring at different levels of Cloud services.
• Compute
• Storage databases
• Data management
• Migration
• Hybrid cloud
• Networking
• Development tools
• Management
• Monitoring
• Security
• Governance
• Analytics
• Mobile development
Amazon Web Services provides services from dozens of data centers spread across availability
zones (AZs) in regions across the world. An AZ is a location that contains multiple physical data
centers. A region is a collection of AZs in geographic proximity connected by low-latency network
links.
A business will choose one or multiple availability zones for a variety of reasons, such as compliance
and proximity to end customers. For example, an AWS customer can spin up virtual machines (VMs)
and replicate data in different AZs to achieve a highly reliable infrastructure that is resistant to failures
of individual servers or an entire data center.
Amazon Elastic Compute Cloud (EC2) is a service that provides virtual servers -- called EC2
instances -- for compute capacity. The EC2 service offers dozens of instance types with varying
capacities and sizes, tailored to specific workload types and applications, such as memory-intensive
and accelerated-computing jobs. AWS also provides an Auto Scaling tool to dynamically scale
capacity to maintain instance health and performance.
Storage
Amazon Simple Storage Service (S3) provides scalable object storage for data backup, collection and
analytics. An IT professional stores data and files as S3 objects -- which can range up to 5 gigabytes
(GB) -- inside S3 buckets to keep them organized. A business can save money with S3 through its
Infrequent Access storage tier or by using Amazon Glacier for long-term cold storage.
Amazon Elastic Block Store provides block-level storage volumes for persistent data storage when
using EC2 instances. Amazon Elastic File System offers managed cloud-based file storage.
A business can also migrate data to the cloud via storage transport devices, such as AWS
Snowball and Snowmobile, or use AWS Storage Gateway to enable on-premises apps to access cloud
data.
Databases, data management
The Amazon Relational Database Service -- which includes options for Oracle, SQL Server,
PostgreSQL, MySQL, MariaDB and a proprietary high-performance database called Amazon Aurora
-- provides a relational database management system for AWS users. AWS also offers
managed NoSQL databases through Amazon DynamoDB.
An AWS customer can use Amazon ElastiCache and DynamoDB Accelerator as in-memory and real-
time data caches for applications. Amazon Redshift offers a data warehouse, which makes it easier
for data analysts to perform business intelligence (BI) tasks.
Migration, hybrid cloud
AWS includes various tools and services designed to help users migrate applications, databases,
servers and data onto its public cloud. The AWS Migration Hub provides a location to monitor and
manage migrations from on premises to the cloud. Once in the cloud, EC2 Systems Manager helps
an IT team configure on-premises servers and AWS instances.
Amazon also has partnerships with several technology vendors that ease hybrid cloud
deployments. VMware Cloud on AWS brings software-defined data center technology from VMware
to the AWS cloud. Red Hat Enterprise Linux for Amazon EC2 is the product of another partnership,
extending Red Hat's operating system to the AWS cloud.
Networking
An Amazon Virtual Private Cloud (Amazon VPC) gives an administrator control over a virtual
network to use an isolated section of the AWS cloud. AWS automatically provisions new resources
within a VPC for extra protection.
Admins can balance network traffic with the Elastic Load Balancing (ELB) service, which includes
the Application Load Balancer and Network Load Balancer. AWS also provides a domain name
system called Amazon Route 53 that routes end users to applications.
An IT professional can establish a dedicated connection from an on-premises data center to the AWS
cloud via AWS Direct Connect.
Developer tools
A developer can take advantage of AWS command-line tools and software development kits (SDKs)
to deploy and manage applications and services. This includes:
• The AWS Command Line Interface, which is Amazon's proprietary code interface.
• A developer can use AWS Tools for Powershell to manage cloud services from Windows
environments.
• Developers can use AWS Serverless Application Model to simulate an AWS environment
to test Lambda functions.
AWS SDKs are available for a variety of platforms and programming languages, including Java,
PHP, Python, Node.js, Ruby, C++, Android and iOS.
Amazon API Gateway enables a development team to create, manage and monitor custom application
program interfaces (APIs) that let applications access data or functionality from back-end services.
API Gateway manages thousands of concurrent API calls at once.
AWS also provides a packaged media transcoding service -- Amazon Elastic Transcoder -- and a
service that visualizes workflows for microservices-based applications -- AWS Step Functions.
A development team can also create continuous integration and continuous delivery pipelines with
services like:
• AWS CodePipeline
• AWS CodeBuild
• AWS CodeDeploy
• AWS CodeStar
A developer can also store code in Git repositories with AWS CodeCommit and evaluate the
performance of microservices-based applications with AWS X-Ray.
Management and monitoring
An admin can manage and track cloud resource configuration via AWS Config and AWS Config
Rules. Those tools, along with AWS Trusted Advisor, can help an IT team avoid improperly
configured and needlessly expensive cloud resource deployments.
AWS provides several automation tools in its portfolio. An admin can automate infrastructure
provisioning via AWS CloudFormation templates, and also use AWS OpsWorks and Chef to
automate infrastructure and system configurations.
An AWS customer can monitor resource and application health with Amazon CloudWatch and the
AWS Personal Health Dashboard, as well as use AWS CloudTrail to retain user activity and API
calls for auditing.
Security and governance
AWS provides a range of services for cloud security, including AWS Identity and Access
Management, which allows admins to define and manage user access to resources. An admin can also
create a user directory with Amazon Cloud Directory, or connect cloud resources to an existing
Microsoft Active Directory with the AWS Directory Service. Additionally, the AWS
Organizations service enables a business to establish and manage policies for multiple AWS
accounts.
Amazon Web Services has also introduced tools that automatically assess potential security
risks. Amazon Inspector analyzes an AWS environment for vulnerabilities that might impact security
and compliance. Amazon Macie uses machine learning (ML) technology to protect sensitive cloud
data.
AWS also includes tools and services that provide software- and hardware-based encryption, protect
against DDoS attacks, provision Secure Sockets Layer (SSL) and Transport Layer Security (TLS)
certificates and filter potentially harmful traffic to web applications.
The AWS Management Console is a browser-based graphical user interface (GUI) for AWS. The
Management Console can be used to manage resources in cloud computing, cloud storage and
security credentials. The AWS Console interfaces with all AWS resources.
