Seminar Report Smart Parking Using Iot

You might also like

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 34

Seminar Report Smart Parking Using IoT

CHAPTER.1

INTRODUCTION

Cloud computing is proving to be an important area that requires further


research and development to accommodate more applications . It has attracted
significant interest from academia, industry, governments, and even individual users not
only because of the promised cost savings, but also because it can improve existing
computing services, . In addition, cloud computing offers opportunities to create new
services, e.g., robotics and manufacturing . In this paper, introduce a new cloud
service: industrial automation. We show that the proposed service reduces the time and
cost incurred in deploying new systems since current industrial automation systems are
complex and require large human effort to build . Further, we address how to migrate
vital automation functionality to the cloud without compromising the system
performance .It is noteworthy that the work proposed in this paper fits an ongoing trend
that evolved several decades ago when digital computers were first introduced to
control systems around the year of 1960 in the form of Direct Digital Control (DDC) .
Ever since, evolution of control system has been associated with the advancement of
computing devices . Several functionalities, e.g., monitoring, logging optimization, and
asset management, have been added on top of the core direct digital control
functionality, forming an automation system. As a result, a current industrial automation
system is indeed a multi-tiered architecture entailing several hierarchical layers of
computation, communication, and storage [33]. With such history, we see a great
potential in studying the application of an evolving computing model, such as cloud
computing to industrial automation systems, which could provide several benefits to
end users, including cost saving and agility.

VAST-TC Page 1
Seminar Report Smart Parking Using IoT

CHAPTER.2

LITERATURE SURVEY

Kumar et al. proposed an approach for assisting autonomous vehicles in path planning
based on cloud collected remote sensor data. Chen et al. proposed “Robot as a Service” or
RaaS where the service is available in both hardware and software. Also, Wu et al. explored
“Cloud Manufacturing”, which is a cloud-based manufacturing model that is service-
oriented, customer-centric, and demand-driven. RaaS and Cloud Manufacturing focus on
planning and optimization, while we consider the whole automation hierarchy and focus on
direct digital control, which is much more challenging in terms of timeliness and reliability.
Several researchers/enterprises employed feedback controllers to manage their computing
systems. The employed feedback controllers can be acquired as a service through our
proposed cloud-based feedback control approach.
It has been recently proposed to offer certain industrial automation components
through the cloud. First, enterprise level (L4) asset management applications, such as SAPr,
are now offered through the cloud. Second, plant optimization (L3) can easily be offered
through the cloud. For example, Honeywell Attune TM [31] offers cloud-based services for
energy optimization. Although, it is mainly offered for building automation, the plant
version is conceptually the same. Third, HMI/SCADA (L2) is now offered in a virtualized
fashion as it is the case with Invensys Wonderworkers System Platform 2012 , which
indicates that offering L2 as a cloud service is only a matter of moving the virtual machines
(VMs) to the cloud. Finally, moving direct digital control (L1) to the cloud is challenging
due to timeliness and reliability requirements. We are not aware of any commercially
available system that offers direct

VAST-TC Page 2
Seminar Report Smart Parking Using IoT

CHAPTER.1

OVERVIEW

Industry 4.0 is a name given to the current trend of automation and data exchange in
manufacturing technologies. It includes cyber-physical systems, the Internet of things,
cloud computing and cognitive computing. Industry 4.0 is commonly referred to as the
fourth industrial revolution.Industry 4.0 fosters what has been called a "smart factory".
Within modular structured smart factories, cyber-physical systems monitor physical
processes, create a virtual copy of the physical world and make decentralized decisions.
Over the Internet of Things, cyber-physical systems communicate and cooperate with
each other and with humans in real-time both internally and across organizational
services offered and used by participants of the value chain.current usage of the term
has been criticized as essentially meaningless, in particular on the grounds that
technological innovation is continuous and the concept of a "revolution" in technology
innovation is based on a lack of knowledge of the detail .The characteristics given for
the German government's Industry 4.0 strategy are: the strong customization of products
under the conditions of highly flexible (mass-) production. The required automation
technology is improved by the introduction of methods of self-optimization, self-
configuration, self-diagnosis, cognition and intelligent support of workers in their
increasingly complex work.The largest project in Industry 4.0 as of July 2013 is the
BMBF leading-edge cluster "Intelligent Technical Systems Ostwestfalen-Lippe (it's
OWL)". Another major project is the BMBF project RES-COM,[15] as well as the
Cluster of Excellence "Integrative Production Technology for High-Wage Countries".
In 2015, the European Commission started the international Horizon 2020 research
project CREMA (Providing Cloud-based Rapid Elastic Manufacturing based on the
XaaS and Cloud model) as a major initiative to foster the Industry 4.0 topic .From3D
prints to self-driving vehicles,Industry 4.0 technologies are propelling the
manufacturing industry with new means of efficiency,accuracy and reliability. The level
of intelligence offered today is only the beginning for what is to come

VAST-TC Page 3
Seminar Report Smart Parking Using IoT

CHAPTER.4

TECHNOLOGIES USED

4.1 IoT

IoT (Internet of Things) is an advanced automation and analytics system which exploits
networking, sensing, big data, and artificial intelligence technology to deliver complete
systems for a product or service. These systems allow greater transparency, control, and
performance when applied to any industry or system.IoT systems have applications
across industries through their unique flexibility and ability to be suitable in any
environment. They enhance data collection, automation, operations, and much more
through smart devices and powerful enabling technology.This tutorial aims to provide
you with a thorough introduction to IoT. It introduces the key concepts of IoT,

necessary in using and deploying IoT systems.Internet of Things (IoT) is a new


revolution of the Internet. It makes Objects themselves recognizable, obtain
intelligence, communicate information about themselves and they can access
information that has been aggregated by other things. The Internet of Things allows
people and things to be connected Anytime, Anyplace, with Anything and Anyone,
VAST-TC Page 4
Seminar Report Smart Parking Using IoT

ideally using Any path/network and Any service .This implies addressing elements such
as Convergence, Content, Collections, Computing, Communication, and Connectivity.
The Internet of Things provides interaction among the
real/physical and the digital/virtual worlds. The physical entities have digital
counterparts and virtual representation and things become context aware and they can
sense, communicate, interact, exchange data, information and knowledge. Through the
use of intelligent decision-making algorithms in software applications, appropriate rapid
responses can be given to physical entity based on the very latest information collected
about physical entities and consideration of patterns in the historical data, either for the
same entity or for similar entities. These paves new dimension of IoT concept in the
domains such as supply chain management, transportation and logistics, aerospace, and
automotive, smart environments (homes, buildings, infrastructure), energy, defence,
agriculture, retail and more. The vision of IoT is to use smart technologies to connect
things any-time, any-place for anything. The IoT was started in the year 1998 and the
term Internet of Things was first coined by Kevin Ashton in 1999. Fig. 1

