1A.Define Iot. Describe The Characteristics of Internet of Things Iot?
1A.Define Iot. Describe The Characteristics of Internet of Things Iot?
1A.Define Iot. Describe The Characteristics of Internet of Things Iot?
3.Scalability –
The number of elements connected to the IoT zone is increasing day by day. Hence,
an IoT setup should be capable of handling the massive expansion. The data
generated as an outcome is enormous, and it should be handled appropriately.
5.Architecture –
IoT architecture cannot be homogeneous in nature. It should be hybrid, supporting
different manufacturers ‘ products to function in the IoT network. IoT is not owned by
anyone engineering branch. IoT is a reality when multiple domains come together.
6.Safety –
There is a danger of the sensitive personal details of the users getting compromised
when all his/her devices are connected to the internet. This can cause a loss to the
user. Hence, data security is the major challenge. Besides, the equipment involved is
huge. IoT networks may also be at the risk. Therefore, equipment safety is also
critical.
2. Cloud Computing :
It provides us the means by which we can access applications as utilities over the
internet. Cloud means something which is present in remote locations.
With Cloud computing, users can access any resources from anywhere like databases,
webservers, storage, any device, and any software over the internet.
Characteristics –
1.Broad network access
2.On demand self-services
3.Rapid scalability
4.Measured service
5.Pay-per-use
•SaaS (Software as a service)
It is a way of delivering applications over the internet as a service. Instead of
installing and maintaining software, you simply access it via the internet, freeing
yourself from complex software and hardware management.
SaaS Applications are sometimes called web-based software on demand software or
hosted software.
SaaS applications run on a SaaS provider’s service and they manage security
availability and performance.
Ex : Google Docs, Gmail, office etc.
4. Communications Protocols :
They are the backbone of IoT systems and enable network connectivity and linking to
applications. Communication protocols allow devices to exchange data over the network.
Multiple protocols often describe different aspects of a single communication. A group of
protocols designed to work together is known as a protocol suite; when implemented in
software they are a protocol stack.
They are used in
1.Data encoding
2.Addressing schemes
5. Embedded Systems :
It is a combination of hardware and software used to perform special tasks.
It includes microcontroller and microprocessor memory, networking units (Ethernet Wi-Fi
adapters), input output units (display keyword etc. ) and storage devices (flash
memory).
It collects the data and sends it to the internet.
Embedded systems used in
Examples –
1.Digital camera
2.DVD player, music player
3.Industrial robots
4.Wireless Routers etc.
Healthcare Application: These days we have digital watches and fitness monitoring
devices that have changed the ways of healthcare monitoring. People can now
monitor their own health at regular intervals of time. These days if a person is being
rushed to the hospital by an ambulance, his/her healthcare statistics are already given
to the doctor, and the treatment gets started well in time. Also, data collected from
different patients are now being put to use for the cure.
Energy Applications: The energy rates have become paramount. All Individuals and
organizations, both are searching for ways to reduce and control the consumption of
energy. IoT provides a way to monitor energy usages not only at the appliance-level
but also at the grid level, house-level or even at the distribution level. Smart systems
such as Meters & Smart Grids are installed at various organizations to monitor energy
consumption.
Education Applications: IoT’s yet another great application lies in the field of
education. IoT helps in fulfilling the gaps and loopholes in the education industry. It
improves the quality of education being offered to students by optimizing the cost. It
also improves administration and management by taking into consideration students’
response and performance.
Government Applications: The smart city initiative by our government is an
example of how efficient and big this technology is. Its incorporation in sectors like
transportation, healthcare, armed forces, and security is commendable.
Consumer applications: A growing portion of IoT devices is being developed for
consumer use, including connected vehicles, home automation, wearable technology,
connected health, and remote monitoring devices.
Industrial applications: Also known as IIoT, industrial IoT devices attain and
analyse generated by connected equipment, operating technology (OT), locations and
people. In combination with operational technology (OT) monitoring devices, IioT
helps to control and supervise industrial systems.In addition, the same integration can
be conducted out for computerised record notifications of asset positioning in
manufacturing storage units as the size of assets can vary from a small screw to the
entire engine spare part and the misplacement of such assets can result in a percentile
loss of manpower time and money.