Big data management and analytics
AWS includes a variety of big data analytics and application services. This includes:
• Amazon Elastic MapReduce, which offers a Hadoop framework to process large amounts
of data.
• Amazon Kinesis, which provides several tools to process and analyze streaming data.
• AWS Glue, which is a service that handles extract, transform and load jobs.
AWS offers a range of AI model development and delivery platforms, as well as packaged AI-based
applications. The Amazon AI suite of tools includes:
With AWS Deep Learning Amazon Machine Images (AMIs), developers can create and train custom
AI models with clusters of graphics processing units (GPUs) or compute-optimized instances. AWS
also includes deep learning development frameworks for MXNet and TensorFlow.
On the consumer side, AWS technologies power the Alexa Voice Services, and a developer can use
the Alexa Skills Kit to build voice-based apps for Echo devices.
Mobile development
The AWS Mobile Hub offers a collection of tools and services for mobile app developers, including
the AWS Mobile SDK, which provides code samples and libraries.
A mobile app developer can also use Amazon Cognito to manage user access to mobile apps, as well
as Amazon Pinpoint to send push notifications to application end users and then analyze the
effectiveness of those communications.
Messages and notifications
AWS messaging services provide core communication for users and applications. Amazon Simple
Queue Service (SQS) is a managed message queue that sends, stores and receives messages between
components of distributed applications to ensure that the parts of an application work as intended.
Amazon Simple Notification Service (SNS) enables a business to send publish/subscribe messages
to endpoints, such as end users or services. SNS includes a mobile messaging feature that enables
push messaging to mobile devices. Amazon Simple Email Service (SES) provides a platform for IT
professionals and marketers to send and receive emails.
AR & VR (Augmented reality and virtual reality)
AWS offers augmented reality (AR) and virtual reality (VR) development tools through the Amazon
Sumerian service. Amazon Sumerian allows users to create AR and VR applications without needing
to know programming or create 3D graphics. The service also enables users to test and publish
applications in-browser. Amazon Sumerian can be used in:
• 3D web applications
• Marketing
• Online education
• Manufacturing
• Training simulations
• Gaming
Game development
AWS can also be used for game development. Large game developing companies, such as Ubisoft,
will use AWS services for their games, like For Honor. AWS can provide services for each part of a
game's lifecycle.
For example, AWS will provide a developer back-end services, analytics and developer tools.
Developer tools should help aid developers in making their game, while back-end services might be
able to help with building, deploying or scaling a developer's platform. Analytics might help
developers better know their customers and how they play the game. Developers can also store data,
or host game data on AWS servers.
Internet of Things
AWS also has a variety of services that enable the internet of things (IoT) deployments. The AWS
IoT service provides a back-end platform to manage IoT devices and data ingestion to other AWS
storage and database services. The AWS IoT Button provides hardware for limited IoT functionality
and AWS Greengrass brings AWS compute capabilities to IoT devices.
Other services
Amazon Web Services has a range of business productivity SaaS options, including:
• The Amazon Chime service enables online video meetings, calls and text-based chats
across devices.
Desktop and streaming application services include Amazon WorkSpaces, a remote desktop-as-a-
service platform (DaaS), and Amazon AppStream, a service that lets a developer stream a desktop
application from AWS to an end user's web browser.
This distribution of resources provides several benefits, including redundancy in case of failure and
reduced latency by locating resources closer to clients. This distribution also introduces some rules
about how resources can be used together.
• Less Disruption When Users Adopt New Functionality: Rather than large
continuous stream.
• Employees Can Work from Anywhere: They can gain full access to
information across devices from anywhere in the world through web-based apps
• Google Cloud Allows Quick Collaboration: Many users can contribute to and
access projects at the same time as data is stored in the cloud instead of their
computers.
computers that may get compromised after a user stops using web-based apps on
the cloud.
• Customers get Higher Uptime and Reliability: If a data center is not available
for some reason, the system immediately falls back on the secondary center
• Control and Flexibility Available to Users: They have control over technology
and have ownership over their data in Google apps. If they decide to not use the
service anymore, they can get their data out of Google cloud.
Products offered by Google Cloud are categorized into four categories: Compute, Storage,
Big Data, and Services.
Compute: It further consists of two sub-categories:
i. Compute Engine
It is Google’s infrastructure-as-a-service (IaaS). Through this, Google’s infrastructure can be used
to run workloads on a large scale on virtual machines. You can select a virtual computer to fit your
needs and enjoy the consistency and performance of Google’s network worldwide. You have to pay
only for what you use since the billing is per minute.
Features
• Security and Compliance
• Easy and Fast Provisioning
• Balancing of Loads
• High-Performance Virtual Computers
Storage
It further consists of three sub-categories:
i. Cloud SQL
Cloud SQL is a relational MySQL database that helps manage and store data. To ensure
performance and availability, Google takes care of database management, patch management, and
replication.
Features
• Completely Managed
• Easy to Control
• Simpler Migration Without Lock-In
• Robustness, Accessibility, Security
• Pay Per Use and Package Charging
• Standard Infrastructure
ii. Cloud Storage
It is an object storage service that is highly available and durable. Users can quickly access data
from their app from anywhere, on account of edge-caching on a global scale. Google presents a
simple application programming interface (API), provides a robust service-level agreement, and
runs versioning to let you handle data programmatically.
Features
• Variable Access
• Storage of Objects with Feature-Rich API
• Adjustable and Viable Pricing
• Safe and Secure
iii. Cloud Datastore
It provides a database, which is schemaless, NoSQL, and managed, for storage of non-relational
data. SQL-like queries are supported well, in addition to transactions, and the data store also scales
as required.
Features
• Access to Data Anywhere
• Local Tools for Development
• In-built Redundancy
• ACID Transactions
• Scaling Automatically with Users
• Database Management
• SQL-Like Querying and Schemaless Access
Big Data
BigQuery analyzes big data in the cloud. It can process datasets containing several terabytes in a
few seconds and run quick SQL-like queries. It even provides insights in real-time and is scalable
and straightforward to use.
Features
• Suitable Interface
• Economical Big Data
• Easy Import of Data
• Queries Executed in Background
Google also provides developer tools such as Google Plugin for Eclipse, Google Cloud
SDK, Android Studio, Cloud Playground, and Push-to-Deploy, along with the cloud
platform.