IoT-product-services
Hardware
logic (based on Fleisch et al. Thing-basedPhysical IT-basedDigital
2014 THING + IT = +
Software function Local service Global

Bulb IoTstack Light Security

Storage Automatic
Bin IoTstack
capacity replenishment

Towing Predictive maintenance,


Tractor IoTstack
vehicle optimization

The Internet of Things has been evolved in a tremendous way over the past decade and
still IoT is an emerging trend for researchers in both academia and industry. Many
findings of IoT reported in literature presents meaningful definitions. According to
CASAGRAS project [1]: “A global network infrastructure linking physical and virtual
objects through the exploitation of data capture and communication capabilities. This
infrastructure includes existing and evolving Internet and network developments. It will

VAST-TC Page 5
Seminar Report Smart Parking Using IoT

offer specific object identification, sensor and connection capability as the basis for the
development of independent cooperative services and applications. CERP[2],
emphasizes the internetworking between heterogeneous ‘smart’ devices such as sensors,
actuators, computers and smart phones etc., and the use of services over the internet.
Any application development framework for the IoT, therefore, needs to support these
heterogeneous devices. According to the IEEE Internet of Things journal, An IoT
system is a network of networks where, typically, a massive number of
objects/things/sensors/devices are connected through communications and information
infrastructure to provide value-added services via intelligent data processing and
management for different applications. The Internet of Things (IoT) is a computing
concept that describes a future where everyday physical objects will be connected to the
Internet and will be able to identify themselves to other devices. The term is closely
identified with RFID as the method of communication, although it could also include
other sensor technologies, other wireless technologies, QR codes, etc. According to The
Internet of Things European Research Cluster (IERC) definition [3] states that IoT is a
dynamic global network infrastructure with self-configuring capabilities based on
standard and interoperable communication protocols where physical and virtual
“things” have identities,

4.2 Value Creation in the Internet of Things

At its core, innovation in the Internet of Things is characterized by the combination of


physical and digital components to create new products and enable novel business
models. Thanks to increasingly efficient power management, broadband
communication, reliable memory and advances in microprocessor technologies, it has
become possible to digitalize functions and key capabilities of industrial-age products
(Yoo et al. 2010). Consequently, a range of opportunities is unfolding for companies to
generate incremental value in the Internet of Things. Figure 1 illustrates the logic of
such value creation. It demonstrates that IoT solutions typically combine physical things
with IT in the form of hardware and software. As a result, the primary thing-based
physical functions of a thing can be enhanced with additional IT-based digital services,
which can be accessed not only on a local basis but at a global level. For instance, the
primary thing-based function of a light bulb is to provide light in a specific location. If

VAST-TC Page 6
Seminar Report Smart Parking Using IoT

the light bulb is however enhanced with IoT technology, it may additionally detect
human presence and serve as a low-cost security system, which in the event of an
intrusion activates a flashing light mode and sends an alert to the owner’s smartphone.
Similarly, the primary thing-based function of a bin is to provide storage capacity. But
when the bin is enriched with IoT technology it may moreover measure andmonitor its
own weight, thus detect levels of low stock and offer an automatic replenishment
service. And while the primary thing-based function of a tractor may be to tow other
farm equipment, a connection of the tractor to the IoT could facilitate IT-based
predictive maintenance and optimization services (Fleisch et al. 2014). The impact
which IoT technologies can have is however not limited to the value created by
individual connected products. Instead, the functions of one product may be further
enhanced if it is connected to related products and thus becomes part of a product
system. For instance, a connected tractor may form part of a larger farm equipment
system, which could include, e.g., additional tractors, harvesters, balers, or drills, and
monitor the location as well as key performance indicators of the machines to optimize
the overall equipment efficiency of the larger fleet. And goingbeyond even such product
systems, the combination of multiple, previously disparate product systems, e.g., farm
equipment systems, weather data systems, seed optimization and irrigation systems,
may lead to systems of systems, which have the capacity to expand existing industry
boundaries and shake competitive dynamics (Porter andHeppelmann 2014)

2 Technology Stack and Platforms for the Internet of Things


From a technological perspective, the implementation of a connected product typically
requires the combination of multiple software and hardware components in a multilayer
stack of IoT technologies. As illustrated in Fig. 2, such an IoT technology stack is
usually composed of three core layers, i.e., the thing or device layer, the connectivity
layer and the IoT cloud layer. At the device layer, IoT-specific hardware, such as
additional sensors, actuators, or processors can be added to existing core hardware
components, and embedded software can be modified or newly integrated to manage
and operate the functionality of the physical thing. At the connectivity layer,
communication protocols such as MQTT enable the communication between the
individual thing and the cloud. And at the IoT cloud layer, device communication and
management software is used to communicate with, provision, and manage the
connected things, while an application platform enables

VAST-TC Page 7
Seminar Report Smart Parking Using IoT

4.2 IoT − Key Features

The most important features of IoT include artificial intelligence, connectivity, sensors,
active engagement, and small device use. A brief review of these features is given
below:
 AI – IoT essentially makes virtually anything “smart”, meaning it enhances
every aspect of life with the power of data collection, artificial intelligence
algorithms, and networks. This can mean something as simple as enhancing your
refrigerator and cabinets to detect when milk and your favorite cereal run low,
and to then place an order with your preferred grocer.
 2.Connectivity – New enabling technologies for networking, and specifically
IoT networking, mean networks are no longer exclusively tied to major
providers. Networks can exist on a much smaller and cheaper scale while still
being practical. IoT creates these small networks between its system devices.
 3.Sensors – IoT loses its distinction without sensors. They act as defining
instruments which transform IoT from a standard passive network of devices
into an active system capable of real-world integration.
 4.Active Engagement – Much of today's interaction with connected technology
happens through passive engagement. IoT introduces a new paradigm for active
content, product, or service engagement.
 5. Small Devices – Devices, as predicted, have become smaller, cheaper, and
more powerful over time. IoT exploits purpose-built small devices to deliver its
precision, scalability, and versatility.

