So basically, the internet of things
interconnection via the Internet of
computing devices embedded in everyday objects, enabling them to send and
receive data. So, you might be wondering how this an effect using the raspberry
pi and well by using the internet of things alongside the raspberry pi this
allows use to connect many more devices to the raspberry pi and this allows us
to have more uses for the pi. Some of these examples are using the raspberry pi
as a way to help you in your everyday life e.g.
telling you the tempter of a certain room/area or activating certain
devices at specific times.
So, for this project we have been tasked with investigating the different options available to create a connected
device. So, lets start by saying what really is a connected device? A connected
device is an electronic device, generally connected to other devices or networks via different
wireless protocols such as Bluetooth, NFC, Wi-Fi, 3G, etc that can also operate
to some extent interactively and autonomously. So, what exactly can a connected
device do? Well they can turn things into controls an example of this is using
your mobile phone to carry out a function.
So, what has this got to do with the raspberry
pi? Well by using both connected devices and the raspberry pi we would be able
to create something very functional and useful for people in there every day
lives. An example of this could be having as sensor in your home connected to
your speaker we could then have it in a way so that the when you step into your
home after a day’s work the speaker will play music for you without you having
to connect to the speaker manually.
So first off what is a
Communication protocols are formal
descriptions of digital message formats and rules. They are required to
exchange messages in or between computing systems and are required in
So how would we go
about creating a speaker using a sensor
So, to create a sensor speaker using
a raspberry pi we are going to need a few things first
10 k?, 1 k?
with standard headphone jack
So how would we go about this well
first off, we would have to have the raspberry pi and a IR break beam sensor, so we could have it connected to the speaker and have it set to go off
at a specific time when you walk into a room. So, we could have the sensor activate
as soon as you enter the room so when you’re in a room your music is already
playing for you and you can just come in and relax.
However, it wouldn’t be that easy we would first have to programme
the raspberry pi to first activeate the music as soon as the sensor beam gets broken. This would
obliviously require the use of the IR break beam sensor which is a infrared sensor that detects the entry when someone
walks into a room and when the person breaks a beam of infrared rays emitted by
its transmitter. The transmitter and the receiver are to be placed facing each
other at the desired location. When powered on the transmitter emits a beam of
IR rays which is received by the receiver. As soon as someone enters the room
the beam is broken, and the entry is detected and then the music should begin
Now were gonna need to code the pi to play an audio files to do this we need a music player. To do this we will
need a software called Raspbian. Raspbian includes a package called omxplayer
by default which is a command line music player built specifically for
Raspberry Pi. To start testing connect your speakers to the audio jack and load
a music file to your Pi’s SD card. Open terminal and change the directory to the one
containing the music file.
Now we need to interface the break beam sensor to
the Raspberry Pi to detect when someone walks into the room. For this purpose,
we will make use of the GPIO pins of the Pi.
Now for the coding required to play music.So, once
you are done coding you need to test It to see if the setup is performing as
needed. Find out the practical separation possible between the transmitter and
receiver. The receiver must not be kept so far from the transmitter that the
beams die out before reaching the receiver. Now you must place them accordingly
near the door. Fix them and the Pi properly. You are ready to try out the
motion triggered music player.
Now the circuit must be modified accordingly. Since
we are using a module the connections between VCC and GND of receiver and
transmitter is not required any more. Now we must only connect the VCC and GND
of the module to the corresponding pins of the Pi andconnect the output pin of
the module to one of the GPIO pins of the Raspberry Pi.
Pi Based Servers
What is a pi based server?
The PI Server is the heart of the PI System.
It collects, stores, and organizes data from all your data sources, providing a
powerful and flexible information infrastructure perfect for your own personal
use or for any organization. The PI Server also includes sophisticated tools
for analytics, alerts, and auditing. You can connect the PI Server to almost
any existing automation, lab, or information system. Operators, engineers,
managers, and other plant personnel use a variety of client applications to connect
to the PI Server to view data stored in the PI Server or in external data
So how Does It Work with Raspberry pi?