Medical applications: The Internet of Medical Things (IoMT) is a technology for
medical and health related purposes, data collection and analysis for mapping and
testing. IoMT has been referred to as "Smart Healthcare" as a digital healthcare
system technology, connecting available healthcare resources and healthcare
services.IoT devices can be used to access multiple health surveillance and
emergency communication systems. Specialized detectors can also be outfitted in
living spaces to monitor the condition and particular well-being of senior citizens,
while also making sure that effective care is dispensed and helping people to gain
extra movement through treatment.
Infrastructural applications: Planning and controlling the process of feasible urban
and rural infrastructure such as bridges, rail tracks and offshore wind farms is a key
application of the IoT[60]. The IoT infrastructure can be used to monitor any event or
change in structural conditions that could jeopardise quality and enhance risk.The IoT
can profit the construction industry through cost savings, time reduction, better
workday quality, cashless workflow and increased productivity. It can help you make
quick decisions and save funds with Real-Time Data Analytics.
IOT had faced some significant challenges and those are addressed as follows:
• Inadequate testing and upgrading
• Information security and privacy concerns
• Complexity of software and bulk volumes of data.
• AI integration and automation techniques
• Constant power supply, which is very hard to maintain everytime needed.
• Interaction and communication shortage.
4b. Why is the zigbee protocol so important for the IoT implementation?
Over the past few years, we have moved from disconnected systems into a world
completely linked to each other all in control of our fingertip. Smart home devices and similar
technologies have augmented over the years. What once started with automation has now
expanded into the Internet of Things(IoT). This in turn has settled into a more amiable category
we call smart homes.
The whole point of a smart home is to have everything connected to literally everything. In
particular, all the connected devices can share information with each other. You can control all of
them without the need to visit each thing individually. All the devices, manufactured by different
companies are connected over a single network. Therefore, requires a common language for its
communication. That’s where ZigBee shows in!
What is ZigBee?
ZigBee is a wireless technology standard that provides a set of communication protocols for
short-range communications. It is an open-source global standard developed by Zigbee Alliance to
address the needs of low-cost, low power wireless IoT networks. The protocol is used in low data
rate, short to medium range wireless networking devices like senors and control networks.
ZigBee provides flexibility for developers and end-users and delivers great interoperability.
Because of its important feature of being low-cost, low-power consumption and having faster
wireless connectivity, the protocol has many applications. For instance, its a popular technology for
smart home, because it outstands other wireless technologies with some distinct features. Firstly,
communication is two -way which makes ZigBee devices reliable. Secondly, it caters to all sectors
like lightings, security, appliances and home access. Thirdly, and most importantly, this technology
requires very little power mainly due to its low latency and low duty cycle. In addition, it uses mesh
network and thus reduce chances of failure at nodes.
ZigBee offers a wireless range of 70m indoors and 400m outdoors. It supports multiple
networks like point to point, point to multipoint mesh- networks. Notably, it uses AES 128
encryption thus protecting your information while on air transfers. In addition, its easy installation
and maintenance makes it more affordable.
Here’s an interesting fact on the origin of the name ZigBee! The name is closely in relation
with Bees because they do ‘waggle dance’ to communicate with each other when they return to their
hives. This zigzag dance is where ZigBee got its name.
ZigBee Applications
ZigBee enables a wide usage in wireless networks with low- cost, low-power solutions.
Most importantly, it provides the ability to run for years on inexpensive batteries to monitor and
control applications. Generally, home automation, Healthcare, Material tracking are some of the
areas where ZigBee is making its advancements. Some of its applications include:
• Home Automation including security systems, meter reading systems, Light control systems
There are different issues occurred in wireless sensor networks like design issues, topology issues,
and other issues. The design issues in different types of wireless sensor networks mainly include
Low latency
Fault
Coverage Problems
Transmission Media
Scalability
The topology issues of wireless sensor networks include the following.
Sensor Holes
Geographic Routing
Coverage Topology
The major issues of a wireless sensor network include the following. These issues mainly affect the
design and performance of the WSN.
Depending on the environment, the types of networks are decided so that those can be deployed
underwater, underground, on land, and so on. Different types of WSNs include:
1 Terrestrial WSNs
2 Underground WSNs
3 Underwater WSNs
4 Multimedia WSNs
5 Mobile WSNs
Terrestrial WSNs
Terrestrial WSNs are capable of communicating base stations efficiently, and consist of hundreds to
thousands of wireless sensor nodes deployed either in an unstructured (ad hoc) or structured (Pre-
planned) manner. In an unstructured mode, the sensor nodes are randomly distributed within the
target area that is dropped from a fixed plane. The preplanned or structured mode considers optimal
placement, grid placement, and 2D, 3D placement models.