4.3 Iot Components

4.3.1 Cyber-physical system

A cyber-physical (also styled cyber physical) system (CPS) is a mechanism


that is controlled or monitored by computer-based algorithms, tightly integrated with
the Internet and its users. In cyber-physical systems, physical and software components
are deeply intertwined, each operating on different spatial and temporal scales,
exhibiting multiple and distinct behavioral modalities, and interacting with each other in

VAST-TC Page 8
Seminar Report Smart Parking Using IoT

a lot of ways that change with context. Examples of CPS include smart grid,
autonomous automobile systems, medical monitoring, process control systems, robotics
systems, and automatic pilot avionics. CPS involves transdisciplinary approaches,
merging theory of cybernetics, mechatronics, design and process science.[3][4][5] The
process control is often referred to as embedded systems. In embedded systems, the
emphasis tends to be more on the computational elements, and less on an intense link
between the computational and physical elements. CPS is also similar to the Internet of
Things (IoT), sharing the same basic architecture; nevertheless, computational elements.
CPS presents a higher combination and coordination between physical and

Precursors of cyber-physical systems can be found in areas as diverse


as aerospace, automotive, chemical processes, civil infrastructure, energy, healthcare,
manufacturing, transportation, entertainment, and consumer Unlike more traditional
embedded systems, a full-fledged CPS is typically designed as a network of interacting
elements with physical input and output instead of as standalone devices. The notion is
closely tied to concepts of robotics and sensor networks with intelligence mechanisms
proper of computational intelligence leading the pathway. Ongoing advances in science
and engineering improve the link between computational and physical elements by
means of intelligent mechanisms, increasing the adaptability, autonomy, efficiency,
functionality, reliability, safety, and usability of cyber-physical systems. This will
broaden the potential of cyber-physical systems in several directions, including:
intervention (e.g., collision avoidance); precision (e.g., robotic surgery and nano-level
manufacturing); operation in dangerous or inaccessible environments (e.g., search and
rescue, firefighting, and deep-sea exploration); coordination (e.g., air traffic control, war
fighting); efficiency (e.g., zero-net energy buildings); and augmentation of human
capabilities (e.g. in healthcare monitoring and delivery).

4.3.2 Cloud computing

Cloud computing is shared pools of configurable computer system


resources and higher-level services that can be rapidly provisioned with minimal
management effort, often over the Internet. Cloud computing relies on sharing of
resources to achieve coherence and economies of scale, similar to a public utility. Third-
party clouds enable organizations to focus on their core businesses instead of expending

VAST-TC Page 9
Seminar Report Smart Parking Using IoT

resources on computer infrastructure and maintenance. Advocates note that cloud


computing allows companies to avoid or minimize up-front IT infrastructure costs.
Proponents also claim that cloud computing allows enterprises to get their applications
up and running faster, with improved manageability and less maintenance, and that it
enables IT teams to more rapidly adjust resources to meet fluctuating and unpredictable
demand. Cloud providers typically use a "pay-as-you-go" model, which can lead to
unexpected operating expenses if administrators are not familiarized with cloud-pricing
models. Availability of high-capacity networks, low-cost computers and storage devices
as well as the widespread adoption of hardware virtualization, service-oriented
architecture, and autonomic and utility computing has led to growth in cloud
computing).

4.3.3 Service models

Though service-oriented architecture advocates "everything as a service" (with the


acronyms EaaS or XaaS, or simply aas), cloud-computing providers offer their
"services" according to different models, of which the three standard models per NIST
are Infrastructure as a Service (IaaS), Platform as a Service (PaaS), and Software as a
Service (SaaS).These models offer increasing abstraction; they are thus often portrayed
as a layers in a stack: infrastructure-, platform- and software-as-a-service, but these
need not be related. For example, one can provide SaaS implemented on physical
machines (bare metal), without using underlying PaaS or IaaS layers, and conversely
one can run a program on IaaS and access it directly, without wrapping it as SaaS.

4.3.4 Infrastructure as a service (IaaS)

"Infrastructure as a service" (IaaS) refers to online services that


provide high-level APIs used to dereference various low-level details of underlying
network infrastructure like physical computing resources, location, data partitioning,
scaling, security, backup etc. A hypervisor runs the virtual machines as guests. Pools of
hypervisors within the cloud operational system can support large numbers of virtual
machines and the ability to scale services up and down according to customers' varying
requirements. Linux containers run in isolated partitions of a single Linux kernel

VAST-TC Page 10
Seminar Report Smart Parking Using IoT

running directly on the physical hardware. Linux croups and namespaces are the
underlying Linux kernel technologies used to isolate, secure and manage the containers.
Containerization offers higher performance than virtualization, because there is no
hypervisor overhead. Also, container capacity auto-scales dynamically with computing
load, which eliminates the problem of over-provisioning and enables usage-based
billing.[60] IaaS clouds often offer additional resources such as a virtual-machine disk-
image library, raw block storage, file or object storage, firewalls, load balancers, IP
addresses, virtual local area networks (VLANs), and software bundles.The NIST's
definition of cloud computing describes IaaS as "where the consumer is able to deploy
and run arbitrary software, which can include operating systems and applications. The
consumer does not manage or control the underlying cloud infrastructure but has control
over operating systems, storage, and deployed applications; and possibly limited control
of select networking components (e.g., host firewalls).
IaaS-cloud providers supply these resources on-demand from their large pools of
equipment installed in data centers. For wide-area connectivity, customers can use
either the Internet or carrier clouds (dedicated virtual private networks). To deploy their
applications, cloud users install operating-system images and their application software
on the cloud infrastructure. In this model, the cloud user patches and maintains the
operating systems and the application software. Cloud providers typically bill IaaS
services on a utility computing basis: cost reflects the amount of resources allocated and
consumed.[citation needed]