Services
Javascript, Android, and iOS clients can access your code through RESTful services from your
system with Cloud Endpoints. The front-end wiring can become smooth, and the generation of
client libraries can generate automatically. Client key management, OAuth 2.0 support, and
protection against denial of service are part of the significant in-built infrastructure.
Features
• Integration of client-side becomes flexible
• Client-server maintenance is low
• App engine infrastructure can be extended
• Multiple clients handling with a single tool
• Capitaless: We don’t have to worry about the capital as Azure cuts out the high cost of
hardware. You simply pay as you go and enjoy a subscription-based model that’s kind to your
cash flow. Also, to set up an Azure account is very easy. You simply register in Azure Portal
and select your required subscription and get going.
• Less Operational Cost: Azure has low operational cost because it runs on its own servers
whose only job is to make the cloud functional and bug-free, it’s usually a whole lot more
reliable than your own, on-location server.
• Cost Effective: If we set up a server on our own, we need to hire a tech support team to monitor
them and make sure things are working fine. Also, there might be a situation where the tech
support team is taking too much time to solve the issue incurred in the server. So, in this regard
is way too pocket-friendly.
• Easy Back Up and Recovery options: Azure keep backups of all your valuable data. In disaster
situations, you can recover all your data in a single click without your business getting affected.
Cloud-based backup and recovery solutions save time, avoid large up-front investment and roll
up third-party expertise as part of the deal.
• Easy to implement: It is very easy to implement your business models in Azure. With a couple
of on-click activities, you are good to go. Even there are several tutorials to make you learn and
deploy faster.
• Better Security: Azure provides more security than local servers. Be carefree about your
critical data and business applications. As it stays safe in the Azure Cloud. Even, in natural
disasters, where the resources can be harmed, Azure is a rescue. The cloud is always on.
• Work from anywhere: Azure gives you the freedom to work from anywhere and everywhere.
It just requires a network connection and credentials. And with most serious Azure cloud
services offering mobile apps, you’re not restricted to which device you’ve got to hand.
• Increased collaboration: With Azure, teams can access, edit and share documents anytime,
from anywhere. They can work and achieve future goals hand in hand. Another advantage of
the Azure is that it preserves records of activity and data. Timestamps are one example of the
Azure’s record keeping. Timestamps improve team collaboration by establishing transparency
and increasing accountability.
2.4.1 Microsoft Azure Services
Some following are the services of Microsoft Azure offers:
1. Compute: Includes Virtual Machines, Virtual Machine Scale Sets, Functions for serverless
computing, Batch for containerized batch workloads, Service Fabric for microservices and
container orchestration, and Cloud Services for building cloud-based apps and APIs.
2. Networking: With Azure you can use variety of networking tools, like the Virtual Network,
which can connect to on-premise data centers; Load Balancer; Application Gateway; VPN
Gateway; Azure DNS for domain hosting, Content Delivery Network, Traffic Manager,
ExpressRoute dedicated private network fiber connections; and Network Watcher monitoring
and diagnostics
3. Storage: Includes Blob, Queue, File and Disk Storage, as well as a Data Lake Store, Backup
and Site Recovery, among others.
4. Web + Mobile: Creating Web + Mobile applications is very easy as it includes several services
for building and deploying applications.
5. Containers: Azure has a property which includes Container Service, which supports
Kubernetes, DC/OS or Docker Swarm, and Container Registry, as well as tools for
microservices.
6. Databases: Azure has also includes several SQL-based databases and related tools.
7. Data + Analytics: Azure has some big data tools like HDInsight for Hadoop Spark, R Server,
HBase and Storm clusters
8. AI + Cognitive Services: With Azure developing applications with artificial intelligence
capabilities, like the Computer Vision API, Face API, Bing Web Search, Video Indexer,
Language Understanding Intelligent.
9. Internet of Things: Includes IoT Hub and IoT Edge services that can be combined with a
variety of machine learning, analytics, and communications services.
10. Security + Identity: Includes Security Center, Azure Active Directory, Key Vault and Multi-
Factor Authentication Services.
2.4.2 Difference between AWS (Amazon Web Services), Google Cloud and Azure
Table 2.1 AWS vs Google Cloud vs Azure
2.5 Vendor Offering – IBM
IBM Cloud is a suite of cloud computing services from IBM that offers both platform as a service
(PaaS) and infrastructure as a service (IaaS). With IBM Cloud IaaS, organizations can deploy and
access virtualized IT resources -- such as compute power, storage and networking -- over the internet.
For compute, organizations can choose between bare-metal or virtual servers.
With IBM Cloud PaaS -- which is based on the open source cloud platform Cloud Foundry --
developers can use IBM services to create, manage, run and deploy various types of applications for
the public cloud, as well as for local or on-premises environments. IBM Cloud supports various
programming languages, such as Java, Node.js, PHP and Python and extends to support other
languages. IBM Cloud products and services IBM Cloud platform supports access to other IBM tools
and services -- including IBM Watson and IBM Cloud Functions for serverless computing -- as well
as those from third-party vendors.
The IBM Cloud Catalog lists over 170 services across categories, including:
• Compute -- Offers various compute resources, including bare-metal servers, virtual servers,
serverless computing and containers, on which enterprises can host their workloads;
• Network -- Provides cloud networking services, such as a load balancer, a content delivery
network (CDN), virtual private network (VPN) tunnels and firewalls;
• Storage -- Offers object, block and file storage for cloud data;
• Management -- Provides tools to manage and monitor cloud deployments, such as those for log
analysis, automation and Infrastructure as Code (IaC);
• Security -- Includes services for activity tracking, identity and access management and
authentication;
• Data management -- Provides SQL and NoSQL databases, as well as data querying and migration
tools;
• Analytics -- Offers data science tools such as Apache Spark, Apache Hadoop and IBM Watson
Machine Learning, as well as analytics services for streaming data;
• Artificial Intelligence (AI) -- Uses IBM Watson to deliver services such as machine learning,
natural language processing and visual recognition;
• Internet of things (IoT) -- Includes the IBM IoT Platform, which provides services that connect
and manage IoT devices, and analyzes the data they produce;
• Mobile -- Enables a development team to build and monitor mobile applications and their back-
end components;
• Developer tools -- Includes a command-line interface (CLI), as well as a set of tools for
continuous delivery, continuous release and application pipelines;
• Integration -- Offers services to integrate cloud and on-premises systems, or various applications,
such as API Connect, App Connect and IBM Secure Gateway;
• Migration -- Provides tools to migrate apps to the cloud, such as IBM Lift CLI and Cloud Mass
Data Migration;
Questions:
1. What is cloud computing?
2. What are the benefits of cloud computing?
3. What are the different layers in cloud computing? Explain working of them.
4. What do you mean by software as a service (SaaS)?
5. What is the platform as a service (PaaS)?
6. Explain Infrastructure as s Service (IaaS)?
7. Write short notes on following
a) AWS
b) Google
c) Microsoft
8. List the name of vendors offering Cloud Services.
9. Enlist the real-life scenarios where Cloud- Computing services are being used.
UNIT-3
BLOCKCHAIN
3.1 What is Blockchain? Fundamentals:
A blockchain is a growing list of records, called blocks, which are linked using cryptography. Each
block contains a cryptographic hash of the previous block, a timestamp, and transaction data.
Blockchain is the backbone Technology of Digital Cryptocurrency BitCoin. The blockchain is a
distributed database of records of all transactions or digital event that have been executed and shared
among participating parties. Each transaction verified by the majority of participants of the system.
It contains every single record of each transaction. BitCoin is the most popular cryptocurrency an
example of the blockchain. Blockchain Technology first came to light when a person or Group of
individuals name ‘Satoshi Nakamoto’ published a white paper on “BitCoin: A peer to peer electronic
cash system” in 2008. Blockchain Technology Records Transaction in Digital Ledger which is
distributed over the Network thus making it incorruptible. Anything of value like Land Assets, Cars,
etc. can be recorded on Blockchain as a Transaction.
Blockchain technology has been garnering great hype recently. It gained popularity after the
introduction of Bitcoin in 2009 by the person or group of people by the pseudonym Satoshi
Nakamoto. Many people confuse and believe blockchain to be bitcoin. But, bitcoin is one application
of the blockchain technology. There are many other applications and use cases that can be solved
using blockchain other than just payment systems.
The Process
Blockchain ensures security in this network by using the concept of ‘Key.’ If you use a set of
encrypted keys, you’ll get a unique identification that no one can break. You’ll get a private and
public key, using this combination you’ll get a unique identity. Others will use your public key to
find you on the network. With the help of your private key, you’ll be able to sign any action or
authorize transactions associated with your public key.
If you think about cryptocurrencies, then the public key will get used as your wallet address, and
you’ll use the private key to withdraw, send or buy digital money. That’s why it’s essential for you
to keep this key safe. If someone gets their hands on your private key, then he/she could access all
your digital assets and misuse it.
So, every time you send something over the network, you’ll authorize it. It might be something like
“Todd is sending Jamie 2 BTC”, this will include the public key of Jamie to locate him and Todd’s
public and private key to encrypt the transaction.
After the transaction, the system nodes will verify it, and it’ll get added to the ledger with the help of
a unique id and time frame. In short, every transaction will have the same features, a public key,
digital signature, unique ID and the timestamp.
3.3 Cryptocurrency:
A cryptocurrency (or crypto currency) is a digital asset designed to work as a medium of exchange
wherein individual coin ownership records are stored in a ledger existing in a form of computerized
database using strong cryptography to secure transaction records, to control the creation of additional
coins, and to verify the transfer of coin ownership.
Cryptocurrencies are usually built using blockchain technology. Blockchain describes the way
transactions are recorded into "blocks" and time stamped. It's a fairly complex, technical process, but
the result is a digital ledger of cryptocurrency transactions that's hard for hackers to tamper with.
In addition, transactions require a two-factor authentication process. For instance, you might be asked
to enter a username and password to start a transaction. Then, you might have to enter an
authentication code that's sent via text to your personal cell phone.
While securities are in place, that doesn't mean cryptocurrencies are un-hackable. In fact, several
high-dollar hacks have cost cryptocurrency startups heavily. Hackers hit Coincheck to the tune of
$534 million and BitGrail for $195 million in 2018. That made them two of the biggest
cryptocurrency hacks of 2018, according to Investopedia.
Tips to Invest in Cryptocurrency Safely
Investments are always risky, but some experts say cryptocurrency is one of the riskier investment
choices out there, according to Consumer Reports. However, digital currencies are also some of the
hottest commodities. Earlier this year, CNBC forecasted that the cryptocurrency market is expected
to reach a value of $1 trillion by the end of 2018. If you're planning to invest in cryptocurrencies,
these tips can help you make educated choices.
1. Research Exchanges
Before you invest one dollar, learn about cryptocurrency exchanges. These platforms provide the
means to buy and sell digital currencies, but there are 500 exchanges to choose from, according to
Bitcoin.com. Do your research, read reviews and talk with more experienced investors before moving
forward.
2. Know How to Store Your Digital Currency
If you buy cryptocurrency, you have to store it. You can store it on an exchange or in a digital "wallet,"
for example one of the crypto wallets described in our Blog post Which cryptocurrency wallet to
choose. While there are many different kinds of wallets, each has its own benefits, technical
requirements and security. As with exchanges, you should investigate your storage choices before
investing.
3. Diversify Your Investments
Diversification is a key to any good investment strategy, and it holds true when you're investing in
cryptocurrency too. Don't put all of your money in Bitcoin, for example, just because that's the name
you know. There are thousands of options, and it's best to spread your investment around to several
currencies.
4. Prepare for Volatility
The cryptocurrency market is a volatile one, so be prepared for ups and downs. You'll see dramatic
swings in prices. If your investment portfolio or mental wellbeing can't handle that, cryptocurrency
might not be a wise choice for you.
Cryptocurrency is all the rage right now, but remember, it's still in its infancy. Investing in something
that's new comes with challenges, so be prepared. If you plan to participate, do your research and
invest conservatively to start.
3.4 Smart- Contracts:
Smart contracts are lines of code that are stored on a blockchain and automatically execute when
predetermined terms and conditions are met. At the most basic level, they are programs that run as
they've been set up to run by the people who developed them.
A smart contract is an
The transactions that happen The transactions only
agreement between two
in a smart contract happen when the
people in the form of
are processed by the conditions in the
computer code. They run
blockchain, which means agreement are met — there
on the blockchain, so they
they can be sent is no third party, so there are
are stored on a public
automatically without a third no issues with trust.
database and cannot be
party. This means there is no
changed.
one to rely on!