In this WSN, the battery power is limited; however, the battery is equipped with solar cells as a
secondary power source. The Energy conservation of these WSNs is achieved by using low duty
cycle operations, minimizing delays, and optimal routing, and so on.
Underground WSNs
The underground wireless sensor networks are more expensive than the terrestrial WSNs in terms of
deployment, maintenance, and equipment cost considerations and careful planning. The WSNs
networks consist of several sensor nodes that are hidden in the ground to monitor underground
conditions. To relay information from the sensor nodes to the base station, additional sink nodes are
located above the ground.
The underground wireless sensor networks deployed into the ground are difficult to recharge. The
sensor battery nodes equipped with limited battery power are difficult to recharge. In addition to
this, the underground environment makes wireless communication a challenge due to the high level
of attenuation and signal loss.
More than 70% of the earth is occupied with water. These networks consist of several sensor nodes
and vehicles deployed underwater. Autonomous underwater vehicles are used for gathering data
from these sensor nodes. A challenge of underwater communication is a long propagation delay, and
bandwidth and sensor failures.
Under Water WSNs
Underwater, WSNs are equipped with a limited battery that cannot be recharged or replaced. The
issue of energy conservation for underwater WSNs involves the development of underwater
communication and networking techniques.
Multimedia WSNs
Multimedia wireless sensor networks have been proposed to enable tracking and monitoring of
events in the form of multimedia, such as imaging, video, and audio. These networks consist of
low-cost sensor nodes equipped with microphones and cameras. These nodes are interconnected
with each other over a wireless connection for data compression, data retrieval, and correlation.
Multimedia WSNs
The challenges with the multimedia WSN include high energy consumption, high bandwidth
requirements, data processing, and compressing techniques. In addition to this, multimedia contents
require high bandwidth for the content to be delivered properly and easily.
Mobile WSNs
These networks consist of a collection of sensor nodes that can be moved on their own and can be
interacted with the physical environment. The mobile nodes can compute sense and communicate.
Mobile wireless sensor networks are much more versatile than static sensor networks. The
advantages of MWSN over static wireless sensor networks include better and improved coverage,
better energy efficiency, superior channel capacity, and so on.
7. Give the classification of Wireless Sensor Networks?
The classification of WSNs can be done based on the application but its characteristics mainly
change based on the type. Generally, WSNs are classified into different categories like the
following.
All the sensor nodes in several applications can be set without movement so these networks are
static WSNs. Especially in some applications like biological systems uses mobile sensor nodes
which are called mobile networks. The best example of a mobile network is the monitoring of
animals.
In a deterministic type of network, the sensor node arrangement can be fixed and calculated. This
sensor node’s pre-planned operation can be possible in simply some applications. In most
applications, the location of sensor nodes cannot be determined because of the different factors like
hostile operating conditions & harsh environment, so these networks are called non-deterministic
that need a complex control system.
In a single base station network, a single base station is used and it can be arranged very close to the
region of the sensor node. The interaction between sensor nodes can be done through the base
station. In a multi-base station type network, multiple base stations are used & a sensor node is used
to move data toward the nearby base station.
In a single-hop type network, the arrangement of sensor nodes can be done directly toward the base
station whereas, in a multi-hop network, both the cluster heads & peer nodes are utilized to transmit
the data to reduce the energy consumption.
Self Reconfigurable & Non-Self Configurable
In a nonself configurable network, the arrangement of sensor networks cannot be done by them
within a network & depends on a control unit for gathering data. In wireless sensor networks, the
sensor nodes maintain and organize the network and collaboratively work by using other sensor
nodes to accomplish the task.
In a homogeneous wireless sensor network, all the sensor nodes mainly include similar energy
utilization, storage capabilities & computational power. In the heterogeneous network case, some
sensor nodes include high computational power as well as energy necessities as compared to others.
The processing & communication tasks are separated consequently.
Cloud
Most businesses are familiar with cloud computing since it’s now the
golden standard in most industries. Put simply, cloud computing stands for
storing and accessing data and programs over the internet, rather than on your
computer’s hard drive. For it to be considered ‘cloud computing’, you need to
access your data or your programs over the internet, or have that data synced
with other information over the web.