4.3.5 Platform as a service (PaaS)

The NIST's definition of cloud computing defines Platform as a Service as:[58]


The capability provided to the consumer is to deploy onto the cloud infrastructure
consumer-created or acquired applications created using programming languages,
libraries, services, and tools supported by the provider. The consumer does not manage
or control the underlying cloud infrastructure including network, servers, operating
systems, or storage, but has control over the deployed applications and possibly
configuration settings for the application-hosting environment.PaaS vendors offer a
development environment to application developers. The provider typically develops
toolkit and standards for development and channels for distribution and payment.

VAST-TC Page 11
Seminar Report Smart Parking Using IoT

4.3.6 Cloud computing Architecture

Cloud architecture,[106] the systems architecture of the software systems involved in


the delivery of cloud computing, typically involves multiple cloud components
communicating with each other over a loose coupling mechanism such as a messaging
queue. Elastic provision implies intelligence in the use of tight or loose coupling as
applied to mechanisms such as these and others.

4.3.7 Cloud engineering

Cloud engineering is the application of engineering disciplines to cloud computing. It


brings a systematic approach to the high-level concerns of commercialization,
standardization, and governance in conceiving, developing, operating and maintaining
cloud computing systems. It is a multidisciplinary method encompassing contributions
from diverse areas such as systems, software, web, performance, information
technology engineering, security, platform, risk, and quality engineering.

4.3.8 Cognitive Computing

At present, there is no widely agreed upon definition for cognitive


computing in either academia or industry.In general, the term cognitive computing has
been used to refer to new hardware and/or software that mimics the functioning of the
VAST-TC Page 12
Seminar Report Smart Parking Using IoT

human brain (2004) and helps to improve human decision-making.[11][12] In this


sense, CC is a new type of computing with the goal of more accurate models of how the
human brain/mind senses, reasons, and responds to stimulus. CC applications link data
analysis and adaptive page displays (AUI) to adjust content for a particular type of
audience. As such, CC hardware and applications strive to be more affective and more
influential by design.
Some features that cognitive systems may express are:

 Adaptive: They may learn as information changes, and as goals and


requirements evolve. They may resolve ambiguity and tolerate unpredictability.
They may be engineered to feed on dynamic data in real time, or near real time.
 Interactive: They may interact easily with users so that those users can define
their needs comfortably. They may also interact with other processors, devices,
and cloud services, as well as with people.
 Iterative and stateful: They may aid in defining a problem by asking questions or
finding additional source input if a problem statement is ambiguous or
incomplete. They may "remember" previous interactions in a process and return
information that is suitable for the specific application at that point in time.
 Contextual: They may understand, identify, and extract contextual elements such
as meaning, syntax, time, location, appropriate domain, regulations, user’s
profile, process, task and goal. They may draw on multiple sources of
information, including both structured and unstructured digital information, as
well as sensory inputs (visual, gestural, auditory, or sensor-provided).

Cognitive computing Analytics


Cognitive computing-branded technology platforms typically specialize
the processing and analysis of large, unstructured datasets Word processing documents,
emails, videos, images, audio files, presentations, webpages, social media and many
other data formats often need to be manually tagged with metadata before they can be
fed to a computer for analysis and insight generation. The principal benefit of utilizing
cognitive analytics over traditional big data analytics is that such datasets do not need to
be pretagged.

VAST-TC Page 13
Seminar Report Smart Parking Using IoT

Other characteristics of a cognitive analytics system include:


 Adaptability: cognitive analytics systems can use machine learning to adapt to
different contexts with minimal human supervision
 Natural language interaction: cognitive analytics systems can be equipped with a
catboat or search assistant that understands queries, explains data insights and
interacts with humans in natural language

4.4 IoT – Advantages

The advantages of IoT span across every area of lifestyle and business. Here is a list of
some of the advantages that IoT has to offer:
 Improved Customer Engagement – Current analytics suffer from blind-spots and
significant flaws in accuracy; and as noted, engagement remains passive. IoT
completely transforms this to achieve richer and more effective engagement
with audiences.
 Technology Optimization – The same technologies and data which improve the
customer experience also improve device use, and aid in more potent
improvements to technology. IoT unlocks a world of critical functional and field
data.
 Reduced Waste – IoT makes areas of improvement clear. Current analytics give
us superficial insight, but IoT provides real-world information leading to more
effective management of resources.
 Enhanced Data Collection – Modern data collection suffers from its limitations
and its design for passive use. IoT breaks it out of those spaces, and places it
exactly where humans really want to go to analyze our world. It allows an
accurate picture of everything.

4.5 IoT -Disadvantages

Though IoT delivers an impressive set of benefits, it also presents a significant set of
challenges. Here is a list of some its major issues:
 Security – IoT creates an ecosystem of constantly connected devices
communicating
 over networks. The system offers little control despite any security measures.

VAST-TC Page 14
Seminar Report Smart Parking Using IoT

This leaves
 users exposed to various kinds of attackers.
 Privacy – The sophistication of IoT provides substantial personal data in
extreme detail without the user's active participation.
 Complexity – Some find IoT systems complicated in terms of design,
deployment, and maintenance given their use of multiple technologies and a
large set of new enabling technologies.
 Flexibility – Many are concerned about the flexibility of an IoT system to
integrate easily with another. They worry about finding themselves with several
conflicting or locked systems.
 Compliance – IoT, like any other technology in the realm of business, must
comply with regulations. Its complexity makes the issue of compliance seem
incredibly challenging when many consider standard software compliance a
battle.

VAST-TC Page 15
Seminar Report Smart Parking Using IoT

CHAPTER.5

DESIGN

5.1 IoT

There are four design principles in Industry 4.0. These principles support companies in
identifying and implementing Industry 4.0 scenarios.