1. Speed and accuracy: Smart contracts are digital and automated, so you won’t have to spend
time processing paperwork or reconciling and correcting the errors that are often written into
documents that have been filled manually. Computer code is also more exact than the legalese
that traditional contracts are written in.
2. Trust: Smart contracts automatically execute transactions following predetermined rules, and
the encrypted records of those transactions are shared across participants. Thus, nobody has
to question whether information has been altered for personal benefit.
3. Security: Blockchain transaction records are encrypted, and that makes them very hard to
hack. Because each individual record is connected to previous and subsequent records on a
distributed ledger, the whole chain would need to be altered to change a single record.
4. Savings: Smart contracts remove the need for intermediaries because participants can trust
the visible data and the technology to properly execute the transaction. There is no need for
an extra person to validate and verify the terms of an agreement because it is built into the
code.
Questions:
1. What is Block-Chain. Define the fundamentals of Block-Chain technology.
2. Give the principle and technologies used in Block-Chain.
3. Define smart contract and cryptocurrencies with examples.
4. Give the various applications of Block-Chain.
5. Write the Use-cases of Block Chain Technology
6. When was blockchain first created?
7. How does blockchain support bitcoin?
8. What does a decentralised blockchain mean?
9. Does the decentralised nature of the blockchain make it more secure?
10. But there have been many reports of bitcoins being stolen, so it is possible to hack
the blockchain, right?
UNIT-4
DIGITAL MANUFACTURING: 3D PRINTING & DRONES
4.1 The history and survey of 3D Printing:
• 3D printing or additive manufacturing is a process of making three dimensional solid objects
from a digital file.
• The creation of a 3D printed object is achieved using additive processes. In an additive process
an object is created by laying down successive layers of material until the object is created.
Each of these layers can be seen as a thinly sliced cross-section of the object.
• 3D printing is the opposite of subtractive manufacturing which is cutting out / hollowing out
a piece of metal or plastic with for instance a milling machine.
• 3D printing enables you to produce complex shapes using less material than traditional
manufacturing methods.
4.1.1 History of 3D Printing
1981: Hideo Kodama of the Nagoya Municipal Industrial Research Institute develops a rapid-
prototyping system that uses photopolymers and a layer-by-layer approach to build a physical model.
1987: Charles (Chuck) Hall invents and patents stereolithography, also known as SLA.
Stereolithography “is a resin 3D printing or additive manufacturing process that uses a vat of
photopolymer resin that can be cured.” He co-founds the 3D printing company 3D Systems the same
year
1987: 3D Systems commercializes the first 3D printer, the SLA-1.
1988: Carl Deckard of the University of Texas patents selective laser sintering (SLS). Selective laser
sintering is an additive manufacturing process that uses a laser to fuse and build powders into a 3D
model.
1989: S. Scott Crump and Lisa Crump invent and patent Fused Deposition Modeling (FDM). They
also founded the 3D printing company Stratasys the same year.
1992 : DTM creates the first selective laser sintering (SLS) machine.
1999: Scientists at the Wake Forest Institute for Regenerative Medicine 3D print the structure of a
human bladder.
2004: The RepRap Project launches. The RepRap Project is an open-source 3D printing project, while
the RepRap is a free desktop 3D printer that can self-replicate by printing its own parts. Both
initiatives made 3D printing more readily available.
2009: FDM patents expire and entered the public domain, driving the cost of FDM printers down.
2010: Bioprinting company Organovo creates the first 3D printed blood vessel.
2014: The first 3D printed car, the Strati, is created.
2016: The Chinese National High-Tech Research and Development Program creates 3D printed vein-
tissue.
2018: MIT discovers a way to 3D print glass.
A typical 3D printer is very much like an inkjet printer operated from a computer. It builds up a 3D
model one layer at a time, from the bottom upward, by repeatedly printing over the same area in a
method known as fused depositional modeling (FDM).
Working entirely automatically, the printer creates a model over a period of hours by turning
a 3D CAD drawing into lots of two-dimensional, cross-sectional layers—effectively separate 2D
prints that sit one on top of another, but without the paper in between. Instead of using ink, which
would never build up to much volume, the printer deposits layers of molten plastic or powder and
fuses them together (and to the existing structure) with adhesive or ultraviolet light.
The stereolithography method has proven to provide a very high level of detailing and finishing on
the surface of the objects created. The entire printing process takes places in the chemical liquid and
the finishing involves separating the solidified 3D object from the pool of chemicals in a single flow.
This was the first ever method of 3D printing that was invented in 1983 by Charles Hull.
3. Fused Deposition Modeling (FDM): The third technique, known as ‘Fused Deposition
Modelling’, is based on the use of molten material that becomes solid as it’s layered on to the print
surface. As the molten material is injected from the printer head, it creates the successive layers of
the 3D design. This process continues until the product is fully created. This technique also uses food-
based molten material such as cheese and chocolate to create complex-shaped food items. This is one
of the most affordable types of 3D printers available in the market.
These types of printers use ABS and PLA plastics as well as biodegradable polymers which are
organic in nature. The plastic additives used can also be dispensed as filaments from spools in a
slightly augmented type of this printer. This technique is called ‘Fused Filament Fabrication’ since
the additive source is in the form of spooled filaments of plastic.
Printers of this design are capable of employing nearly any material that has a creamy viscosity,
including materials such as clay, silicone, chocolate, cheese, frosting, cement and certain metals. The
heating necessary for different additives is either done through the ejection nozzle or the additive
storage unit based on the required melting point.
4. Selective Laser Sintering (SLS): The fourth method uses powdered materials that are fused
together using either heat or adhesives between layers to achieve the desired 3D shape. This method
is called ‘Selective Laser Sintering’ (SLS) and is a combination of traditional 3D printing and
powered lasers, (instead of UV light). By augmenting the stereolithographic method, SLS replaces
the chemical pool with powdered base material and the UV light with a powered laser.
Combining both the methods makes it possible for SLS printers to use not only all plastics but also
ceramics and metals to fabricate objects. It has proven to be a cost-effective alternative to other 3D
printers in specialised cases which call for the use of materials such as polystyrene, nylon, glass,
metals, and other exotic additives. The powdered material from these sources is easy to fuse using a
laser and once the 3D printing project is completed, the surplus material is left available for reuse. It
also removes the need for the use of supports and makes the overall process much more efficient.