Cloud computing allows organisation to significantly exceed the normal
available storage, without having to host extra servers on site. Data can also
be collected from multiple sites and devices, accessible anytime, anywhere.
Fog and edge computing push both data and intelligence to analytic platforms
that are situated either on, or close to where the data originated from. This
helps to reduce latency cost and increase user experience. However, there are
key differences between the two.
Fog
Fog computing – a term created by Cisco – refers to extending cloud
computing to the edge of an enterprise’s network. It pushes intelligence down
to the local area network (LAN) level of network architecture, processing data
in a fog node or IoT gateway. Simply put, it involves moving your computers
closer to the sensors they are talking to.
One example of fog computing would be with trains. As part of the rise in
the Industrial Internet of Things, trains and tracks are being equipped with a
new generation of gadgets and sensors, with trains acting as the central hub
for all the data gathered from these sensors. The issue is that because trains
move so fast, it’s difficult to maintain a connection with the cloud. By installing
some fog computing nodes in the locomotive, you bypass this issue.
However, fog computing’s architecture relies on many links in a communication
chain to move data from the physical world of our assets into the digital world
of information technology. Each of these links is a potential point of failure.
Edge
Edge computing can be defined as the processing of sensor data away
from the centralised nodes and close to the logical edge of the network, toward
individual sources of data. It effectively pushes the computational functions to
the edge of the network. In other words, rather than pumping all the data back
up to the cloud for analysis and action, this process takes place much closer to
the data’s source.
Edge computing triages the data locally, reducing the backhaul traffic to
the central repository. It simplifies fog’s communication chain and reduces
potential points of failure.
Edge devices can be anything with sufficient compute capacity and
capability such as routers, switches and even the IoT sensors collecting the
data.
1.Elaborate wireless technologies of IOT?
The ZigBee protocol offers 128-bit AES encryption. The technology is also used in
Mesh networks, which allow nodes to be connected together through
multiple pathways. The wireless technology is hoped to ultimately be implemented in
things like smart home devices. The technology's ability to connect multiple devices
together simultaneously makes it ideal for a connected home environment where
users may want things like smart locks, lights, robots and thermostats to talk to one
another. The ZigBee Alliance recently standardized the technology in the hope to
make that connectivity possible. Currently all ZigBee devices are not capable of
talking to all other ZigBee devices. The hope is that standardization will correct that
issue and that the devices will offer a uniform experience for the end user.
At Link Labs, many of our customers are former ZigBee users, but found that range
and performance limited their applications.
WiFi can utilize both the global 2.4GHz UHF and 5GHz SHF ISM radio bands.
The WiFi Alliance certifies some products, allowing them to be labeled as “Wi-Fi
Certified.” In order to receive that designation, and product must go through the
Alliance’s interoperability certification testing.
802.11b, 802.11g, and 802.11n run on the 2.4GHz ISM band. The band is
susceptible to interference from some Bluetooth devices as well as some microwave
ovens and cordless phones. Devices that run on either band can be operated in the
United States without a license from the FCC, but still require FCC part 15
certification. The first six channels of frequencies from each are considered part of
the amateur radio band.
Challenges of WSN
Fault Performance
Scalability
Production Cost
Operation Environment
Quality of Service
Data Aggregation
Data Compression
Data Latency
Fault Performance
Some sensor nodes stop working because of power loss, so physical damage may
occur. This shouldn’t affect the sensor network’s overall performance, so this is
known as the issue of fault tolerance. Fault tolerance is nothing but the ability to
maintain the functionalities of the sensor network without any interruption because of
the failures of sensor nodes.
Stability
The number of nodes used in the detecting area may be in the order of thousands,
hundreds & routing schemes should be scalable enough for responding to events.
Production Cost
The sensor networks include a number of sensor nodes where a single node price is
very significant to validate the cost of the overall network and thus each sensor
node’s price must be kept low.
Operation Environment
The arrangement of sensor networks can be done within large machinery, under the
ocean, in the field of chemically or biologically contaminated. in homes, battlefields,
connected to fast-moving vehicles, animals, for monitoring in forests, etc.
Quality of Service
The quality of service which needs by the application could be energy efficiency,
lifetime length, and reliable data.
Data Aggregation
The combination of data from various sources with different functions like average,
max, min, is known as data aggregation.