Interconnection: The ability of machines, devices, sensors, and people to connect and
communicate with each other via the Internet of Things (IoT) or the Internet of People
(IoP).
Information transparency: The transparency afforded by Industry 4.0 technology
provides operators with vast amounts of useful information needed to make appropriate
decisions. Interconnectivity allows operators to collect immense amounts of data and
information from all points in the manufacturing process, thus aiding functionality and
identifying key areas that can benefit from innovation and improvement.

Technical assistance: First, the ability of assistance systems to support humans by


aggregating and visualizing information comprehensively for making informed
decisions and solving urgent problems on short notice. Second, the ability of cyber
physical systems to physically support humans by conducting a range of tasks that are
unpleasant, too exhausting, or unsafe for their human co-workers.

Decentralized decisions: The ability of cyber physical systems to make decisions on


their own and to perform their tasks as autonomously as possible. Only in the case of
exceptions, interferences, or conflicting goals, are tasks delegated to a higher level.
Elements in the system:

5.2 Network architecture

PARKING NETWORK:

The car park network (CPN) architecture is used as the infrastructure/backbone.

VAST-TC Page 16
Seminar Report Smart Parking Using IoT

The architecture is shown in Fig.4.4, where the dashed lines indicate wireless link and
the solid lines indicates wired link. This type of parking network includes routers that
form as the infrastructure for connected clients. The CPN infrastructure/backbone can be
built to allow sensor networks to connect using wireless radio technologies. The routers
form a self-configuring and self-healing link network.

Figure 5.4. Infrastructure of CPN architecture

VAST-TC Page 17
Seminar Report Smart Parking Using IoT

CHAPTER.6

WORKING

in our proposed approach, we move all computing functions of the


automation system into the cloud in order to provide full automation as a service. This
makes it easier, faster and less costly for users to deploy, maintain, and upgrade their
automation systems. Moreover, our design supports switching to a different cloud
automation providers since all VMs can be group-migrated to a different provider. Some
components are not movable to the cloud, such as sensors, actuators, and
safety/emergency shutdown control functions. Figure 3 illustrates our proposed
automation architecture. Our proposed approach relaxes the existing systems layers.
Figure 3 reflects the relationship between each component and the layers shown in
Figure 2.To connect sensors and actuators to the cloud, we use field-level protocols that
run on top of TCP, such as Mod-bus/TCP and Profibus/TCP, which are either built in
the de-vices or provided through separate I/O modules. For cases where advanced
functions, such as security and message-level scheduling are required, we dedicate a
gateway server, which could be replicated for more reliability. In our approach, direct
digital control algorithms ,run on cloud VMs instead of real hardware in the control
room. Also, in existing automation systems (Figure 2), controllers communicate with
sensors/actuators over a network with mostly deterministic communication delays that
are negligibly. Whereas in our design, communication occurs over the Internet, which
adds large and variable delays to the control loop. Therefore, straightforward migration
of direct digital control algorithms to the cloud may affect the functionality of the
control loop or even make the system unstable, and thus jeopardize the theoretical
performance guarantees offered by traditional controllers. As a result, more components
are needed to mitigate the variable Internet delays and the lack of reliability of Internet
links and VMs, which we design in this paper. We propose providing the HMI/SCADA
layer, L2, and all the way to L4, through Platform or Software as a Service (PaaS and
SaaS) models. Thus, we provide engineers and operators with access to the control room
applications through thin clients. In existing automation systems (Figure 2), a control
room is a complex environment loaded with servers, workstations, network switches,
and cables. In our proposed design, a control room is comprised of a number of thin
clients, which requires less hardware and wiring, making it a tidier environment [26]. In

VAST-TC Page 18
Seminar Report Smart Parking Using IoT

a manner similar to the field gateway server, we propose a control room redundant
gateway server to reliably carry on advanced functions, such as security and message
scheduling. To show how to maintain the timeliness and reliability of migrated
functionalities, we study L1, since it’s the most challenging layer as we discussed in
Section 1.3. We propose (i) an adaptive delay compensator (Section 4) which mitigates
the effect of communication delays on the remotely-controlled physical plant, and (ii) a
distributed fault tolerance algorithm (Section 5) which enables the controlled plant to
maintain operation under controller/link

VAST-TC Page 19
Seminar Report Smart Parking Using IoT

VAST-TC Page 20
Seminar Report Smart Parking Using IoT

PROPOSED DELAY MITIGATION


The roundtrip delay between the cloud controllers and controlled processes
varies with time. In most cases, the Internet roundtrip delay ranges from tens to a few
hundreds of milliseconds. Meanwhile, the sampling periods used in most industrial
applications typically range from a few hundreds of milliseconds to several seconds.
Therefore, most of the roundtrip delay will be absorbed within the sampling periods and
will have no effect on the control loop , because the controlled process will still be
receiving one action per sampling period. However, delay may occasionally change in a
random fashion beyond the sampling period because of the dynamic nature of the
Internet. To absorb such random variations, we need an adaptive delay mitigation
approach. In this section, we propose a method to handle varying communication delays.
We start with the traditional feedback control loop shown in Fig. 4(a). Moving the
controllerto a remote server as shown in Fig. 4(b) adds delay in both directions.
We model the loop as shown in Fig. 4(c), where C(z) and P(z) are the transfer
functions of the controller and the controlled process, respectively, and z-k and z-1denote
the feedforward and feedback delays, respectively. We introduce an artificial delay
block equal to z−l at the entrance of the set point as shown in Fig. 4(d). Introducing such
delay is insignificant to the system performance as we discuss at the end of this
subsection. We simplify the loop as shown in Fig. 4(e). Thus, we have managed to
reduce our cloud control problem to what is known as controlling a process with dead-
time [32], where there is a time delay between the application of the process input and its
effect on the output, e.g., when material traverses a long path within the process over a
conveyor belt. To control a process with dead-time, the controller is usually coupled
with a delay compensator. We propos our adaptive version of Smith Predictor [30].
Thus, our compensator does not require precise knowledge of the delay component at
design time. We first design the controller as if no delay is encountered. Then, we
measure the delay and adjust the Smith Predictor. This is important because the
communication delay over the Internet changes dynamically and cannot be known ahead
of time. The original design of Smith Predictor is as follows. Suppose the process
consists of a non-delay component
P(z) followed or preceded by a pure time delay z−(k+l) If we first consider the
process without delay and design a controller C(z), the closed loop transfer function
becomes