If you are new to 3D printing the below list should give you a good starting point in case you want
to compile an accessories kit. While you don't need to go and buy all of these tools at once, I am
convinced that over time you'll amass a tool set that will look very similar to the below.
1. Masking Tape
Masking tape is the most basic and most widely used surface covering for print beds. Adding masking
tape to the print bed is a simple way to help the 3D printed objects to adhere better. Additionally, the
tape also makes removing the finished print easier and it protects your print bed from scratches.
2. Kapton Tape
Kapton tape is a polyimide adhesive tape that is used an alternative material to cover print beds.
Contrary to masking tape however, Kapton tape has been specifically designed to withstand high
temperatures (up to 400°C).
Kapton tape is used to improve 3D print adhesion and to prevent warping but mostly in combination
with ABS filament. When printing with PLA, it is cheaper to stick with masking tape as a roll of
Kapton is about twice as expensive.
Due to its heat-resistant properties Kapton tape is also commonly used to secure 3D printer
components in the area of the hot end. I always keep a roll at hand, be it for ABS prints or for attaching
something to the heated print bed or hot end.
3. Glue Stick
Glue sticks come in handy when you are trying to improve 3D print adhesion: just cover your print
bed in water soluble glue stick and the adhesion of the 3D prints will improve instantly. The glue
stick can be applied on top of blue/Kapton tape or even directly to glass in case your 3D printer uses
a glass print bed.
I personally prefer the glue stick over hair spray (an alternative often used to combat adhesion issues)
since it can be applied precisely without having to worry about covering the gantry or moving parts
in residual spray.
4. Digital Caliper
In the context of 3D printing, a caliper will have many applications: you can use it to check the
precision of your prints as well as you can use it to dimension parts that you want to replicate
in CAD software.
3D printer filament, though advertised as being 3mm or 1.75 mm, rarely turns out to be manufactured
to these exact measurements. Here the caliper comes in handy again: measure the filament at a few
different positions, average your readings and if necessary adjust the filament diameter in your slicing
software.
5. A Set of Tweezers
I always have my tweezers handy when I launch a 3D print. I use them frequently to plug any oozing
filament from the extruder nozzle just before the printer starts printing (without burning my fingers).
The tweezers also come in handy when cleaning up a 3D print. I'd recommend buying a set of
tweezers that includes various shapes and sizes such that you are covered for all jobs.
6. Palette Knives
Sometimes you are faced with a 3D print that sticks so well to your print bed that you can't remove it
by hand. In those cases I use a palette knife to try and get under the print and to carefully pry it loose
from the print bed.
Over time, I have build up quite a collection of palette knives. In case you are just starting out, I'd
recommend that you get at least a flexible and a stiffer one. I particularly like the stainless steel
scrapers by Titan as they have a tapered tip that really helps to get under the base of a 3D print. Titan
offers a set of 3 blades ranging from rigid to flexible, that should be enough to get you started.
You'll need knives to post process your prints: 3D prints rarely turn out perfect and you may have to
remove plastic blobs or filament strings that have appeared during the printing process. A knife with
an array of exchangeable blades, such as an X-Acto knife, will serve you well. And while you are at
it, make sure to get a cutting mat as well, you won't regret it.
8. Sandpaper
A good selection of sandpaper in various grits will come in handy when post processing your 3D
prints. I keep a selection from coarse (220 grit) to fine (1000 grit). The grid of quality sandpaper tends
to wear off slower, so stick with one of the well-known brands such as 3M or similar.
Fig 4.8 Sandpaper
9. Pliers
A set of pliers will have various uses, be it to remove hard sticking prints or to fix something on your
3D printer. I recommend that you get quality pliers with rubberized slip-resistant grips. No matter
what brand you end up buying, the absolute must-haves are needle nose pliers and wire cutting
pliers. The wire cutting pliers are particularly useful to snip away support material or when trimming
filament.
In all likelihood, you already own some screwdrivers and hex keys. If you don't, make sure to buy
some as you will need to periodically re-tighten the screws of the gantry and stepper motors of your
3D printer. Hex nuts and bolts are widely used in the assembly of 3D printers so it pays to have a
good set of hex key screwdrivers and hex key wrenches.
Fig 4.10 Screw Drivers & Hex Key Screw Drivers
11. Desiccant
Most 3D printer filament absorbs water over time, resulting in filament degradation that will
eventually lead to complications during printing. Therefore, I do highly recommend that you store
your filament in a sealed container.
I keep a set of permanent markers/sharpies that I use to mark 3D prints, especially when running
multiple prints of the same model but with different slicer settings. I note down the sequence and
settings for each print and mark the finished objects accordingly, otherwise it becomes difficult tell
them apart later on.
Multi Rotor drones are the most common types of drones which are used by professionals and
hobbyists alike. They are used for most common applications like aerial photography, aerial video
surveillance etc.
Multi-rotor drones can be further classified based on the number of rotors on the platform. They
are Tricopter (3 rotors), Quadcopter (4 rotors), Hexacopter (6 rotors) and Octocopter (8 rotors).
Out of these, Quadcopters are the most popular and widely used variant.
Fixed Wing drones are entirely different in design and build to multi-rotor type drones. They use a
‘wing’ like the normal airplanes out there. Unlike multi-rotor drones, fixed wing type models never
utilize energy to stay afloat on air (fixed wing types can’t stand still on the air) fighting gravity.
Instead, they move forward on their set course or as set by the guide control (possibly a remote unit
operated by a human) as long as their energy source permits.
Most fixed wing drones have an average flying time of a couple of hours. Gas engine powered drones
can fly up to 16 hours or higher. Owing to their higher flying time and fuel efficiency, fixed wing
drones are ideal for long distance operations (be it mapping or surveillance). But they can not be used
for aerial photography where the drone needs to be kept still on the air for a period of time.
Single rotor drones look very similar in design & structure to actual helicopters. Unlike a multi rotor
drone, a single rotor model has just one big sized rotor plus a small sized one on the tail of the drone
to control its heading. Single rotor drones are much efficient than multi rotor versions. They have
higher flying times and can even be powered by gas engines. In aerodynamics, the lower the count of
rotors the lesser will be the spin of the object. And that’s the big reason why quadcopters are more
stable than octocopters. In that sense, single rotor drones are much efficient than multi-rotor drones.