Data Compression
Data Latency
These are treated like the essential factors that influence the design of routing
protocol. The data latency can be caused through data aggregation & multi-hop
relays.
Edge Computing Architecture is a new model for providing storage and substantial
computing properties near to the devices. This bringing of storage and computing
nearer to the devices improves response time and lessens the bandwidth. Edge
computing involves all types of computations which occur at the edge of a network
outside the cloud. Edge time works on real-time data generated by sensors and real-
time applications. The enormous emergence of IoT devices has pushed the bandwidth
demands to the extreme levels, resulting in delay. Edge computing moves services
closer to the edge and enhances service delivery.
Edge Computing Architecture
An Edge Computing Architecture comprises of the following components
Data source/devices
An edge gateway acts as a node between edge devices and a core network. A core
network comprises devices powerful enough to pre-process data. Edge gateways are
employed to provide interfaces to wired and radio-based transmissions.
The various standards used are:
• Z-Wave: Z-Wave is used for 30 meters point-to-point communication and is
specified for applications that involve small transmissions like household
appliance control applications. Z-Wave functions in ISM bands (around 900
MHz) and allows a transmission rate of 40 kbps. Z-wave is considered to be
the best possible option available for household appliances communication.
• LTE-A (Long Term Evolution—Advanced): This communication protocol
comprises of a set of various protocols meant for communication that fall under
Machine-Type signals and IoT based architectures. In terms of service cost and
scalability, it outperforms other cellular solutions.
• EPC-global: Electronic Product Code is used in the supply chain management
to identify items, as a unique identification number stored on an RFID tag. The
architecture uses RFID technologies along with easy to use RFID tags as well
as readers for information sharing.This architecture is recognized as a
promising technique for the future of the IoT because of the features of
openness, scalability, etc
• Bluetooth Low Energy: Bluetooth Low-Energy (BLE) or Bluetooth Smart
makes use of radio signals with short-range and a minimum power
requirement. It operates at a range that is nearly about ten times more than
classic Bluetooth technology. Its latency factor compared to classic Bluetooth
technology is 15 times less. The transmission power between 0.01 mW to 10
mW is feasible for its operation.
Protocols used
The Various Protocols used in this Layer
CoAP
CoAP is an application layer protocol for edge devices and applications, created by
IETF Constrained RESTful Environments (CoRE) working group. The CoAP
proposes a transfer protocol based on Representational State Transfer (REST) on top
of HTTP functionalities. REST is a cacheable connection protocol that relies on the
stateless client-server architecture. It represents a proper way to exchange data
between clients and servers on top of HTTP. It is used in mobile-based social network
applications and it makes complexity less by using HTTP methods(get, post, put, and
delete).
MQTT
an edge-computing architecture simply means the edge of the network. The devices
present at the edge of the network vary based upon the functionalities. A mobile
phone can be employed at the edge. A router can be employed at the edge of the
network etc. Edge comprises of those devices which can perform temporary data
processing and temporary storage before sending the actual data to the cloud for
further storage and processing. The communication between an edge device and an
edge is facilitated by an edge gateway. Edge provides data computing capabilities
nearer to the source of data. Edge is a demarcation between the core network and the
rest of the network in an edge computing environment. It just acts as an interface to
connect the edge architecture with either fog domain or cloud environment. The
devices which are employed at the edge should be capable of providing storage and
computing services. The edge of a network can be at a distance from the actual edge
device. In most of the cases, depending upon the response time and bandwidth
available, the edge can be just a hop distance from the main edge device, collecting
the data.
1. Art Applications
Cloud computing offers various art applications for quickly and
easily design attractive cards, booklets, and images. Some
most commonly used cloud art applications are given below:
i Moo
Moo is one of the best cloud art applications. It is used for designing
and printing business cards, postcards, and mini cards.
ii. Vistaprint
Vistaprint allows us to easily design various printed marketing
products such as business cards, Postcards, Booklets, and wedding
invitations cards.
iii. Adobe Creative Cloud
Adobe creative cloud is made for designers, artists, filmmakers, and
other creative professionals. It is a suite of apps which includes
PhotoShop image editing programming, Illustrator, InDesign,
TypeKit, Dreamweaver, XD, and Audition.
2. Business Applications
Business applications are based on cloud service providers. Today,
every organization requires the cloud business application to grow
their business. It also ensures that business applications are 24*7
available to users.