Well first you need to set up your
Raspberry Pi as a local server by installing Apache, PHP, and MySQL and testing
it. After doing this, this local server can be converted into a web server
through port forwarding technique from your router. After performing port
forwarding, your Raspberry Pi will be accessible through the internet as your
router will point to it. Check out this block diagram for the detailed step by
step process to build your Raspberry Pi web server.
Cloud Based Servers
WHAT ARE CLOUD SERVERS?
A cloud server is a logical server that is
built, hosted and delivered through a cloud computing platform over the
Internet. Cloud servers possess and exhibit similar capabilities and
functionality to a typical server but are accessed remotely from a cloud
A cloud server may also be called a virtual server or virtual private sever.
A cloud server is primarily an Infrastructure as a Service (IaaS)
based cloud service model. There are two types of cloud server: logical and
physical. A cloud server is considered to be logical when it is delivered
through server virtualization. In this delivery model, the physical server is
logically distributed into two or more logical servers, each of which has a
separate OS, user interface and apps, although they share physical components
from the underlying physical server.
Benefits of Cloud Based
Extra resource can be accessed as and when required. This is
particularly valuable to someone who would need to have spikes in as they are required
resource at certain times of the year.
On-going costs can be kept down as, whilst resource is available
when needed, people only pay for what they are using at a particular time. When
this resource is no longer required, it can be reduced immediately.
Cloud servers are vastly more reliable than traditional servers.
Due to the number of available servers, if there are problems with some, the
resource will be shifted so that people are unaffected
Downsides of Cloud
In spite of the benefits and advantages that you can reap from cloud based
servers, you need to be aware of some of its drawbacks, risks, issues and
issues and possible downtime –
although it is true that data and information stored in the cloud can be
accessed anytime and anywhere, it should be noted that technology is often
subjected to outages and other technical issues.
Security Risk –
Since you surrender your sensitive information to a cloud service provider, you
could be putting your personal information or company at a serious security
to Attacks –
Nothing in the internet is completely secure and storing all your information
on a cloud puts your company at risk and prone to hacking attacks.
Over all the Internet of Things is following a similar path as the
Internet of People. Looking at the IoT and where it seems to have the biggest
impact, we should weigh the advantages and disadvantages it might have.
There are clearly areas where IoT applications are
improving life for a vast number of people. There are also areas where entire
industries and livelihoods will be disrupted or eliminated. Technology seems to
be an unstoppable force, and the Internet a powerful force that propagates it,
regardless of geographical or political boundaries.
positive applications of the IoT
grids: Here is an area where the IoT is helping us gainn ourselves
from fossil fuels. Although still relatively cheap today, there is a
finite supply of oil. At some point, society will have to transition to
renewable energy be it solar, wind, hydro, or ocean currents. All these
sources are variable, unpredictable, and geographically distributed,
meaning information exchange to match supply with demand is crucial to
making them financially viable.
e-Learning: To offset the
replacement of low-skilled jobs by connected machines, humans need to move
up the knowledge ladder to prepare for a future where robots do most of
the manual labor. The IoT is a perfect vehicle for delivering education
and training to millions of people in remote locations. This must be
driven by the public sector, as it will be inherently a not-for-profit
endeavor if it is to reach the masses, especially in developing countries.
negative applications of IoT
automation: As connected machines are becoming smarter, there may soon be
no manufacturing or agricultural process left that requires a human hand.
The result will be millions of people out of work. Jobs that were
originally outsourced from rich countries to developing countries,
decimating the middle class, would then be eliminated altogether. From a
profit standpoint, this is a good thing. From a societal standpoint, it
could be devastating.
vehicles: This rapidly developing technology promises a long list of
benefits, including lower costs and increased safety and security. But
what is inherent in the term “driverless” makes the result clear: for
every driverless truck, taxi, tram, or train there is one human being who
is no longer required.
privacy: Hand-in-hand with the IoT is the growing trend of storing
data in the “cloud.” Everything from our family photos to personal
financial information exists “somewhere” on remote servers. The recent
headlines about mass security breaches where personal and credit card
information has been stolen from these systems is just a small taste of
what could happen in the near future.