VAST-TC Page 21
Seminar Report Smart Parking Using IoT

T(z) = C(z)P(z)/(1+C(z)P(z)).
The objective is to find a controller C¯(z) for the process P(z)z−(k+l)such that the closed
loop transfer function is
T*(z) = T(z)z−(k+l), which involves solving the following equation for C¯(z):

(1)

The new controller is therefore given as:

(2)

Fig. 5 shows our proposed design of the virtualized controller, which has two main
components: (i) controller with delay compensator, and (ii) communication delay
estimator. The controller with delay compensator is shown in the dashed box which is a
block diagram of the controller described by Eq.( 2) with the combined feedforward and
feedback delays z−(k+l), i.e., the roundtrip delay. It uses C(z) which is the original
controller designed for the process P(z) with no delays. It also needs an approximation
of the process transfer function which is denoted by Pˆ(z).
In practice, a simple first or second-order approximation is sufficient [28]. The second
component is shown in the black box in Fig. 5, and it estimates the roundtrip delay
between the process and the remote controller. The roundtrip delay is used in the delay
block z−(k+l) Our delay estimator employs an exponentially weighted moving average to
estimate the communication delay mean as Di = αdi + (1 − α)Di−1, where Di is the
estimated mean delay and di is the measured delay at discrete time instant i.
Similarly, our estimator employs an exponentially weighted moving variance
to estimate the delay variance as
Vi = α(di − Di)2 + (1 − α)Vi−1
where Vi is the estimated variance at discrete time instant i. The delay value in the
delay block is adjusted to
Dc = b(Di +hVi1/2)/Tsc,
where Ts is the sampling period, and h is a positive parameter to accommodate for
delay values larger than the mean.

VAST-TC Page 22
Seminar Report Smart Parking Using IoT

SYSTEM OPERATIONS:

Thus, the estimator adjusts to changes of delay while not overreacting to short delay
spikes. Now, we go back to the delay block introduced in Fig. 4(d). Introducing such
delay is insignificant to the operation of the system for two reasons. First, set points are
kept constant for extremely long periods if not for the entire system lifetime. In control
theory, a delayed version of such constant function is the same constant function.
Second, even in the infrequent cases where set point has to be changed, it is often
performed by a human operator. Adding a few tens or even hundreds of milliseconds of
delay is insignificant to the operator response (several seconds, to reach a knob or
software slider and to update the value).In summary, the novelty of the proposed
approach is that adding a single artificial delay block outside the control loop
transformed the challenging cloud-based control problem to that of controlling a process
with dead-time, which is solved using Smith Predictors. Using our adaptive version of
Smith Predictor enables moving the controllers to a distant cloud provider without
changing the design of the original controller or the process being controlled.

VAST-TC Page 23
Seminar Report Smart Parking Using IoT

5 PROPOSED FAULT TOLERANCE

In this section, we design a distributed fault tolerance algorithm which


guarantees normal operation under failures, and we theoretically analyze its
performance. We also theoretically prove that for most real-life scenarios, cloud
feedback control using our algorithm has virtually no effect on the controlled process
operation. In most practical systems, controller failures are handled by double
redundancy as in [11], or at most triple redundancy as in [20] for mission-critical
processes. Upon failure, redundant controllers take over in a stateful manner. In current
automation systems, redundant controllers are closely located and tightly synchronized.
Thus, they easily share the control loop state periodically (typically once ever a few tens
of milliseconds). Providing similar reliability for redundant cloud controllers is quite
challenging because controllers would typically run on different machines and
preferably in different data centers or even different cloud providers, through different
Internet providers (multihoming) as shown in Fig. 6. Using different machines tolerates
machine failures, whereas replicating across different data centers (or cloud providers)
and using different Internet providers add more robustness to situations such as Internet
link failures. Additionally, fine-grained clock synchronization and maintaining the state
consistency on short time scales are complex and costly for geographically distant
machines communicating over the best-effort Internet.

To achieve reliability in the proposed feedback control cloud service, we propose a


distributed fault tolerance algorithm that is run asynchronously by all redundant
controllers. We call this algorithm Reliable Cloud Control (RCC). RCC supports double
and higher redundancy levels and provides the following guarantees:

G1 If the primary controller fails, the secondary controller is automatically hot-swapped


in. This guarantee is generalizable to higher redundancy. For example, in triple
redundancy, if the primary and secondary controllers fail, the tertiary controller is hot-
swapped in.

G2 If the failed primary controller recovers, it takes over, forcing the secondary
controller out of action. This guarantee is desirable when the secondary VM and/or link

VAST-TC Page 24
Seminar Report Smart Parking Using IoT

are chosen to be of less quality than the primary for cost savings. This guarantee is also
generalizable to higher redundancy.

G3 Handover of controllers is performed smoothly causing no undesirable transient


response artifacts.

For RCC to provide such guarantees, we define the system state as the tuple
(a,u1,u2,u3,...), where a is the last controller action executed by the actuator, and ui is
the time elapsed since the last action performed by the redundant controller Ci. To be
visible to all controllers, RCC stores the state tuple in the memory of the control I/O
interface module as shown in Fig. 6. The state tuple is initialized when the I/O interface
is first turned on. The last action a can be initialized arbitrarily according to the process
design. The time since last action ui is initialized to ∞ to indicate that the controller Ci
has never acted. We note that RCC does not require any clock synchronization. First,
RCC does not use absolute timestamps to measure the time ui elapsed since a controller
Ci last acted. Instead, it performs relative delay measurements through time counters in
the control I/O interface. Second, RCC is a periodic, soft real-time task whose relative
deadline is equal to its sampling period. As a result, the core control algorithm is
executed on every sampling period and is required to finish any time before the
beginning of the next period. Delaying a control action within the same sampling period
does not compromise the running control algorithm [36] because the process will still be
receiving one action per sampling period. For these two reasons, RCC can run
asynchronously on all VMs, and backup controller(s) could be started any time after the
primary is started, without having to synchronize the clocks of the VMs hosting the
controllers.

