What are amazon's services for IoT?
AWS IoT provides cloud services that connect your IoT devices to other devices and AWS cloud services. AWS IoT provides device software that can help you integrate your IoT devices into AWS IoT-based solutions. If your devices can connect to AWS IoT, AWS IoT can connect them to the cloud services that AWS provides.
AWS Internet of Things (AWS IoT) enables secure, bi-directional communication between Internet-connected things (such as sensors, actuators, embedded devices, or smart appliances) and the AWS cloud. This enables you to collect telemetry data from multiple devices and store and analyze the data. You can also create applications that enable your users to control these devices from their phones or tablets.
AWS IoT Components
AWS IoT consists of the following components:
• Message broker—Provides a secure mechanism for things and IoT applications to publish and receive messages from each other. You can use the MQTT protocol to publish and subscribe. You can use the HTTP REST interface to publish.
• Rules engine—Provides message processing and integration with other AWS services. You can use a SQL-based language to select data from message payloads, process the data, and send the data to other services, such as Amazon S3, Amazon DynamoDB, and AWS Lambda. You can also use the message broker to republish messages to other subscribers.
• Thing Registry—Organizes the resources associated with each thing. You register your things and associate up to three custom attributes with each thing. You can also associate certificates and MQTT client IDs with each thing to improve your ability to manage and troubleshoot your things.
• Thing Shadows—Provide persistent representations of your things in the AWS cloud. You can publish updated state information to a shadow, and your thing can synchronize its state when it connects. Your things can also publish their current state to a shadow for use by applications or devices.
• Security and identity service—Provides shared responsibility for security in the AWS cloud. Your things must keep their credentials safe in order to send data securely to the message broker. The message broker and rules engine use AWS security features to send data securely to devices or other AWS services.
AWS IoT enables Internet-connected things to connect to the AWS cloud and lets applications in the cloud interact with Internet-connected things. Common IoT applications either collect and process telemetry from devices or enable users to control a device remotely. Things report their state by sending messages, in JSON format, to MQTT topics.
Each MQTT topic has a hierarchical name, such as "my house/living room/temperature." The message broker sends each message received by a topic to all the clients subscribed to the topic. You can create rules that define one or more actions to perform based on the data in a message. For example, you can insert, update, or query a DynamoDB table or invoke a Lambda function. Rules use expressions to filter messages. When a rule matches a message, it performs the action using the selected properties. You can use all JSON properties in a message or only the properties you need. Rules also contain an IAM role that grants AWS IoT permission to the AWS resources used to perform the action.
Each thing has a Thing Shadow that stores and retrieves state information. Each item in the state information has two entries: the state last reported by the thing and the desired state requested by an application. An application can request the current state information for a thing. The shadow responds to the request by providing a JSON document with the state information (both reported and desired), metadata, and a version number. An application can control a thing by requesting a change in its state. The shadow accepts the state change request, updates its state information, and sends a message to indicate the state information has been updated. The thing receives the message, changes its state, and then reports its new state.
Explain the concept of amazon auto-scaling
Auto-scaling is the capability built into AWS that allows you to ensure you have the right number of EC2 instances provisioned to handle the load of your application. Using Auto-scaling, you can remove the guesswork in selecting how many EC2 instances are required to provide an acceptable level of performance for your application without over-provisioning resources and incurring unnecessary costs.
When you are running workloads in production it is a good idea to use Amazon CloudWatch to monitor resource usage like CPU utilization, however, when desired limits are exceeded, CloudWatch will not automatically provision more resources to handle the increased load, which is where auto-scaling comes into play.
Depending on the nature of your application, it is not uncommon for traffic loads to differ depending on the time of day, or day of the week.
If you provision enough EC2 instances to cope with the highest peak demand, then you will have plenty of other days or periods where you have lots of capacity that remains unused. Which means you are paying for instances that are laying idle.
Conversely, if you don’t provision enough capacity, then in peak times when the processing power required to provide acceptable performance is exceeded by demand, your application performance will degrade and you may have users experiencing severe lag or even timeouts due to lack of available CPU capacity.
Auto-scaling is the solution, allowing you to automate the addition and deletion of EC2 instances based on monitored metrics like CPU usage. This allows you to minimize costs during periods of low demand, but ramp up resources during peak load times so application performance is not affected.
Two of the core AWS best practices are scalability and automation. EC2 Auto-scaling provides scalability which addresses the important question of how to ensure your workload has enough EC2 resources to meet fluctuating performance requirements and how you can automate the provisioning process to occur in response to demand.
Auto-scaling undertakes the process of scaling out (adding resources) based on increased demand or scaling in (reducing resources) the number of EC2 instances you have running in your workload based on conditions you define like CPU usage levels or a predefined schedule.
List advantages and functions of Amazon EC2
Using Amazon EC2 eliminates your need to invest in hardware upfront, so you can develop and deploy applications faster. You can use Amazon EC2 to launch as many or as few virtual servers as you need, configure security and networking, and manage storage. Amazon EC2 provides the broadest and deepest instance choice to match your workload's needs. General purpose, compute-optimized, memory-optimized, storage-optimized, and accelerated computing instance types are available that provide the optimal compute, memory, storage, and networking balance for your workloads.
Amazon EC2 provides a wide selection of instance types optimized to fit different use cases. Instance types comprise varying combinations of CPU, memory, storage, and networking capacity and give you the flexibility to choose the appropriate mix of resources for your applications. There are no upfront costs. On-Demand Instances follow a pay-as-you-go system. There are no long-term commitments with the EC2 instances. The computing capacity is flexible enough to be scaled dynamically based on your changing system needs.
AWS enables you to select the operating system, programming language, web application platform, database, and other services you need. With AWS, you receive a virtual environment that lets you load the software and services your application requires. Elasticity is one of the AWS advantages. If you use fewer resources and you don't need the rest of them, then AWS itself shrinks the resources to fit your requirement. That is, upsizing and downsizing resources are easy here. Also, AWS always lets you know how many resources you are using at the moment.
All data is stored in highly secure AWS data centers. Meet compliance requirements — AWS manages dozens of compliance programs in its infrastructure. This means that segments of your compliance have already been completed. Scale quickly — Security scales with your AWS Cloud usage.
Recommended Articles
NETWORK ACCESS AND PHYSICAL LAYER IOT NETWORK TECHNOLOGIES
IoT NETWORKING CONSIDERATIONS AND CHALLENGES
Soil Nutrient Depletion and Imbalances
Fundamentals of Internet of Things IoT
INTERNET OR WEB AND NETWORKING BASICS OSI MODEL
Describe the role of credit in rural development.
Problems on Final Accounts of Charitable Trust
Machine To Machine Communication M2M
What are the essential ingredients of empowerment? Explain the role of the panchayats as an agent of political empowerment.
Architecture of IoT Internet of Things