There are the following business applications of cloud computing -
i. MailChimp
MailChimp is an email publishing platform which provides
various options to design, send, and save templates for emails.
iii. Salesforce
Salesforce platform provides tools for sales, service, marketing, e-
commerce, and more. It also provides a cloud development
platform.
iv. Chatter
Chatter helps us to share important information about the
organization in real time.
v. Bitrix24
Bitrix24 is a collaboration platform which provides
communication, management, and social collaboration tools.
vi. Paypal
Paypal offers the simplest and easiest online payment mode using
a secure internet account. Paypal accepts the payment through
debit cards, credit cards, and also from Paypal account holders.
vii. Slack
Slack stands for Searchable Log of all Conversation and
Knowledge. It provides a user-friendly interface that helps us to
create public and private channels for communication.
viii. Quickbooks
Quickbooks works on the terminology "Run Enterprise anytime,
anywhere, on any device." It provides online accounting
solutions for the business. It allows more than 20 users to work
simultaneously on the same system.
4. Education Applications
Cloud computing in the education sector becomes very popular. It
offers various online distance learning platforms and student
information portals to the students. The advantage of using cloud
in the field of education is that it offers strong virtual classroom
environments, Ease of accessibility, secure data storage, scalability,
greater reach for the students, and minimal hardware requirements
for the applications.
There are the following education applications offered by the cloud -
i. Google Apps for Education
Google Apps for Education is the most widely used platform for free
web-based email, calendar, documents, and collaborative study.
ii. Chromebooks for Education
Chromebook for Education is one of the most important Google's
projects. It is designed for the purpose that it enhances education
innovation.
iii. Tablets with Google Play for Education
It allows educators to quickly implement the latest technology
solutions into the classroom and make it available to their students.
iv. AWS in Education
AWS cloud provides an education-friendly environment to
universities, community colleges, and schools.
5. Entertainment Applications
Entertainment industries use a multi-cloud strategy to interact
with the target audience. Cloud computing offers various
entertainment applications such as online games and video
conferencing.
i. Online games
Today, cloud gaming becomes one of the most important
entertainment media. It offers various online games that run
remotely from the cloud. The best cloud gaming services are
Shaow, GeForce Now, Vortex, Project xCloud, and PlayStation Now.
ii. Video Conferencing Apps
Video conferencing apps provides a simple and instant connected
experience. It allows us to communicate with our business partners,
friends, and relatives using a cloud-based video conferencing. The
benefits of using video conferencing are that it reduces cost,
increases efficiency, and removes interoperability.
6. Management Applications
Cloud computing offers various cloud management tools which help
admins to manage all types of cloud activities, such as resource
deployment, data integration, and disaster recovery. These
management tools also provide administrative control over the
platforms, applications, and infrastructure.
Some important management applications are -
i. Toggl
Toggl helps users to track allocated time period for a particular
project.
ii. Evernote
Evernote allows you to sync and save your recorded notes, typed
notes, and other notes in one convenient place. It is available for
both free as well as a paid version.
It uses platforms like Windows, macOS, Android, iOS, Browser, and
Unix.
iii. Outright
Outright is used by management users for the purpose of accounts.
It helps to track income, expenses, profits, and losses in real-time
environment.
iv. GoToMeeting
GoToMeeting provides Video Conferencing and online meeting
apps, which allows you to start a meeting with your business
partners from anytime, anywhere using mobile phones or tablets.
Using GoToMeeting app, you can perform the tasks related to the
management such as join meetings in seconds, view presentations
on the shared screen, get alerts for upcoming meetings, etc.
7. Social Applications
Social cloud applications allow a large number of users to connect
with each other using social networking applications such
as Facebook, Twitter, Linkedln, etc.
There are the following cloud based social applications -
i. Facebook
Facebook is a social networking website which allows active
users to share files, photos, videos, status, more to their friends,
relatives, and business partners using the cloud storage system. On
Facebook, we will always get notifications when our friends like and
comment on the posts.
ii. Twitter
Twitter is a social networking site. It is a microblogging system.
It allows users to follow high profile celebrities, friends, relatives,
and receive news. It sends and receives short posts called tweets.
iii. Yammer
Yammer is the best team collaboration tool that allows a team of
employees to chat, share images, documents, and videos.
iv. LinkedIn
LinkedIn is a social network for students, freshers, and
professionals.