Detailed Operation

Fig. 7 shows the pseudocode of RCC which runs on top of every controller. We refer to
the algorithm line numbers between parentheses. In addition to the Initialization step,
RCC runs three steps in each sampling period: Polling, Computing, and Conditional
Acting. The Initialization step (lines 2-7) runs on the very first cycle, where RCC
initializes the ID i (line 4) and the engagement threshold Di (line 5) for controller Ci to
guarantee that only one controller is engaged at a time. IDs are set as 1 for the primary, 2
for the secondary, and so on. Also, for any controller pair (Ci, Cj) where i > j, the

VAST-TC Page 25
Seminar Report Smart Parking Using IoT

engagement thresholds must satisfy Di > Dj ≥ Ts, where Ts is the sampling period.
Then, the main steps are executed with every sampling period. The Polling step (lines 8-
13) fetches the following variables from the I/O interface (line 9):

(i) procVar: the current sensor measurement.


(ii) (ii) lastActn: representation of the state variable a, i.e., the last action
executed by the actuator.
(iii) lastActnAge: a time counter array, where lastActnAge(i) represents the state
variable ui,
i.e., the time elapsed since Ci was last engaged. If the Polling step times out, e.g., due to
link failure, the controller skips the current sampling period after resetting its firtCycle
flag to TRUE (line 11). This is important for guarantee G3 as will be shown in Section
5.3. Then, the Computing step (lines 14-23) decides the controller mode. For a given
controller Ci, if there is another controller Cj with a smaller ID (j < i) that is alive, then
Ci will decide to run in the standby mode. On the other hand, for all Cj where j < i, if the
age of the last action uj is older than Di, then Ci will decide to run in the engaged mode
as it assumes that all controllers Cj have failed. Thus, RCC evaluates the flag
iAmEngaged using the for loop that is scanning lastActnAge for controllers with lower
IDs (lines 16-21). Then, RCC runs the control algorithm controller() (line 22), which
normally requires the sensor measurement procVar only. For some control algorithms,
guarantee G3 dictates passing more parameters as discussed in Section 5.3. Finally, the
Conditional Acting step (lines 24-28) sends the computed action to the process (line 26)
if the iAmEngaged flag is TRUE (line 25). It further sends zero to reset the action age
counter. Otherwise, if the iAmEngaged flag is FALSE, the step performs no actions.
Without loss of generality, we now focus on the triple redundancy case to illustrate the
interaction among 3 controllers under RCC. The iAmEngaged flag of the primary
controller is always TRUE since it has the smallest ID. As the secondary controller polls
lastActnAge(1), it continuously checks whether the primary controller is alive. If the
primary controller fails, the secondary controller will detect the failure when
lastActnAge(1) exceeds the secondary controller’s engagement threshold. In this case,
iAmEngaged for the secondary controller will stay TRUE throughout the for loop. Thus,
the secondary controller will run in the engaged mode and hence reset its counter
lastActnAge(2) entry in the I/O interface to indicate it has just acted. Although the
tertiary controller will also detect the failure of the primary, its engagement threshold is

VAST-TC Page 26
Seminar Report Smart Parking Using IoT

higher than that of the secondary controller. Before the value of lastActnAge(1) crosses
the tertiary controller’s engagement threshold, the secondary controller would have
already acted. Thus, when the tertiary polls the state on the following sampling period,
lastActnAge(2) would have incremented to δ , such that 0 ≤ δ ≤ Ts which is less than the
tertiary’s threshold, forcing the iAmEngaged flag for the tertiary controller to become
FALSE. The tertiary controller will get engaged if and only if both the primary and
secondary controllers become unavailable. This addresses guarantee G1. If the primary
controller recovers from failure, it will gain control over the process since it always
operates in the engaged mode, forcing the secondary controller into the standby mode.
Upon resetting lastActnAge(1) for the primary controller, the secondary will detect the
recent primary action whose age is less than the secondary’s engagement threshold. As a
result, the iAmEngaged flag for the secondary controller will turn FALSE, causing it to
operate in the standby mode. The same discussion applies to any two controllers when
the lower-ID controller recovers from failure, achieving guarantee G2

Smooth Controller Handover

Switching between controllers may result in a “bump” in the process output, which
would violate guarantee G3. This occurs if the final value of the original controller
action is not equal to the initial value of the new controller action. The main reason for
this is that the redundant controllers do not necessarily start at the same time. With most
controllers having an integrator component, the output of the controllers will not be the
same since their integration intervals have different start times. To achieve smooth
handover between cloud controllers, we propose to use the bumpless transfer concept
from control theory [5, 32] in our cloud controllers. Bumpless transfer is originally
designed to support switching from “manual” to “auto” control, and it is supported by
most commercial PID controllers, which constitute more than 90% of the controllers
employed in the industry [6, 12]. Bumpless transfer for PID controllers is achievable
through adjusting the initial value of the integrator [32]. Other bumpless transfer
methods have been proposed for advanced “auto” controllers, e.g., [5]. The smooth
handover feature is implemented within the controller() function introduced in Fig. 7.
Assume we have two standard PID controllers: a primary Ci in the engaged mode, and a
backup Cj in the standby mode. After each of the controllers computes the proportional