I
Fig 4.16 Single Rotor Drones
Hybrid VTOL:
These are hybrid versions combining the benefits of Fixed wing models (higher flying time) with that
of rotor based models (hover). This concept has been tested from around 1960’s without much
success. However, with the advent of new generation sensors (gyros and accelerometers), this concept
has got some new life and direction.
Hybrid VTOL’s are a play of automation and manual gliding. A vertical lift is used to lift the drone
up into the air from the ground. Gyros and accelerometers work in automated mode (autopilot
concept) to keep the drone stabilized in the air. Remote based (or even programmed) manual control
is used to guide the drone on the desired course.
• Motors
• Electronic speed control
• Flight controller
• The drone frames
• Propellers
• Batteries
• Connectors
• Camera (if you want to build your own camera drone)
• Gimbal
• A mounting pad
• A micro-SD card
• An RC receiver
If you’re having trouble finding parts for your drone, websites such as RoboShop and Hobby
King stock all the components for drone building, as well as DIY kits with all the right equipment
included.
4.5.1 Making your drone
Now you’ve got the parts, it’s time to put them all together! Read on to discover how to build a
quadcopter drone:
1. Construct a frame
You can use whichever materials you like to construct the drone frame, just make sure to pick
materials which can hold structure and shape, such as wood, plastic or metal. For a quadcopter, you’ll
need to make your frame into an X shape, and each propeller will go on each point of the ‘X’.
2. Assemble your drone’s motors
For this step, you’ll need to make holes in your frame for the motors. Then, fix the motor to the frame
with screws and a screwdriver.
If you’re building a drone from a kit, you may find that the motors come with mounts that make it
easier for you to affix them to the frame.
3. Mount your electronic speed controllers (escs)
After attaching the motors, you’ll need to attach your ESCs to the bottom of your drone’s frame. This
will free up more space for other components to be added to the top.
4. Attach the landing gear
You’ll need to attach landing gear to your drone to absorb the shock when it lands on solid ground.
This will help you to avoid any costly repairs and accidents with your drone!
Be sure to opt for a material that’s both flexible and strong, such as plastic, so that it absorbs the
shock and doesn’t break.
5. Add your flight controller
A flight controller is an essential for any drone. This allows your drone to stay stable whilst in flight,
and make sense of all the shifts and changes in the wind. You can make these yourself, however, it’s
easier to get a ready-made controller if it’s your first time building a drone from scratch.
Once you’ve found the right controller, you need to mount it to your drone. Make sure to attach a
piece of sponge underneath the controller to reduce the vibrations coming from the drone.
Questions:
1. Give the evolution of 3 D printing.
2. Write down the design principles used in 3D printing.
3. Give the various emerging trends in 3D printing.
4. Define Drone technology. Why it is used in Engineering Deciplines.
5. Define multirotor drone.
6. Write the procedure for becoming a drone pilot.
7. Write the procedure for multirotor drone assembly.
8. Give the various advantages of 3D printing.
9. Write down the various applications of 3D printing
UNIT-5
FUTURE TRENDS
5.1 Augmented Reality ( AR) and Virtual Reality (VR)
Augmented reality (AR):
It is an interactive experience of a real-world environment where the objects that reside in the real
world are enhanced by computer-generated perceptual information, sometimes across multiple
sensory modalities, including visual, auditory, haptic, somatosensory and olfactory.
Augmented reality uses existing reality and physical objects to trigger computer-
generated enhancements over the top of reality, in real time. Essentially, AR is a technology that lays
computer-generated images over a user's view of the real world. These images typically take shape
as 3D models, videos and information.
AR VR
The system augments the real-world scene Completely immersive virtual environment
In AR User always have a sense of presence in In VR, visual senses are under control of the system
the real world
AR is 25% virtual and 75% real VR is 75% virtual and 25% real
This technology partially immerses the user into This technology fully immerses the user into the
the action action
With AR, end-users are still in touch with the real By using VR technology, VR user is isolated from the
world while interacting with virtual objects nearer real world and immerses himself in a completely
to them. fictional world.
It is used to enhance both real and virtual worlds. It is used to enhance fictional reality for the gaming
world.
5G Wireless Technology is now the latest cellular technology that will greatly increase the speed of
wireless networks among other things(And who doesn’t want that?!!). So the data speed for wireless
broadband connections using 5G would be at a maximum of around 20 Gbps. Contrasting that with
the peak speed of 4G which is 60 Mbps, that’s a lot! Moreover, 5G will also provide more bandwidth
and advanced antenna technology which will result in much more data transmitted over wireless
systems.
And that’s just a small sampling of the capabilities of 5G technology! It will also provide various
network management features such as Network Slicing using which mobile operators will be able to
create multiple virtual networks using a single physical 5G network. So in this futuristic scenario, if
you are inside a self-driving car, then a virtual network with an extremely fast, low-latency
connections would be required because obviously the car needs to navigate in real-time. On the other
hand, if you are using any smart appliance in your home, then a virtual network with lower power
and a slower connection would be fine because it’s not a life or death situation!!!
History
• 1G: Where it all began
The first generation of mobile networks – or 1G as they were retroactively dubbed when the next
generation was introduced – was launched by Nippon Telegraph and Telephone (NTT) in Tokyo in
1979. By 1984, NTT had rolled out 1G to cover the whole of Japan.
In 1983, the US approved the first 1G operations and the Motorola’s DynaTAC became one of the
first ‘mobile’ phones to see widespread use stateside. Other countries such as Canada and the UK
rolled out their own 1G networks a few years later.
Despite these shortcomings and a hefty $3,995 price tag ($9,660 in today’s money), the DynaTAC
still managed to rack up an astonishing 20 million global subscribers by 1990. There was no turning
back; the success of 1G paved the way for the second generation, appropriately called 2G.
• 2G: The Cultural Revolution
The second generation of mobile networks, or 2G, was launched under the GSM standard in Finland
in 1991. For the first time, calls could be encrypted and digital voice calls were significantly clearer
with less static and background crackling. But 2G was about much more than telecommunications; it
helped lay the groundwork for nothing short of a cultural revolution. For the first time, people could
send text messages (SMS), picture messages, and multimedia messages (MMS) on their phones. The
analog past of 1G gave way to the digital future presented by 2G. This led to mass-adoption by
consumers and businesses alike on a scale never before seen.