VAST-TC Page 27
Seminar Report Smart Parking Using IoT

component, P, and the derivative component, D, the modified controller() function for
each of the controllers evaluates the following logical condition: (not iAmEngaged) or
firstCycle. If the condition is TRUE, it will adjust the integrator initial value as follows:
integInitVal = lastActn - P - D;, which means that integrator initial value will be
modified by subtracting the proportional and the derivative components P, D. This
means that except for the first sampling period, the engaged controller Ci runs the PID
control algorithm without applying the modification because the logical condition is
FALSE (note that (not iAmEngaged) is FALSE for the engaged controller). On the other
hand, for the standby controller Cj, the overall condition will be TRUE, so it overrides
the regular value of the PID integrator by forcing it to be equal to the last control action
(which was computed by the engaged controller, Ci) by subtracting P, D. In short, the
smooth handover feature corrects any deviation of the integrator of Cj so it matches the
integrator of Ci. Consequently, if Ci fails, and Cj takes over, then Cj starts with an action
that is equal to the last action of Ci. On the initial sampling periods (i.e., when first
Cycle is TRUE), all controllers are required to correct the initial values of their
integrators. This enables smooth handover between a recovered Ca with the currently
engaged controller Cb if a < b. This is why RCC sets firstCycleto TRUE upon timeouts
in Fig. 7. Consider a case where an engaged controller Ca suffers a link failure whereby
the Polling step times out, and a backup controller Cb is swapped in. If the link
recovers, then Ca takes over again after performing smooth handover with Cb because
upon recovery, the firstCycle flag of Ca will be TRUE.

VAST-TC Page 28
Seminar Report Smart Parking Using IoT

VAST-TC Page 29
Seminar Report Smart Parking Using IoT

CHAPTER.7
DISCUSSION

 Optimize parking space usage


 improve the efficiency of parking
 help traffic in the city flow more freely
 The Smart Parking system gives your multiple points of entry and exit. Rather
than moving multiple cars around, increasing risk, time and labor, your operators
simply use Smart Parking’s software to access cars.
 Day to day management including payment, compliance and space management
is made easy
 It requires less cost
 It helps improve the probability of successful parking and minimizes the user
waiting time.
 Users can access that occupancy data to determine the availability of spots and
then pay for them with their mobile phones. In addition to lending convenience
and environmental benefits, smart parking improves the utilization of existing
parking, leading to greater revenue for parking owners

VAST-TC Page 30
Seminar Report Smart Parking Using
IoT

CHAPTER.8
CONCLUSION

From this study it is clear that, this method increases the efficiency of the
current cloud-based-parking system and develops a network architecture based on
internet-of-things technology. This system will help users automatically and a
free parking space at the least cost. By using this method it will helps for improve
the probability of successful parking and minimizes the user waiting time. This is
the main advantage. The system benefits of smart parking go well beyond
avoiding the needless circling of city blocks. It also enables cities to develop fully
integrated multimodal intelligent transportation systems. The average waiting
time of each car park for service becomes minimal, and the total time of each
vehicle in each car park is reduced. In the future study, security aspects of the
system should be considered and implement the proposed system in large scales
in the real world.

VAST-TC Page 31
Seminar Report Smart Parking Using
IoT

9. SCOPE OF FUTURE WORK

By 2020, there will be nearly a million "smart" parking spaces around the
world, according to navigation research. More municipalities and corporations
are adopting the technology, for a variety of reasons. Chiefly, municipalities are
turning to the tech, which typically consists of sensors installed in parking lots
that alert drivers with compatible interfaces when they open up—but can also
send signals to cops when
a car has overstayed its
meter share—to clear up
congestion.

As Navigant
notes, some 30% of a
given city's traffic
gridlock is caused by
drivers circling the
blocks, looking for a spot.
Smart parking aims to
eliminate both the
unpleasantness and the
arterial clog in the city's traffic flows.

IEEE spectrum report on the smart system installed at the


Baltimore/Washington International airport, the first to utilize smart parking tech,
offers a good look at how these systems work in a parking garage-type setting:

Smart-parking technology for on-street spaces is expensive, and still in its early
stages. The largest examples are pilot projects with costs covered primarily by
grants from the federal Department of Transportation. In San Francisco, the SF
park pilot project uses sensors from Street Smart Technology for 7,000 of the

VAST-TC Page 32
Seminar Report Smart Parking Using
IoT

city’s 28,000 meters. In Los Angeles, LA Express Park has installed sensors from
Street line for 6,000 parking spots on downtown streets."

These programs are linked to smart phone apps, and the city encourages drivers
to tune in. And while the Times is right that these efforts are expensive right now,
parking is actually a huge industry: it employs 1 million people and rakes in $27
billion a year. There's room for real competition in who can provide the smartest,
and least painful services. Not to mention an incentive for cities to install the
smartest tech to squeeze to maximize ticket fee revenues.

All of this shows we're moving towards a world where scavenging for a parking
place will increasingly be a thing of the past—both because smart parking tech is
improving and becoming more ubiquitous, and because car ownership itself is
finally stalling out. Navigant says we may have hit "peak car ownership." All of
which is good news; it means a shrinking carbon footprint (driving is the second
biggest emitter worldwide) and less wasted time. If there's one thing we can all
agree on about the future, it's that we don't want to spend it looking for places to
park.

VAST-TC Page 33
Seminar Report Smart Parking Using
IoT

REFERENCE
[1] A Cloud-Based Smart-Parking System Based on Internet-of-Things
Technologies, THANH NAM PHAM, MING-FONG TSAI1, DUC BINH
NGUYEN1, CHYI-REN DOW1, AND DER-JIUNN DENG date of
publication September 9, 2015, date of current version September 23,
2015.

[2] An Intelligent Car Park Management System based on Wireless Sensor


Networks. Vanessa W.S. Tang, Yuan Zheng, Jiannong , 2006 1st
International Symposium on Pervasive Computing and Applications

[3] UTILIZING RFID FOR SMART PARKING APPLICATIONS, Zeydin


Pala1, Nihat Inanc2, April 18, 2009

[4] Automatic Smart Parking System using Internet of Things (IOT),


International Journal of Scientific and Research Publications, Volume 5,
Issue 12, December 2015 630 ISSN 2250-3153

[5] A Cloud-Based Car Parking Middleware for IoT-Based Smart Cities:


Design and Implementation ,Zhanlin Ji , Ivan Ganchev , Máirtín
O’Droma, Li Zhao and Xueji Zhang .

[6] A Survey on “Smart Parking” System Faiz Shaikh1, Nikhil kumar B.S.2,
Omkar Kulkarni3, Pratik Jadhav4 ,Saideep Bandarkar5

VAST-TC Page 34

You might also like