With 4G coverage so low in some areas, why has the focus shifted to 5G already? 5G has actually
been years in the making. During an interview with Tech Republic, Kevin Ashton described how he
coined the term "the Internet of Things" – or IoT for short – during a PowerPoint presentation he gave
in the 1990s to convince Procter & Gamble to start using RFID tag technology.
The phrase caught on and IoT was soon touted as the next big digital revolution that would see billions
of connected devices seamlessly share data across the globe. According to Ashton, a mobile phone
isn’t a phone, it’s the IoT in your pocket; a number of network-connected sensors that help you
accomplish everything from navigation to photography to communication and more. The IoT will see
data move out of server centers and into what are known as ‘edge devices’ such as Wi-Fi-enabled
appliances like fridges, washing machines, and cars.
By the early 2000s, developers knew that 3G and even 4G networks wouldn’t be able to support such
a network. As 4G’s latency of between 40ms and 60ms is too slow for real-time responses, a number
of researchers started developing the next generation of mobile networks.
In 2008, NASA helped launch the Machine-to-Machine Intelligence (M2Mi) Corp to develop IoT
and M2M technology, as well as the 5G technology needed to support it. In the same year, South
Korea developed a 5G R&D program, while New York University founded the 5G-focused NYU
WIRELESS in 2012.
5.3 5G in India, Application and Use Cases
5.3.1 5G in India
The Government of India, through the DoT and Digital India initiatives, is leading the charge towards
5G. It has declared that India must not only be among the first countries to implement 5G, but also
be a leader amongst nations that design 5G systems for worldwide use.
For this purpose, it has set up a high-powered committee to seed R&D as a public-private effort. It
has nominated 6 IITs and created a new entity called CeWIT (Centre of Excellence in Wireless
Technology) that would split up the research among themselves, create standards-based products and
software that would be saleable across the world, making India a pioneer in 5G.
The labs are racing to complete the targets that run till late 2019. A major test bed is being created in
which all new products can be tested. All private firms, especially startups, are invited to participate
and accelerate the development.
Current progress: Different companies are also creating their own Proof-of-Concept systems, and
early this year, Airtel succeeded in sending 5G signals for a short distance in its own test platform.
Siemens and Ericsson are also active in the design and collaborate with DoT, IITs, etc.
However, the world leader in 5G design – Huawei – is stuck in controversies created by the US
government, saying the company is a security risk and no one should associate with it. Huawei had a
lot of investment and R&D planned for India in 5G but it is now in a limbo, with the Indian
government still not accepting the company into the 5G community.
DoT has still not allotted the test frequencies, free on trial basis, for test bed-based tests, already due
to commence. Even if they allot frequencies today, it will take 6 months to adapt these and get the
system ready for real-world testing. This means we are already one year behind other countries
Issues and problems
The TRAI has gone ahead and announced spectrum licensing fees that are minimum 5 times that
levied by the lowest-price country. And 54 times what Germany levies for 5G spectrum. Singapore
has waived all fees (licensing, spectrum, etc) in order to encourage fast development and deployment.
The Telcos have to, in addition, substantially enhance and make uniform their current networks and
make them uniformly broadband and fully IP-based. This involves substantial investment in money,
time and technology. Only the new Telco Jio has got a very good 4G network that needs little work
and investment to become 5G.
The finances of the Telcos are in bad shape and it is doubtful if they can gather the resources for
spectrum fees and network rollout. It looks doubtful if they can at all rollout anything before end 2020
or 2021.
Operational issues: A lot of 5G spectrum would cater to video-fast, interactive. However, customers
are now used to free video or very low-priced video on demand. India has both the highest data
consumption (mostly video on cheap smartphones by young people looking for cheap entertainment)
and the lowest tariff in the world. These two are an oxymoron. Companies are unable to monetise
their investment in technology to provide faster, better and cheaper technology. 5G will take this to a
higher level, but with no commensurate benefits.
Manufacturing: Factory floors will be totally transformed by the convergence of 5G, AI, and IoT.
Beyond predictive maintenance that helps control costs and minimize downtime, factories will also
use 5G to control and analyze industrial processes with an unprecedented degree of precision.
Logistics: In shipping and logistics, keeping track of inventory is expensive, slow, and difficult. 5G
offers the potential for greater communication among vehicles, as well as between vehicles and
infrastructure itself. Fleet monitoring and navigation will become significantly easier at scale with
5G. Driver navigation could potentially be powered with an augmented reality system that identifies
and flags potential hazards without diverting a driver’s attention away from the road.
In 1929 human brain recieved attention when a German scientist named Hans berger recorded brain
signals or electrical activity from human scalp using a device.But there were inadequecies of devices
to measure and process those brain signals .During that period there was inadecquacy of knowledge
and understanding human brain and computer compared to this day.The days have changed now the
field of neuroscience has way better understanding of human brain than before and the computer
scientist have developed devices that can record,measure and process the electrical activity of the
brain.The collusion of Neuroscience and computer/software tech is yielding to better results.
The first BCI was introduced by Dr.Grey Walter in 1964.He connected electrodes to a patient’s motor
areas of brain and he was asked to press the button that advances slides on the display.Every time he
did, Dr.Grey walter recorded his brain activity and introduced a delay in advancing slides so that
whenever patient likes to press the button to advance the slide the brain region would activate that is
associated with motor actions and would advance slide before pressing the button.The control
happens before physical action .It is control without movement.This is the first BCI known.Research
over last decades has enabled better understanding of brain and led to development of signal
processing algorithms and computing power that doesn’t require expensive or bulky devices.There
are very few laboratories in the world working effortlessly on this cutting edge technology.
Questions:
1. Define Augmented Reality (AR).
2. Define Virtual Reality (VR).
3. Give the Evolution of 5G technology.
4. Write down the various objective and global scenario of 5 G Technology.
5. Describe the scenario of 5G technology in India.
6. Explain Brain Computer Interface.
7. Give the various applications of Brain Computer Interface (BCI).
8. Explain correlation between BCI and human brain.
9. Give the global scenario of BCI.
10. Give the various advantages of 5G Technology.